Red Soft strategy presentation and Q&A

Slides:



Advertisements
Similar presentations
Firebird and compliance with security regulations Nikolay Samofatov, Chief Technology Officer RED SOFT CORPORATION.
Advertisements

Open Source Answer to Critical Infrastructure Security Challenges Vadim Shchepinov, Chief Executive Officer RED SOFT CORPORATION.
Using Trace API to diagnose performance bottlenecks on production servers Nikolay Samofatov, Chief Technology Officer RED SOFT CORPORATION.
IBM’s Transformation to a Services Company and the Growth of Digital Trade Michael DiPaula-Coyle IBM Governmental Programs.
Making Sense out of the Information Security and Privacy Alphabet Soup in terms of Data Access A pragmatic, collaborative approach to promulgating campus-wide.
© Prentice Hall CHAPTER 15 Managing the IS Function.
USPTO Seal Patent Public Advisory Committee Meeting John B Owens II Chief Information Officer July 8, 2010.
Pakistan Services Roadmap ~ Implementation Priorities.
Notes: Update as of 1/13/2010. Vulnerabilities are included for SQL Server 2000, SQL Server 2005, SQL Server Oracle (8i, 9i, 9iR2, 10g, 10gR2,11g),
Worldox – Post Installation Support and Training Options.
U N C L A S S I F I E D LA-UR LANL Exchange / Blackberry Deployment June 2, 2009 Anil Karmel Solutions Architect Network and Infrastructure Engineering.
© 2004 Visible Systems Corporation. All rights reserved. 1 (800) 6VISIBLE Holistic View of the Enterprise Business Development Operations.
Copyrights 2002 Introduction to SAP Enterprise Portals September SAP Enterprise Portal 101 Naeem Hashmi Chief Technology Officer Information Frameworks.
1 Chapter 7 IT Infrastructures Business-Driven Technology
Chapter 10 Information Systems Management. Agenda Information Systems Department Plan the Use of IT Manage Computing Infrastructure Manage Enterprise.
WORKDAY TECHNOLOGY Stan Swete CTO - Workday 1.
Effort in hours Duration Over Weeks Or Months Inception Launch Web Lifecycle Methodology Maintenance Phases Copyright Wonderlane Studios.
Microsoft Office Sharepoint Server 2007 (MOSS) Overview Momentum Microsoft November 15, 2007.
Exchange 2010 Overview Name Title Group. What You Tell Us Communication overload Globally distributed customers and partners High cost of communications.
Presentation Speakers: Billy Herndon Angel Dronsfield May 2001 duke.
1. 2 Technology in Action Technology in Focus: Careers in IT Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Midwest Documentum User Group Harley-Davidson Documentum WCM 10/10/2006.
XML Registry and Repository for the Education Community Holly Hyland, Federal Student Aid.
Leveraging Oracle Data for Web- Based Reporting Northern California Oracle Users Group May 2001.
DAT336 SQL Server “Yukon” – The Future of Business Intelligence Jason Carlson Product Unit Manager SQL Server Microsoft Corporation Brian Welcker Microsoft.
Exploring Business 2.0 © 2012 Flat World Knowledge Chapter 15: Managing Information And Technology.
Update on SFA’s Modernization Project Steve Hawald Chief Information Officer Student Financial Assistance U.S. Department of Education “We Help Put America.
Human Resource Management Lecture 27 MGT 350. Last Lecture What is change. why do we require change. You have to be comfortable with the change before.
MIS3300_Team8 Service Aron Allen Angela Chong Cameron Sutherland Edment Thai Nakyung Kim.
ETICS2 All Hands Meeting VEGA GmbH INFSOM-RI Uwe Mueller-Wilm Palermo, Oct ETICS Service Management Framework Business Objectives and “Best.
EMI INFSO-RI SA2 - Quality Assurance Alberto Aimar (CERN) SA2 Leader EMI First EC Review 22 June 2011, Brussels.
NASA CIO Standards Activities Presentation to NASA Technical Standards Working Group June 11-12, 2007 HQ/R. Benedict.
Monograph Development Process for the European Pharmacopoeia: How to participate in the work programme of the European Pharmacopoeia Dr Claude Coune Head.
Institute for Parallel Processing Bulgarian Academy of Sciences MySQL, PHP and Apache Server in Development of Database for Scientific Research in Defence.
Building Tomorrow’s Corporate Portal David C. Hastings Director, Solutions Management
Active Directory Harikrishnan V G 18 March Presentation titlePage 2 Agenda ► Introduction – Active Directory ► Directory Service ► Benefits of Active.
Project 2003 Presentation Ben Howard 15 th July 2003.
© 2008 by Matt Flaherty & Mary Ruddy; made available under the EPL v1.0 Security & Identity : From present to future Matt Flaherty, IBM Mary Ruddy, Meristic.
Technical Packaging Manager
1. Aim of the session Policy drivers Introduction to ConsortiCo One year on…. 2.
Benchmarking Study on the Situation of the United Nations System and Development Institution Websites Results of the World Bank Conference Web for Development:
International Security Management Standards. BS ISO/IEC 17799:2005 BS ISO/IEC 27001:2005 First edition – ISO/IEC 17799:2000 Second edition ISO/IEC 17799:2005.
organization – status 2015 – scheme – integrity program – strategy
25 April Unified Cryptologic Architecture: A Framework for a Service Based Architecture Unified Cryptologic Architecture: A Framework for a Service.
High Assurance Products in IT Security Rayford B. Vaughn, Mississippi State University Presented by: Nithin Premachandran.
Case Study: Applying Authentication Technologies as Part of a HIPAA Compliance Strategy.
Why a Commercial Provider should Join the Academic Cloud Federation David Blundell Managing Director 100 Percent IT Ltd Simple, Flexible, Reliable.
Information Security tools for records managers Frank Rankin.
(OBIA) Training & Placement Program By Keen IT To request free demo session please mail us at
Technology Services – National Institute of Standards and Technology Conformity Assessment ANSI-HSSP Workshop Emergency Communications December 2, 2004.
Principles of Information Security, Fourth Edition Chapter 1 Introduction to Information Security Part II.
Feature Overview Oracle Explorer – browse and alter schema Wizards and Designers Automatic code generation PL/SQL Editor with IntelliSense Oracle Data.
OFFICE 365 APP BUILDER PROFILE: Druva
We Optimize. You Capitalize Software Development Services
Fundamentals of Information Systems, Sixth Edition
Intelligent Systems Development
People-Centric Management
So what’s OGC’s role? Understanding where to find useful information
SAP in ERP – A Bird’s Eye View
Managing the Delivery of Information Services
For Computer Society Internal Use Only
Profitability Management Logical Diagram
Enterprise Content Management Owners Representative Contract Approval
Performance Management Microsoft Office PerformancePoint Server 2007
Delivering an End-to-End Business Intelligence Solution
King Saud University College of Engineering IE – 462: “Industrial Information Systems” Fall – 2018 (1st Sem H) Chapter 2 Information System.
Eclipse Marketplace Client (MPC) Release and Graduation Review
How to build your Integrated
Red Sky Update “Watching the horizon for emerging health threats”
Strategies for Information Management
Presentation transcript:

