SlideShare a Scribd company logo
© 2013 BlueSpace Federal Corp. and SolarWinds Worldwide, LLC. All rights reserved.
Sentinel
SolarWinds® POC
Francois Caron
Product Management Director
512.682.9872
francois.caron@solarwinds.com
BlueSpace POC
Pat Motola
CEO
512.921-0559
pat.motola@bluespace.com
Multi-Cloud, Multi-Network Cyber
Awareness, Monitoring and Management
2© 2013 BlueSpace Federal Corp. and SolarWinds Worldwide, LLC. All rights reserved.
Overview
• Completely isolating mission critical clouds
and networks is fundamental to maximize
cyber security.
• However, this isolation negatively impacts
the ability to monitor and manage the
cyber environment.
• SolarWinds and BlueSpace provide
compatible off the shelf products that
meet the requirements of US Intelligence
Community and Department of Defense
requirements for Multi-Cloud, Multi-
Network Cyber Awareness, IT Monitoring
and Management solutions.
3© 2013 BlueSpace Federal Corp. and SolarWinds Worldwide, LLC. All rights reserved.
SolarWinds: Who We Are - What We do
• Who we are
» More than 100,000 customers in 170 countries
» We sell to business of all sizes from SMB to Large Enterprise and Federal
» More than 425 of the Fortune 500 are customers
» 2012 revenue of over $290 million (+30% year-over-year growth)
» Named to “The Forbes® Fast Tech 25” in 2012 (Forbes magazine)
» More than one million users have downloaded our free tools
• Provide IT Management Software
◦ Focused on the end user in all the markets in which we compete
◦ Powerful. Easy to use. Affordable
4© 2013 BlueSpace Federal Corp. and SolarWinds Worldwide, LLC. All rights reserved.
SolarWinds Product Lines
Log & Event management
 Log and Event Manager
Network management
 Network Performance Monitor
 NetFlow Traffic Analyzer
 Network Configuration Manager
 IP Address Manager
 VoIP & Network Quality Manager
 Firewall Security Manager
 User Device Tracker
Application & Server management
 Server & Application Monitor
 Virtualization Manager
 Patch Manager
 Synthetic End User Monitor
Storage management
 Storage Manager
Remote management
 Mobile Admin®
 DameWare ®NT Utilities
 DameWare Mini Remote Control
IT help desk
 Web Help Desk™
5© 2013 BlueSpace Federal Corp. and SolarWinds Worldwide, LLC. All rights reserved.
SolarWinds EOC Capabilities
• SolarWinds Enterprise Operations Console (EOC)
• Provides a unified, consolidated, command center on a single
display to monitor SolarWinds Orion® instances* throughout the
enterprise.
• Scales to monitor over 600,000 network elements
• Focuses attention on mission-critical issues with global top 10 views
of bandwidth utilization, response time, CPU, memory, disk space
utilization and more
* EOC consolidates views from IPAM, NCM, NPM, NTA, SAM, UDT, VNQM
6© 2013 BlueSpace Federal Corp. and SolarWinds Worldwide, LLC. All rights reserved.
EOC Home
Orion Instances from
multiple domains
7© 2013 BlueSpace Federal Corp. and SolarWinds Worldwide, LLC. All rights reserved.
EOC Network
Orion Instances from
multiple domains
8© 2013 BlueSpace Federal Corp. and SolarWinds Worldwide, LLC. All rights reserved.
EOC Applications & Server
Orion Instances from
multiple domains
9© 2013 BlueSpace Federal Corp. and SolarWinds Worldwide, LLC. All rights reserved.
Case Study
1
0© 2013 BlueSpace Federal Corp. and SolarWinds Worldwide, LLC. All rights reserved.
BlueSpace Federal
• Company
◦ US Corporation, Small Business, Austin TX based, cleared employees
▪ CEO: Pat Motola, Chairman: Retired Admiral / NSA Director Bobby Ray Inman
◦ Mission: Cyber security solutions for mission critical clouds & networks
◦ How: Cross Domain Applications based on “SmartXD” technology
• SmartXD – Why It Matters
◦ Solves problems with previous cross domain application architectures
◦ Non-Disruptive – cross domain enables existing applications
◦ Simplified Certification – use certified data guards, transfer XML
◦ Rapid Delivery – < 6 months to create new applications
◦ Any Environment – clouds, networks, tagged data, guards.
• Business Model
◦ Flexible, low TCO licensing for BlueSpace COTS applications
◦ Easy, affordable to extend capabilities
◦ Partner centric approach provides complete solutions
1
