Open Source Answer to Critical Infrastructure Security Challenges Vadim Shchepinov, Chief Executive Officer RED SOFT CORPORATION.

Slides:



Advertisements
Similar presentations
Red Soft strategy presentation and Q&A
Advertisements

The Web Wizards Guide to Freeware/Shareware Chapter Six Open Source Software.
Carlo Tarantola Senior Director EMEA Mobile and Wireless Center of Expertise Warsaw, Poland Oracle Corporation.
Firebird and compliance with security regulations Nikolay Samofatov, Chief Technology Officer RED SOFT CORPORATION.
Using Trace API to diagnose performance bottlenecks on production servers Nikolay Samofatov, Chief Technology Officer RED SOFT CORPORATION.
Challenges Facing Enterprise IT REDUCED MANAGEMENT NEW ECONOMICS INCREASED OPPORTUNITIES.
Instant Business Improvement “Managing Operational Performance”
Copyright © 2012 FuseSource Corp.. All rights reserved. 1 FuseSource Enterprise Michelle Davis – FuseSource Federal.
Metering and Licensing of Resources: Kala ’ s General Purpose Approach by Sergiu S. Simmel and Ivan Godard Review by Seung Jun Lee ABSTRACT “ This paper.
Convergence – Driving down the Cost of Enterprise IT Christoph Rau BEA Vice President, Central & Eastern Europe October 23, 2003.
© 2003 IBM Corporation Privacy 12 th CACR Workshop Yim Y. Chan Chief Privacy Officer & CIO IBM Canada Ltd. w3.ibm.com/Privacy.
Windows vs.. Linux Security A comparison A comparison.
Open Source/Free Software Source code is available Extensible Can be changed, modified Freely distributed Copies Modified versions Alternatives to commercial/proprietary.
Open Source Business Models By Mike Telmar, Jacob Jennings, and Jerome Thomas.
Key Issues in Licensing Software and Associated Intellectual Property: Matching Licensing Models to Business Strategies Steve Mutkoski Regional Director,
Linux Introduction. Overview What is Unix/Linux? History of Linux Features Supported Under Linux The future of Linux.
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Security Strategies in Linux Platforms and.
Learning Management Systems. students faculty content.
1 eclipse the open platform for tool integration.
CLOUD COMPUTING. A general term for anything that involves delivering hosted services over the Internet. And Cloud is referred to the hardware and software.
Sl.NoUnitContents 1.Unit - 1 What is Open Source?, Why Open Source? 2Unit – 2 What is Open Standard? - Why Open Standards? 3Unit – 3 Peek into history.
CHAPTER 6 OPEN SOURCE SOFTWARE AND FREE SOFTWARE
Page  1 SaaS – BUSINESS MODEL Debmalya Khan DEBMALYA KHAN.
© 2009 IBM Corporation Delivering Quality Service with IBM Service Management April 13 th, 2009.
IBM Software Group - IBM Systems Group © 2006 IBM Corporation IBM Software Group | IBM Systems Grouppage 1 Team Collaboration Software Selling Strategy.
MySQL Introduction to the MySQL products. Agenda Company Overview Open Source & MySQL Momentum Why MySQL? MySQL OEM, Community & Enterprise offerings.
IBM Governmental Programs Open Computing, Open Standards and Open Source Recommendation for Governments.
Office Management A Look from the Inside-Out Mohammad Najjar, PhD Management Science 1.
The rSmart Group Kuali Days Successful Financial System Implementation Indianapolis April 11,
Jaeki Song ISQS6337 JAVA Lecture 16 Other Issues in Java.
Benefits of a SUSE ® Subscription Insert Presenter's Name (16pt) Insert Presenter's Title (14pt) Insert Company/ (14pt)
Banking Security in a Digital Age Trevor LaFleche, IDC Financial Insights.