Red Soft strategy presentation and Q&A Nikolay Samofatov, Chief Technology Officer RED SOFT CORPORATION Добрый день, Меня зовут Вадим Щепинов, я представляю здесь компанию РЕДСОФТ, работающую на рынке в концепции ПО с открытым кодом. Тема мой презентации как ПО с открытым кодом может помочь решить задачи защиты информационных систем, которые определены Европейской программой по защите критической инфраструктуры как один из ее важнейших элементов.

Situation: major organizations are using Firebird for non business-critical applications Military and special services Worldwide trend is to integrate military projects with civil products and services Public sector Policies to prefer Open Source products in many countries. Open development process requirements for critical infrastructure projects. Enterprises Large enterprises tend to fall under strict procurement rules similar to public sector СУБД один из ключевых элементов безопасности (защиты) информационной системы потому что База данных содержит всю информацию в информационной системе. Недекларированные возможности в СУБД сводят на нет работу последующих слоев защиты Присутствие в Базе данных как всех самих данных, так и связей между ними, дает возможность средствам защиты информации (СЗИ) СУБД классифицировать структуры данных для их защиты

Policies appear to be very favorable towards Open Source products in organizations. What formal criteria prevents Firebird from being used to build Tier 1 (business critical) applications? СУБД один из ключевых элементов безопасности (защиты) информационной системы потому что База данных содержит всю информацию в информационной системе. Недекларированные возможности в СУБД сводят на нет работу последующих слоев защиты Присутствие в Базе данных как всех самих данных, так и связей между ними, дает возможность средствам защиты информации (СЗИ) СУБД классифицировать структуры данных для их защиты

Procurement rules Technical requirements Security regulations compliance requirements Service level requirements On-site support for closed-circuit applications Response time requirements Organizational requirements Manufacturer Authorization Forms Warranties Cross-certification

How do we deliver against the requirements of major organizations? Partnerships Hardware makers Software developers Support organizations Own R&D effort Security Enterprise functionality Third line support Organizational support Legal Certification Project management, consulting, outsourcing services

The policy for the engine source code availability Publish source code and patches against base engine code base at the release time Collaborate with the key members of the project during specification and implementation phases We announce the functionality we work on in mailing lists and at conferences, so interested parties may join Review and submit the code for inclusion into the tree in compliance with the Firebird’s rigorous code quality standards

Unified Windows and UNIX installers Integrated packaging Red Database 2.0 features Unified Windows and UNIX installers Integrated packaging NBackup improvements Profiling API Replication, Publication, Mirroring Foundation for data warehousing and systems integration

Red Database 2.1 planned functionality SuperClassic engine architecture Security model overhaul to conform to international and country-specific security standards, e.g. ISO/IEC 17799:2005 Java and C/C++ Stored Procedures Stored Procedure debugger Full Text Search

Other Red Soft products Red Control Flexible Firebird-based knowledge management system Red Warehouse BI toolset based on Open Source technology and Firebird. Mondrian is used as the MDX engine. Red Olap Navigator GWT-based user-friendly front-end for the BI system. Source code to be open soon.

Questions and Contacts RED SOFT CORPORATION www.red-soft.biz Nikolay Samofatov, Chief Technology Officer nikolay.samofatov@red-soft.biz Office Phone: +7 495 721 35 37 Теперь я готов ответить на Ваши вопросы