1© 2013 BlueSpace Federal Corp. and SolarWinds Worldwide, LLC. All rights reserved.
Sentinel
• Capabilities
◦ SolarWinds provides global
cyber situational awareness,
monitoring and management
◦ Sentinel cross domain
enables SolarWinds
Enterprise Operations
Console (EOC)
◦ Sentinel enables Cross
Domain Drill-Down to views &
functions within SolarWinds
modules
◦ Off the shelf & easy to deploy
◦ Easy to use
Cross Domain Cyber Situational Awareness,
Monitoring and Management for SolarWinds software
1
2© 2013 BlueSpace Federal Corp. and SolarWinds Worldwide, LLC. All rights reserved.
Benefits
• NetOps Benefits
• Easy to use - full function EOC user interface with high side drill down.
• Increased cyber situational awareness - resulting in faster issue
identification, analysis, response and resolution.
• Improved IT efficiency - by reducing the number of different displays and
applications required to monitor multiple networks and multiple domains.
• Highly Secure – use of certified data guards and transferring only highly
constrained XML low-to-high.
• Other Benefits
• Simplified Certification – use of certified data guards (existing or selected
to best meet operational needs). Sentinel installs as a PL2 application in
each domain. Low to high XML flow only.
• Low TCO, COTS Solution – eliminates the cost, time and risks associated
with custom solution development.
• Flexibility – new capabilities can be rapidly developed, certified and
deployed.
1
3© 2013 BlueSpace Federal Corp. and SolarWinds Worldwide, LLC. All rights reserved.
Solution Architecture
1
4© 2013 BlueSpace Federal Corp. and SolarWinds Worldwide, LLC. All rights reserved.
Extension Points
• Cross Domain Drill Down – enables EOC users to drill down into
lower domain Orion detail and management functions.
◦ Smart Windowing – view windows from all domains on a single display
using Citrix® Xen® Client technology or equivalent.
• IT Service Management / Help Desk Integration – Sentinel can
create trouble tickets on any domain based on rules and policies
tied to events, alerts and other IT information.
• Custom Cross Domain Reporting - Sentinel can gather additional
information and create customized multi domain reports.
• Guard monitoring - Sentinel can provide information to the high
side Orion server to monitor the health of the data guard.
1
5© 2013 BlueSpace Federal Corp. and SolarWinds Worldwide, LLC. All rights reserved.
Smart Windowing User Experience
◦ EOC with cross domain Orion drill down on a single display
◦ Requires an AFRL SecureView 2.0 Trusted Workstation and Lower
Domain Drill Down extension.
1
6© 2013 BlueSpace Federal Corp. and SolarWinds Worldwide, LLC. All rights reserved.
SmartXD Rapidly Build Smarter Cross Domain Applications
Architecture
• VM in each domain
• Use any data guard
• Access tagged data
• XD enable existing apps
Common Services
• Rapid development
• Eliminate duplication
Application Design
1. Access Data
2. Process Data
3. Communicate
4. Present Data
5. User Interaction
6. Orchestration
6
5
3
2
1
1
1
2
2
3
3
4
6
1
7© 2013 BlueSpace Federal Corp. and SolarWinds Worldwide, LLC. All rights reserved.
SmartXD Smarter Certification, More Secure
Certification Design
1. Use Guard Certifications
2. SmartXD VMs are PL2
(single domain)
3. SmartXD only transfers
XML (Highly Constrained)
4. Use tagged data access
certifications (CSG)
Security
• Leverage guard and
tagged data security
• Eliminate unnecessary
data duplication
• Eliminate risk of
complex data trojans
• Guard XML schema
checking and dirty word
scans
4
3
3
2
2
2
1
1
8© 2013 BlueSpace Federal Corp. and SolarWinds Worldwide, LLC. All rights reserved.
Partners
Integration/Reseller
Technology
1
9© 2013 BlueSpace Federal Corp. and SolarWinds Worldwide, LLC. All rights reserved.
• SolarWinds Worldwide, LLC’s trademarks, service marks, logos
and copyrights are the exclusive property of SolarWinds
Worldwide, LLC. For a complete list of SolarWinds trademarks,
service marks, and logos, please visit
www.solarwinds.com/trademarks. All other trademarks or works
mentioned herein are the intellectual property of their
respective companies. SolarWinds Worldwide, LLC is not
affiliated with any of the respective companies.

More Related Content

What's hot

MT 117 Key Innovations in Cybersecurity
MT 117 Key Innovations in CybersecurityMT 117 Key Innovations in Cybersecurity
MT 117 Key Innovations in Cybersecurity
Dell EMC World
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
UnifyCloud
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedNorm Barber
 
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Alex Hanway - Securing the Breach: Using a Holistic Data Protection FrameworkAlex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
centralohioissa
 
What is cyber resilience?
What is cyber resilience?What is cyber resilience?
What is cyber resilience?
Aaron Clark-Ginsberg
 
Key Challenges Facing IT/OT: Hear From The Experts
Key Challenges Facing IT/OT: Hear From The ExpertsKey Challenges Facing IT/OT: Hear From The Experts
Key Challenges Facing IT/OT: Hear From The Experts
Tripwire
 
Cloud security: Accelerating cloud adoption
Cloud security: Accelerating cloud adoption Cloud security: Accelerating cloud adoption
Cloud security: Accelerating cloud adoption
Dell World
 
"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategy"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategy
Jason Clark
 
Collaborative defence strategies for network security
Collaborative defence strategies for network securityCollaborative defence strategies for network security
Collaborative defence strategies for network security
sonukumar142
 
Tripwire enterprise 87_datasheet
Tripwire enterprise 87_datasheetTripwire enterprise 87_datasheet
Tripwire enterprise 87_datasheet
Devaraj Sl
 
Vulnerability Testing Services Case Study
Vulnerability Testing Services Case StudyVulnerability Testing Services Case Study
Vulnerability Testing Services Case Study
Nandita Nityanandam
 
Cyber Security - Maintaining Operational Control of Critical Services
Cyber Security - Maintaining Operational Control of Critical ServicesCyber Security - Maintaining Operational Control of Critical Services
Cyber Security - Maintaining Operational Control of Critical Services
Dave Reeves
 
Microsegmentation for enterprise data centers
Microsegmentation for enterprise data centersMicrosegmentation for enterprise data centers
Microsegmentation for enterprise data centers
Narendran Vaideeswaran
 
DHS Cybersecurity Services for Building Cyber Resilience
DHS Cybersecurity Services for Building Cyber ResilienceDHS Cybersecurity Services for Building Cyber Resilience
DHS Cybersecurity Services for Building Cyber Resilience
Dawn Yankeelov
 
Regulators’ Role in Smart Grid Security: What They Want to Know by Alan Rival...
Regulators’ Role in Smart Grid Security: What They Want to Know by Alan Rival...Regulators’ Role in Smart Grid Security: What They Want to Know by Alan Rival...
Regulators’ Role in Smart Grid Security: What They Want to Know by Alan Rival...TheAnfieldGroup
 
Lisa Guess - Embracing the Cloud
Lisa Guess - Embracing the CloudLisa Guess - Embracing the Cloud
Lisa Guess - Embracing the Cloud
centralohioissa
 
Addressing the Cyber-Security Landscape
Addressing the Cyber-Security LandscapeAddressing the Cyber-Security Landscape
Addressing the Cyber-Security Landscape
ePlus
 
MT81 Keys to Successful Enterprise IoT Initiatives
MT81 Keys to Successful Enterprise IoT InitiativesMT81 Keys to Successful Enterprise IoT Initiatives
MT81 Keys to Successful Enterprise IoT Initiatives
Dell EMC World
 
Dr. Jim Murray: How do we Protect our Systems and Meet Compliance in a Rapidl...
Dr. Jim Murray: How do we Protect our Systems and Meet Compliance in a Rapidl...Dr. Jim Murray: How do we Protect our Systems and Meet Compliance in a Rapidl...
Dr. Jim Murray: How do we Protect our Systems and Meet Compliance in a Rapidl...
Government Technology and Services Coalition
 
Security Risks: The Threat is Real
Security Risks: The Threat is RealSecurity Risks: The Threat is Real
Security Risks: The Threat is Real
ePlus
 

What's hot (20)

MT 117 Key Innovations in Cybersecurity
MT 117 Key Innovations in CybersecurityMT 117 Key Innovations in Cybersecurity
MT 117 Key Innovations in Cybersecurity
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
 
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Alex Hanway - Securing the Breach: Using a Holistic Data Protection FrameworkAlex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
 
What is cyber resilience?
What is cyber resilience?What is cyber resilience?
What is cyber resilience?
 
Key Challenges Facing IT/OT: Hear From The Experts
Key Challenges Facing IT/OT: Hear From The ExpertsKey Challenges Facing IT/OT: Hear From The Experts
Key Challenges Facing IT/OT: Hear From The Experts
 
Cloud security: Accelerating cloud adoption
Cloud security: Accelerating cloud adoption Cloud security: Accelerating cloud adoption
Cloud security: Accelerating cloud adoption
 
"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategy"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategy
 
Collaborative defence strategies for network security
Collaborative defence strategies for network securityCollaborative defence strategies for network security
Collaborative defence strategies for network security
 
Tripwire enterprise 87_datasheet
Tripwire enterprise 87_datasheetTripwire enterprise 87_datasheet
Tripwire enterprise 87_datasheet
 
Vulnerability Testing Services Case Study
Vulnerability Testing Services Case StudyVulnerability Testing Services Case Study
Vulnerability Testing Services Case Study
 
Cyber Security - Maintaining Operational Control of Critical Services
Cyber Security - Maintaining Operational Control of Critical ServicesCyber Security - Maintaining Operational Control of Critical Services
Cyber Security - Maintaining Operational Control of Critical Services
 
Microsegmentation for enterprise data centers
Microsegmentation for enterprise data centersMicrosegmentation for enterprise data centers
Microsegmentation for enterprise data centers
 
DHS Cybersecurity Services for Building Cyber Resilience
DHS Cybersecurity Services for Building Cyber ResilienceDHS Cybersecurity Services for Building Cyber Resilience
DHS Cybersecurity Services for Building Cyber Resilience
 
Regulators’ Role in Smart Grid Security: What They Want to Know by Alan Rival...
Regulators’ Role in Smart Grid Security: What They Want to Know by Alan Rival...Regulators’ Role in Smart Grid Security: What They Want to Know by Alan Rival...
Regulators’ Role in Smart Grid Security: What They Want to Know by Alan Rival...
 
Lisa Guess - Embracing the Cloud
Lisa Guess - Embracing the CloudLisa Guess - Embracing the Cloud
Lisa Guess - Embracing the Cloud
 
Addressing the Cyber-Security Landscape
Addressing the Cyber-Security LandscapeAddressing the Cyber-Security Landscape
Addressing the Cyber-Security Landscape
 
MT81 Keys to Successful Enterprise IoT Initiatives
MT81 Keys to Successful Enterprise IoT InitiativesMT81 Keys to Successful Enterprise IoT Initiatives
MT81 Keys to Successful Enterprise IoT Initiatives
 
Dr. Jim Murray: How do we Protect our Systems and Meet Compliance in a Rapidl...
Dr. Jim Murray: How do we Protect our Systems and Meet Compliance in a Rapidl...Dr. Jim Murray: How do we Protect our Systems and Meet Compliance in a Rapidl...
Dr. Jim Murray: How do we Protect our Systems and Meet Compliance in a Rapidl...
 
Security Risks: The Threat is Real
Security Risks: The Threat is RealSecurity Risks: The Threat is Real
Security Risks: The Threat is Real
 

Similar to Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Francois Caron and Pat Motola

Cross Domain Cyber Situational Awareness in a Multi Cloud, Multi-Network Fede...
Cross Domain Cyber Situational Awareness in a Multi Cloud, Multi-Network Fede...Cross Domain Cyber Situational Awareness in a Multi Cloud, Multi-Network Fede...
Cross Domain Cyber Situational Awareness in a Multi Cloud, Multi-Network Fede...
SolarWinds
 
Webinar: Cloud Data Masking - Tips to Test Software Securely
Webinar: Cloud Data Masking - Tips to Test Software Securely Webinar: Cloud Data Masking - Tips to Test Software Securely
Webinar: Cloud Data Masking - Tips to Test Software Securely
Skytap Cloud
 
Automated Deployment and Management of Edge Clouds
Automated Deployment and Management of Edge CloudsAutomated Deployment and Management of Edge Clouds
Automated Deployment and Management of Edge Clouds
Jay Bryant
 
Government and Education: IT Tools to Support Your Hybrid Workforce
Government and Education: IT Tools to Support Your Hybrid WorkforceGovernment and Education: IT Tools to Support Your Hybrid Workforce
Government and Education: IT Tools to Support Your Hybrid Workforce
SolarWinds
 
Overcoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the CloudOvercoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the Cloud
Zscaler
 
SolarWinds Online Federal User Group
SolarWinds Online Federal User GroupSolarWinds Online Federal User Group
SolarWinds Online Federal User Group
SolarWinds
 