Open Source: the new paradigm for international digital content development? LRC '04: Open Source Localisation September 2004.
Ανοιχτό Λογισμικό & Βέλτιστες Πρακτικές Υλοποίησης Έργων Πληροφορικής σε Επιχειρήσεις Dimitris Andreadis Software Engineering Manager JBoss Application.
ETICS2 All Hands Meeting VEGA GmbH INFSOM-RI Uwe Mueller-Wilm Palermo, Oct ETICS Service Management Framework Business Objectives and “Best.
SCSC 311 Information Systems: hardware and software.
OSAF Board of Directors Meeting Open Source Applications Foundation September 19, 2002.
Open Source Software Bangladesh University of Business and Technology Nizar Saadi Dahir M.Sc. Computer Engineering Computer Center- Kufa University
1 Performing Procurement Due Diligence with an Open Source ERP?
“The APS standard is already supported by more than 100 PHP applications for everything from blogging and collaboration to content management, ecommerce.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Event Management & ITIL V3
CUTTING COMPLEXITY – SIMPLIFYING SECURITY INSERT PRESENTERS NAME HERE XXXX INSERT DATE OF EVENT HERE XXXX.
TeamCluster Project Real time project management solutions Harry Hvostov April 27, 2002.
1 CS 501 Spring 2003 CS 501: Software Engineering Lecture 7 Business Aspects of Software Engineering.
© 2005 IBM Corporation IBM Business-Centric SOA Event SOA on your terms and our expertise Operational Efficiency Achieved through People and SOA Martin.
1 Open Source Update Jerry Thode Founder and President J. Paul Group, LLC February 8, 2005.
10 May 2005UNSDI Workshop - FAO-HQ - Italy Free and Open Source Software (FOSS) & OpenSDI Jeroen Ticheler.
Powerful utilization of open source software in digital preservation, maintenance and utilization: an example of the creation of Union Catalogue of Serials.
Proprietary vs. Free/Open Source Software
Participation in OS projects: Commercial and Individual motivation.
© 2012 IBM Corporation IBM Security Systems 1 © 2012 IBM Corporation Cloud Security: Who do you trust? Martin Borrett Director of the IBM Institute for.
Office 365 is cloud- based productivity, hosted by Microsoft. Business-class Gain large, 50GB mailboxes that can send messages up to 25MB in size,
© 2007 IBM Corporation IBM Software Strategy Group IBM Google Announcement on Internet-Scale Computing (“Cloud Computing Model”) Oct 8, 2007 IBM Confidential.
PGDM/ / II Trimester/E-Business. What is supply chain management?  Supply chain management is the co- ordination of entities, activities, information.
Red Hat, Inc. The Revolution of Choice. Red Hat, Inc. Founded in 1995 –Bob Young, CEO - Co-founder –Marc Ewing, CTO - Co-founder Headquartered in Research.
© Akaza Research, LLC : 1 :: 10 Professional open source for clinical research.
OES11 / SLES11 Feature Competitive Novell Confidential.
Enterprise Linux Servers Solution Overview Kerry Kim Enterprise Linux Servers Solution Manager.
INTRO. To I.T Razan N. AlShihabi
Object Arena overview Object Arena is a premier provider of outsourced Information Technology (IT) services supporting Several Fortune 500 companies on.
Office 365 is cloud-based productivity, hosted by Microsoft.
CIM Modeling for E&U - (Short Version)
Data and database administration
Selected topic in computer science (1)
OPEN SOURCE SOLUTION FOR e-GOVERNANCE
Tailor slide to customer industry/pain points
The Obermeier Software SNMP OPC Server 3.0
WIS Strategy – WIS 2.0 Submitted by: Matteo Dell’Acqua(CBS) (Doc 5b)
Computer Services Business challenge
Presentation transcript:

Open Source Answer to Critical Infrastructure Security Challenges Vadim Shchepinov, Chief Executive Officer RED SOFT CORPORATION

Content 1.What is Open Source - New way for Software to be developed and utilized - Open Source Paradigm Timeline 2.Security Requirements and Challenges 3.Open Source answer to the security challenges 4.Database Management System is the key element of Information System Security - Open Source RDBMS – positioning within global IT 5.Red Soft - Strategy & Products & Services - Offer to European partners and clients

1.1 What is Open Source – Free software Open source is a model to develop, distribute and use software Consumer pays $ and gets software binaries for use; not source code. Traditional Licence allows to: consume, participate, contribute (report, suggest) Consumer gets software and source code without paying $ Open source Licence allows to: consume, participate, contribute (modify, distribute) SVC1 C2 $ Software Binary & source [use] [read source] [modify] [redistribute] [feedback: bug reports & fixes code] [feedback: support requests and resolution] [feedback: feature implementation code] [patches] [support] License SVC1 C2 $ Software Binary [use] [read source] [modify] [redistribute] [patches] [support] License [feedback: bug reports] [feedback: support requests] [feedback: features requests] Closed source – proprietary model Open Source Source: Accenture Open Source Business Models 2007

1.2 What is Open Source – Paradigm Timeline Sources: Optaros Open Source Catalogue 2007 & Red Soft Pioneer Age GNU/Linux V1.0 «Free» and Community Age Adoption by (Enterprise) Developers Open Source Based Business Models Commercial Open Source Adoption by the Enterprise Open Source enabled Business GNU Project GNU General Public License Free Software Foundation Today Linux V2.0 IBM commits to Linux Red Hat founded Red Hat goes public Red Hat acquires JBoss Red Hat $1 bln in revenue? IBM Linux business > $2 bln Open Source Term defined Apache Web Server V1.0 Apache Web Server V2.2 >50% of Internet SUN opens Open Office Borland opens Interbase Firebird Project Open source model matured into the viable and accepted way to produce and use software efficiently, quickly and cheaply while being not locked-in by a specific vendor

2. Security requirements and challenges IS may contain undeclared software functionality that might breach user security IS require security mechanisms and tools to be build in IS require a lot of effort and complex procedures to manage updates for security certified software IS require visibility and transparency for developers and IT teams to allow efficient development and support with high degree of security requirements fulfillment Information Systems (IS) are defined as key components of Critical Infrastructure by European Programme for Critical Infrastructure Protection (EPCIP) The security of information systems is very important and they are placed on the 3d position in the priority list of EPCIP after energy and nuclear industries Information systems security challenges are:

3. Open Source answer to Security challenges Almost impossible to introduce undeclared software functionality Direct access to code and more effective influence on the development road map to take into account forthcoming new security requirements Smooth and straightforward algorithm for security recertification of updated software Transparent and open solution By the very nature of being open Open Source model and respective products allow to build and use more secure Information Systems Very difficult to trace undeclared software functionality that might breach user security Difficult to build in the required security mechanisms and tools Management of updates for security proprietary software is very complex and effort intensive Low level of visibility, transparency and access to necessary info & support required by developers and IT teams Closed source – proprietary model Open Source

4. Database Management System is the key element of Information System security Database contains all the information in the information system - one source and storage place for all info Undeclared software functionality «kills» effectiveness of all the security mechanisms built into the other layers of information systems Database holds data and links between the data entities which allows structured security protection on different levels

4.1 Positioning of Open Source RDBMS within global IT Approx. 44% of developers is using Open Source RDBMS for development purposes Popularity and number of users grows some 25%/year. As of now it is close to the the level of commercial, enterprise RDBMS The level of discovered, security related errors in Closed Code is at least twice higher. Data about Undiscovered errors in Closed Code are not available. Source: Evans, IDC

5. Red Soft – Strategy and Products Red Soft Corporation is the preferred vendor of the secure database technology based on the Open Source model Red Data Base from Red Soft is secure Relational Database Management System (RDBMS) based on Firebird one of the best established, well-known and globally widespread open source DBMS kernels in the world Red Soft strategy is to be the Red Hat of global open source DBMS market Red Database is in process of certification of security functionality for compliance with ISO/IEC 17799:2005

5. Red Soft – Offer to European Partners and Clients All the Open Source product range starting with Red Data Base delivered and supported by European partners Off-shore programming work based on Red Soft tech stack at production facilities the Russia Support and SW development services provided to the clients directly and/or via partners Red Soft is offering its software products, services and software assembly/production facilities to companies and partners in Europe

6. Questions and Contacts RED SOFT CORPORATION Vadim Shchepinov, Chief Executive Officer Office Phone: