Presentation is loading. Please wait.

Presentation is loading. Please wait.

High-Performance Applications in a Secure Environment Michael Tepedino.

Similar presentations


Presentation on theme: "High-Performance Applications in a Secure Environment Michael Tepedino."— Presentation transcript:

1 High-Performance Applications in a Secure Environment Michael Tepedino

2 Why are we here? Large Amounts of Bandwidth Large Amounts of Bandwidth University Partnerships University Partnerships Sharing Lessons & Knowledge Sharing Lessons & Knowledge Being Ready for the Next Big Thing Being Ready for the Next Big Thing Moving Technology into Production Faster Moving Technology into Production Faster

3 Hurdles for High Performance Applications Networks Networks High Latency High Latency High Bandwidth High Bandwidth Public Accessibility Public Accessibility TCP TCP Security / Encryption Security / Encryption Data Speeds Data Speeds

4 The Corporate Perspective Looking for the common ground – Not Looking to Push the Newest Technology Looking for the common ground – Not Looking to Push the Newest Technology Global Differences – MAN’s, LAN’s & WAN’s Global Differences – MAN’s, LAN’s & WAN’s Applications – Run the Business Applications – Run the Business SECURITY – SECURITY – SECURITY SECURITY – SECURITY – SECURITY How do We Apply Lessons Learned How do We Apply Lessons Learned

5 Why Have a Secure Environment? Intellectual Property Intellectual Property Hackers Hackers DoS DoS Viruses Viruses Disaster Recovery Disaster Recovery Secured Communications Secured Communications

6 How do we decide what to secure? Corporate Policies Corporate Policies Specific Tunnels for Internal Research Test vs. External Tests with Partners Specific Tunnels for Internal Research Test vs. External Tests with Partners What is the Data Being Used For What is the Data Being Used For

7 Securing the Network VPN Tunnels VPN Tunnels Internet2 Public Access Internet2 Public Access Multiple sites Multiple sites Firewalls Firewalls Hardware Hardware Things to watch for Things to watch for Monitoring Monitoring Being Proactive Being Proactive

8 VPN Tunnels Secure vs. Open Ended Secure vs. Open Ended Latency Latency Protocol Dependent Protocol Dependent Design is Very Important ! Design is Very Important !

9 Public Internet2 Access Convenience? Convenience? True Life Testing True Life Testing A Very Real Scenario Needed A Very Real Scenario Needed

10 Firewalls Hardware Hardware How to Choose How to Choose Differences Differences Things to Watch for Things to Watch for Avoidance is the Best Solution Avoidance is the Best Solution

11 Thank You mtepedin@ncsus.jnj.com


Download ppt "High-Performance Applications in a Secure Environment Michael Tepedino."

Similar presentations


Ads by Google