Part 2: Cloudera’s Operational Database: Unlocking New Benefits in the Cloud
Part 2: Cloudera’s Operational Database: Unlocking New Benefits in the CloudPart 2: Cloudera’s Operational Database: Unlocking New Benefits in the Cloud
Part 2: Cloudera’s Operational Database: Unlocking New Benefits in the Cloud
Cloudera, Inc.
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
CloudExpoEurope
 
Total cloud data center product sheet
Total cloud data center product sheetTotal cloud data center product sheet
Total cloud data center product sheetmarkhuelsmann
 
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...
SolarWinds
 
Gregory Touretsky - Intel IT- Open Cloud Journey
Gregory Touretsky - Intel IT- Open Cloud JourneyGregory Touretsky - Intel IT- Open Cloud Journey
Gregory Touretsky - Intel IT- Open Cloud Journey
Cloud Native Day Tel Aviv
 
Rethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation EraRethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation Era
Zscaler
 
Rethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation EraRethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation Era
Zscaler
 
Government and Education Webinar: Conquering Remote Work IT Challenges
Government and Education Webinar: Conquering Remote Work IT Challenges Government and Education Webinar: Conquering Remote Work IT Challenges
Government and Education Webinar: Conquering Remote Work IT Challenges
SolarWinds
 
Modulus Datasheets
Modulus DatasheetsModulus Datasheets
Modulus Datasheets
Ideba
 
ArchivePod a legacy data solution when migrating to the #CLOUD
ArchivePod a legacy data solution when migrating to the #CLOUDArchivePod a legacy data solution when migrating to the #CLOUD
ArchivePod a legacy data solution when migrating to the #CLOUD
Garet Keller
 
Guardicore - Shrink Your Attack Surface with Micro-Segmentation
Guardicore - Shrink Your Attack Surface with Micro-SegmentationGuardicore - Shrink Your Attack Surface with Micro-Segmentation
Guardicore - Shrink Your Attack Surface with Micro-Segmentation
CSNP
 
CohesiveFT and IBM joint EMEA Webinar - 20Jun13
CohesiveFT and IBM joint EMEA Webinar - 20Jun13CohesiveFT and IBM joint EMEA Webinar - 20Jun13
CohesiveFT and IBM joint EMEA Webinar - 20Jun13
Cohesive Networks
 
MX Deep Dive PPT
MX Deep Dive PPTMX Deep Dive PPT
MX Deep Dive PPTomar awad
 
CipherCloud for Any App
CipherCloud for Any AppCipherCloud for Any App
CipherCloud for Any App
CipherCloud
 

Similar to Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Francois Caron and Pat Motola (20)

Cross Domain Cyber Situational Awareness in a Multi Cloud, Multi-Network Fede...
Cross Domain Cyber Situational Awareness in a Multi Cloud, Multi-Network Fede...Cross Domain Cyber Situational Awareness in a Multi Cloud, Multi-Network Fede...
Cross Domain Cyber Situational Awareness in a Multi Cloud, Multi-Network Fede...
 
Webinar: Cloud Data Masking - Tips to Test Software Securely
Webinar: Cloud Data Masking - Tips to Test Software Securely Webinar: Cloud Data Masking - Tips to Test Software Securely
Webinar: Cloud Data Masking - Tips to Test Software Securely
 
Automated Deployment and Management of Edge Clouds
Automated Deployment and Management of Edge CloudsAutomated Deployment and Management of Edge Clouds
Automated Deployment and Management of Edge Clouds
 
Government and Education: IT Tools to Support Your Hybrid Workforce
Government and Education: IT Tools to Support Your Hybrid WorkforceGovernment and Education: IT Tools to Support Your Hybrid Workforce
Government and Education: IT Tools to Support Your Hybrid Workforce
 
Overcoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the CloudOvercoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the Cloud
 
SolarWinds Online Federal User Group
SolarWinds Online Federal User GroupSolarWinds Online Federal User Group
SolarWinds Online Federal User Group
 
Part 2: Cloudera’s Operational Database: Unlocking New Benefits in the Cloud
Part 2: Cloudera’s Operational Database: Unlocking New Benefits in the CloudPart 2: Cloudera’s Operational Database: Unlocking New Benefits in the Cloud
Part 2: Cloudera’s Operational Database: Unlocking New Benefits in the Cloud
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
 
Total cloud data center product sheet
Total cloud data center product sheetTotal cloud data center product sheet
Total cloud data center product sheet
 
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...
 
Gregory Touretsky - Intel IT- Open Cloud Journey
Gregory Touretsky - Intel IT- Open Cloud JourneyGregory Touretsky - Intel IT- Open Cloud Journey
Gregory Touretsky - Intel IT- Open Cloud Journey
 
Rethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation EraRethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation Era
 
Rethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation EraRethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation Era
 
Government and Education Webinar: Conquering Remote Work IT Challenges
Government and Education Webinar: Conquering Remote Work IT Challenges Government and Education Webinar: Conquering Remote Work IT Challenges
Government and Education Webinar: Conquering Remote Work IT Challenges
 
Modulus Datasheets
Modulus DatasheetsModulus Datasheets
Modulus Datasheets
 
ArchivePod a legacy data solution when migrating to the #CLOUD
ArchivePod a legacy data solution when migrating to the #CLOUDArchivePod a legacy data solution when migrating to the #CLOUD
ArchivePod a legacy data solution when migrating to the #CLOUD
 
Guardicore - Shrink Your Attack Surface with Micro-Segmentation
Guardicore - Shrink Your Attack Surface with Micro-SegmentationGuardicore - Shrink Your Attack Surface with Micro-Segmentation
Guardicore - Shrink Your Attack Surface with Micro-Segmentation
 
CohesiveFT and IBM joint EMEA Webinar - 20Jun13
CohesiveFT and IBM joint EMEA Webinar - 20Jun13CohesiveFT and IBM joint EMEA Webinar - 20Jun13
CohesiveFT and IBM joint EMEA Webinar - 20Jun13
 
MX Deep Dive PPT
MX Deep Dive PPTMX Deep Dive PPT
MX Deep Dive PPT
 
CipherCloud for Any App
CipherCloud for Any AppCipherCloud for Any App
CipherCloud for Any App
 

More from TheAnfieldGroup

Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill
Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir GillEliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill
Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir GillTheAnfieldGroup
 
Leveraging Technology to Enhance Security, Reliability & NERC-CIP Ver.5 Compl...
Leveraging Technology to Enhance Security, Reliability & NERC-CIP Ver.5 Compl...Leveraging Technology to Enhance Security, Reliability & NERC-CIP Ver.5 Compl...
Leveraging Technology to Enhance Security, Reliability & NERC-CIP Ver.5 Compl...TheAnfieldGroup
 
Cyber Security Standards Update: Version 5 by Scott Mix
Cyber Security Standards Update: Version 5 by Scott MixCyber Security Standards Update: Version 5 by Scott Mix
Cyber Security Standards Update: Version 5 by Scott MixTheAnfieldGroup
 
Synchrophasor Timing Security
Synchrophasor Timing SecuritySynchrophasor Timing Security
Synchrophasor Timing Security
TheAnfieldGroup
 
EnergySec & National Electric Cyber Security Organization (NESCO) Overview by...
EnergySec & National Electric Cyber Security Organization (NESCO) Overview by...EnergySec & National Electric Cyber Security Organization (NESCO) Overview by...
EnergySec & National Electric Cyber Security Organization (NESCO) Overview by...
TheAnfieldGroup
 
Integration of Technology & Compliance Presented by John Heintz, CPS Energy
Integration of Technology & Compliance Presented by John Heintz, CPS EnergyIntegration of Technology & Compliance Presented by John Heintz, CPS Energy
Integration of Technology & Compliance Presented by John Heintz, CPS Energy
TheAnfieldGroup
 

More from TheAnfieldGroup (6)

Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill
Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir GillEliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill
Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill
 
Leveraging Technology to Enhance Security, Reliability & NERC-CIP Ver.5 Compl...
Leveraging Technology to Enhance Security, Reliability & NERC-CIP Ver.5 Compl...Leveraging Technology to Enhance Security, Reliability & NERC-CIP Ver.5 Compl...
Leveraging Technology to Enhance Security, Reliability & NERC-CIP Ver.5 Compl...
 
Cyber Security Standards Update: Version 5 by Scott Mix
Cyber Security Standards Update: Version 5 by Scott MixCyber Security Standards Update: Version 5 by Scott Mix
Cyber Security Standards Update: Version 5 by Scott Mix
 
Synchrophasor Timing Security
Synchrophasor Timing SecuritySynchrophasor Timing Security
Synchrophasor Timing Security
 
EnergySec & National Electric Cyber Security Organization (NESCO) Overview by...
EnergySec & National Electric Cyber Security Organization (NESCO) Overview by...EnergySec & National Electric Cyber Security Organization (NESCO) Overview by...
EnergySec & National Electric Cyber Security Organization (NESCO) Overview by...
 
Integration of Technology & Compliance Presented by John Heintz, CPS Energy
Integration of Technology & Compliance Presented by John Heintz, CPS EnergyIntegration of Technology & Compliance Presented by John Heintz, CPS Energy
Integration of Technology & Compliance Presented by John Heintz, CPS Energy
 

Recently uploaded

FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 

Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Francois Caron and Pat Motola

  • 1. © 2013 BlueSpace Federal Corp. and SolarWinds Worldwide, LLC. All rights reserved. Sentinel SolarWinds® POC Francois Caron Product Management Director 512.682.9872 francois.caron@solarwinds.com BlueSpace POC Pat Motola CEO 512.921-0559 pat.motola@bluespace.com Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management
  • 2. 2© 2013 BlueSpace Federal Corp. and SolarWinds Worldwide, LLC. All rights reserved. Overview • Completely isolating mission critical clouds and networks is fundamental to maximize cyber security. • However, this isolation negatively impacts the ability to monitor and manage the cyber environment. • SolarWinds and BlueSpace provide compatible off the shelf products that meet the requirements of US Intelligence Community and Department of Defense requirements for Multi-Cloud, Multi- Network Cyber Awareness, IT Monitoring and Management solutions.
  • 3. 3© 2013 BlueSpace Federal Corp. and SolarWinds Worldwide, LLC. All rights reserved. SolarWinds: Who We Are - What We do • Who we are » More than 100,000 customers in 170 countries » We sell to business of all sizes from SMB to Large Enterprise and Federal » More than 425 of the Fortune 500 are customers » 2012 revenue of over $290 million (+30% year-over-year growth) » Named to “The Forbes® Fast Tech 25” in 2012 (Forbes magazine) » More than one million users have downloaded our free tools • Provide IT Management Software ◦ Focused on the end user in all the markets in which we compete ◦ Powerful. Easy to use. Affordable
  • 4. 4© 2013 BlueSpace Federal Corp. and SolarWinds Worldwide, LLC. All rights reserved. SolarWinds Product Lines Log & Event management  Log and Event Manager Network management  Network Performance Monitor  NetFlow Traffic Analyzer  Network Configuration Manager  IP Address Manager  VoIP & Network Quality Manager  Firewall Security Manager  User Device Tracker Application & Server management  Server & Application Monitor  Virtualization Manager  Patch Manager  Synthetic End User Monitor Storage management  Storage Manager Remote management  Mobile Admin®  DameWare ®NT Utilities  DameWare Mini Remote Control IT help desk  Web Help Desk™
  • 5. 5© 2013 BlueSpace Federal Corp. and SolarWinds Worldwide, LLC. All rights reserved. SolarWinds EOC Capabilities • SolarWinds Enterprise Operations Console (EOC) • Provides a unified, consolidated, command center on a single display to monitor SolarWinds Orion® instances* throughout the enterprise. • Scales to monitor over 600,000 network elements • Focuses attention on mission-critical issues with global top 10 views of bandwidth utilization, response time, CPU, memory, disk space utilization and more * EOC consolidates views from IPAM, NCM, NPM, NTA, SAM, UDT, VNQM
  • 6. 6© 2013 BlueSpace Federal Corp. and SolarWinds Worldwide, LLC. All rights reserved. EOC Home Orion Instances from multiple domains
  • 7. 7© 2013 BlueSpace Federal Corp. and SolarWinds Worldwide, LLC. All rights reserved. EOC Network Orion Instances from multiple domains
  • 8. 8© 2013 BlueSpace Federal Corp. and SolarWinds Worldwide, LLC. All rights reserved. EOC Applications & Server Orion Instances from multiple domains
  • 9. 9© 2013 BlueSpace Federal Corp. and SolarWinds Worldwide, LLC. All rights reserved. Case Study
  • 10. 1 0© 2013 BlueSpace Federal Corp. and SolarWinds Worldwide, LLC. All rights reserved. BlueSpace Federal • Company ◦ US Corporation, Small Business, Austin TX based, cleared employees ▪ CEO: Pat Motola, Chairman: Retired Admiral / NSA Director Bobby Ray Inman ◦ Mission: Cyber security solutions for mission critical clouds & networks ◦ How: Cross Domain Applications based on “SmartXD” technology • SmartXD – Why It Matters ◦ Solves problems with previous cross domain application architectures ◦ Non-Disruptive – cross domain enables existing applications ◦ Simplified Certification – use certified data guards, transfer XML ◦ Rapid Delivery – < 6 months to create new applications ◦ Any Environment – clouds, networks, tagged data, guards. • Business Model ◦ Flexible, low TCO licensing for BlueSpace COTS applications ◦ Easy, affordable to extend capabilities ◦ Partner centric approach provides complete solutions
