Slide 1 CFEngine. Slide 2 Confidential Quotes “ ” CFEngine offers a highly scalable approach with a pull-based, distributed architecture. “ ” CFEngine.

Slides:



Advertisements
Similar presentations
Windows Server Deployment and Management With System Center.
Advertisements

What’s New: Windows Server 2012 R2 Tim Vander Kooi Systems Architect
Chapter 22: Cloud Computing and Related Security Issues Guide to Computer Network Security.
An Approach to Secure Cloud Computing Architectures By Y. Serge Joseph FAU security Group February 24th, 2011.
1 Security on OpenStack 11/7/2013 Brian Chong – Global Technology Strategist.
What’s New in BMC ProactiveNet 9.5?
The Business Value of CA Solutions Ovidiu VALEANU Senior Consultant DNA Software – CA Regional Representative.
BETA!BETA! Building a secure private cloud on Microsoft technologies Private cloud security concerns Security & compliance in a Microsoft private cloud.
Leaders Have Vision™ visionsolutions.com 1 Double-Take for Hyper-V Overview.
Configurations Management System Chris Boyd.  Time consuming task of provisioning a number of systems with STIG compliance  Managing a number of systems.
Powerful and Effective Virtualization Management for Vmware and Hyper-V Chris Henley Product Strategy Specialist
Duncan Fraiser, Adam Gambrell, Lisa Schalk, Emily Williams
Cloud Attributes Business Challenges Influence Your IT Solutions Business to IT Conversation Microsoft is Changing too Supporting System Center In House.
Hyper-V High-Availability & Mobility: Designing the Infrastructure for Your Private Cloud Symon Perriman Technical Evangelist Microsoft
Cloud Computing How secure is it? Author: Marziyeh Arabnejad Revised/Edited: James Childress April 2014 Tandy School of Computer Science.
CERN IT Department CH-1211 Genève 23 Switzerland t Next generation of virtual infrastructure with Hyper-V Michal Kwiatek, Juraj Sucik, Rafal.
TECHNOLOGY GUIDE 3: Emerging Types of Enterprise Computing
Agentless Security for Windows Server 2012, Windows Server 2012 R2, System Center VMM, Hyper-V and Windows 8 ISV Partner Alliance Value.
Hands-On Microsoft Windows Server 2008
CLOUD COMPUTING  IT is a service provider which provides information.  IT allows the employees to work remotely  IT is a on demand network access.
User Manager Pro Suite Taking Control of Your Systems Joe Vachon Sales Engineer November 8, 2007.
With the Help of the Microsoft Azure Platform, Awingu’s Web-Based Workspace Aggregator Enables Concrete and Easy Mobility Scenarios MICROSOFT AZURE ISV.
Netwrix product briefing n4.0 Unified Auditing for Critical IT Systems.
Keeping Things Simple Is Harder Than You Think Brad Hannah – Manager, Systems and Storage ITServices - Queen’s University April 28 th 2014
CensorNet Desktop Surveillance Description, Target audience, Positioning Components, Features
 Cloud computing is the use of computing resources (hardware and software) that are delivered as a service over a network (typically the Internet). 
PowerOneData’s GENII Leverages Cloud Platform to Deliver Affordable, Scalable, and Accessible Meter Data Management Software to Customers COMPANY PROFILE:
Conferencing & Enterprise ROI Randy Knaub Director of Marketing.
©2015 EarthLink. All rights reserved. Private Cloud Hosting Create Your Own Private IT Environment.
[INSERT COMPANY NAME] DISASTER RECOVERY SERVICES [Insert Date]
Module 6: Deploying and Managing Software by Using Group Policy.
Private Cloud Hosting. IT Business Challenges I need to extend my on-premises virtualized environment to utilize the Cloud and manage the entire environment.
VMware vSphere Configuration and Management v6
© 2008 IBM Corporation AIX Workload Partion Manger.
Security fundamentals Topic 2 Establishing and maintaining baseline security.
SQL Server 2008 R2 Manageability. Challenges facing database administrators today: Scaling management to multiple data centers Proactively monitoring.
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 1 Automate your way to.
Module 6: Configuring User Environments Using Group Policies.
Microsoft Azure and DataStax: Start Anywhere and Scale to Any Size in the Cloud, On- Premises, or Both with a Leading Distributed Database MICROSOFT AZURE.
Flight is a SaaS Solution that Accelerates the Secure Transfer of Large Files and Data Sets Into and Out of Microsoft Azure Blob Storage MICROSOFT AZURE.
BladeLogic Demo. 03/10/09 BladeLogic Demo BladeLogic Who? Automation taking my job? What? No, it’s making it easier. Started by entrepreneurs who understood.
1© Copyright 2015 EMC Corporation. All rights reserved. FEDERATION ENTERPRISE HYBRID CLOUD OPERATION SERVICES FULL RANGE OF SERVICES TO ASSIST YOUR STAFF.
C C Introduction to Tivoli Endpoint Manager 8.2 Joe Saylor Tivoli Endpoint Manager Solutions Architect.
Dell SonicWALL Security Series 2/14. Confidential 2 Dell SonicWALL Security solutions Product overview Agenda About threats Protecting.
Avaya - Proprietary. Use pursuant to your signed agreement or Avaya policy. 1 IP Office Support Services Customer Benefits.
© 2014 VMware Inc. All rights reserved. Cloud Archive for vCloud ® Air™ High-level Overview August, 2015 Date.
Copyright © New Signature Who we are: Focused on consistently delivering great customer experiences. What we do: We help you transform your business.
High-Availability MySQL with DR:BD and Heartbeat: MTV Japan mobile services ©2008 MTV Networks Japan K.K.
Red Hat Enterprise Linux Presenter name Title, Red Hat Date.
Cofax Scalability Document Version Scaling Cofax in General The scalability of Cofax is directly related to the system software, hardware and network.
GameChanger’s Rate Quote Issue Solution is Deployed to Microsoft Azure for a Fast, Flexible Direct to Consumer Insurance Sales Solution MICROSOFT AZURE.
Brian Lauge Pedersen Senior DataCenter Technology Specialist Microsoft Danmark.
Overview – SOE Cfengine v3.4.0
Azure Site Recovery For Hyper-V, VMware, and Physical Environments
Understanding The Cloud
Overview – SOE Cfengine v3.6.5
What is Cloud Computing - How cloud computing help your Business?
2016 Citrix presentation.
IBM Software Group | Tivoli Brand Software
VIDIZMO Deployment Options
Protect | Transform | Innovate
Today’s Business Pain Points
Smart Team Making a Beautiful software
Microsoft Virtual Academy
Security Information and Event Management (SIEM) Solution Runs on Microsoft Azure Power “We are so happy to be using Microsoft Azure to make our security.
AWS Cloud Computing Masaki.
Cloud Computing Architecture
Systems Management Privilege Management User Migration.
Features Overview.
Presentation transcript:

Slide 1 CFEngine

Slide 2 Confidential Quotes “ ” CFEngine offers a highly scalable approach with a pull-based, distributed architecture. “ ” CFEngine is different from its competitors because it is pull-based only. “ ” CFEngine has a large installed base in its community version (over 10,000 enterprises).

Slide 3 Confidential CFEngine at a Glance Massive Adoption o >10,000,000 Servers o >10,000 Companies o >100 Countries We Help IT-organizations: o Roll out Changes Quickly o Ensure Changes remain in compliance o Focus on agility and cost The Company: o Offices in Europe and USA o Venture Backed, Solid Financials Solid Technology o 20 year record of Security- FIPS Compliant o 200K Server-installation servers per hub o Fault-tolerant and self-healing

Slide 4 Confidential Users and customers of CFEngine

Slide 5 Confidential Increase business value through Automation We help IT-organizations become more agile while reducing costs Productivity Costs Security Global changes in minutes Unlimited scale and complexity Remove human bottlenecks Reduced need for labor Reduced costs related to instability/outages Reduced license costs Billions of compliance checks per day Real-time compliance repairs Granular and pattern based

Slide 6 Confidential Build new nodes: PXE boot & Kickstart, VMs, Cloud Deploy software (package manager) Manage local passwords Manage network settings Manage services (start, stop, disable) Manage applications (verify, start, stop) Manage permissions (ACLs) File change management (change detection, file diff) Manage database and registries Manage hypervisors and virtual guests Manage black-, grey- and white-lists Manage configuration settings Create compliance reports Monitor overall performance CFEngine – Low-level examples BUILD MANAGE AUDIT DEPLOY POLICY

Slide 7 Confidential CFEngine – high level illustration 1. Describe Desired State of IT-Services 2. Ensure Desired State State DB 3. Verify Actual State of IT-Services Policy Hub State DB Design Center Knowledge Center CFE Agents

Slide 8 Confidential Continuous maintenance is needed Examples:  NIC fixes 2,23% hosts repaired last 24 hrs.  AIX group exists 3.00% hosts repaired last 24 hrs.  NTP 1.39% hosts repaired last 24 hrs.  Tivoli Processes1.08% hosts repaired last 24 hrs. “70% - 80% of outages are caused by unplanned and manual changes”, How many unplanned changes did you experience the last 24 hours? Total repairs on 4K hosts in one week: 367,433 > 2,3 billion checks daily > 0,5% settings change > 50 S.As to fix drift

Slide 9 Confidential CFEngine 3 Enterprise o High-Availability (Agents fail-over & Hub replica) o Highly Scalable (5,000 Agents per Hub, Horizontal Hub scaling) o Highly Secure (20 years with outstanding security record) o Extremely Cheap on Resources (CPU, Memory, Network traffic) o Easy to maintain (few dependencies, automatic updates) o Saving money when used in the Cloud (due to less resource consumption) o Lightning fast (1-2 seconds, updates 4,000 servers in less than 1 minute) o Best at Complexity (superior granular modeling capabilities) o Granular Reporting (flexible filtering & powerful data aggregation capabilities) What we do really well

Slide 10 Appendix