  • 11. 1 1© 2013 BlueSpace Federal Corp. and SolarWinds Worldwide, LLC. All rights reserved. Sentinel • Capabilities ◦ SolarWinds provides global cyber situational awareness, monitoring and management ◦ Sentinel cross domain enables SolarWinds Enterprise Operations Console (EOC) ◦ Sentinel enables Cross Domain Drill-Down to views & functions within SolarWinds modules ◦ Off the shelf & easy to deploy ◦ Easy to use Cross Domain Cyber Situational Awareness, Monitoring and Management for SolarWinds software
  • 12. 1 2© 2013 BlueSpace Federal Corp. and SolarWinds Worldwide, LLC. All rights reserved. Benefits • NetOps Benefits • Easy to use - full function EOC user interface with high side drill down. • Increased cyber situational awareness - resulting in faster issue identification, analysis, response and resolution. • Improved IT efficiency - by reducing the number of different displays and applications required to monitor multiple networks and multiple domains. • Highly Secure – use of certified data guards and transferring only highly constrained XML low-to-high. • Other Benefits • Simplified Certification – use of certified data guards (existing or selected to best meet operational needs). Sentinel installs as a PL2 application in each domain. Low to high XML flow only. • Low TCO, COTS Solution – eliminates the cost, time and risks associated with custom solution development. • Flexibility – new capabilities can be rapidly developed, certified and deployed.
  • 13. 1 3© 2013 BlueSpace Federal Corp. and SolarWinds Worldwide, LLC. All rights reserved. Solution Architecture
  • 14. 1 4© 2013 BlueSpace Federal Corp. and SolarWinds Worldwide, LLC. All rights reserved. Extension Points • Cross Domain Drill Down – enables EOC users to drill down into lower domain Orion detail and management functions. ◦ Smart Windowing – view windows from all domains on a single display using Citrix® Xen® Client technology or equivalent. • IT Service Management / Help Desk Integration – Sentinel can create trouble tickets on any domain based on rules and policies tied to events, alerts and other IT information. • Custom Cross Domain Reporting - Sentinel can gather additional information and create customized multi domain reports. • Guard monitoring - Sentinel can provide information to the high side Orion server to monitor the health of the data guard.
  • 15. 1 5© 2013 BlueSpace Federal Corp. and SolarWinds Worldwide, LLC. All rights reserved. Smart Windowing User Experience ◦ EOC with cross domain Orion drill down on a single display ◦ Requires an AFRL SecureView 2.0 Trusted Workstation and Lower Domain Drill Down extension.
  • 16. 1 6© 2013 BlueSpace Federal Corp. and SolarWinds Worldwide, LLC. All rights reserved. SmartXD Rapidly Build Smarter Cross Domain Applications Architecture • VM in each domain • Use any data guard • Access tagged data • XD enable existing apps Common Services • Rapid development • Eliminate duplication Application Design 1. Access Data 2. Process Data 3. Communicate 4. Present Data 5. User Interaction 6. Orchestration 6 5 3 2 1 1 1 2 2 3 3 4 6
  • 17. 1 7© 2013 BlueSpace Federal Corp. and SolarWinds Worldwide, LLC. All rights reserved. SmartXD Smarter Certification, More Secure Certification Design 1. Use Guard Certifications 2. SmartXD VMs are PL2 (single domain) 3. SmartXD only transfers XML (Highly Constrained) 4. Use tagged data access certifications (CSG) Security • Leverage guard and tagged data security • Eliminate unnecessary data duplication • Eliminate risk of complex data trojans • Guard XML schema checking and dirty word scans 4 3 3 2 2 2 1
  • 18. 1 8© 2013 BlueSpace Federal Corp. and SolarWinds Worldwide, LLC. All rights reserved. Partners Integration/Reseller Technology
  • 19. 1 9© 2013 BlueSpace Federal Corp. and SolarWinds Worldwide, LLC. All rights reserved. • SolarWinds Worldwide, LLC’s trademarks, service marks, logos and copyrights are the exclusive property of SolarWinds Worldwide, LLC. For a complete list of SolarWinds trademarks, service marks, and logos, please visit www.solarwinds.com/trademarks. All other trademarks or works mentioned herein are the intellectual property of their respective companies. SolarWinds Worldwide, LLC is not affiliated with any of the respective companies.