Protecting Intellectual Property CAD/CAM for Contractors and - - PowerPoint PPT Presentation

protecting intellectual property
SMART_READER_LITE
LIVE PREVIEW

Protecting Intellectual Property CAD/CAM for Contractors and - - PowerPoint PPT Presentation

Protecting Intellectual Property CAD/CAM for Contractors and Countries of Concern NVIDIA GTC 2015 Fred Devoir & Randall Siggers Who are we? Fred Devoir Randal Siggers Sr. Architect Solutions Architect TEXTRON TEXTRON MIS, EMCCAe,


slide-1
SLIDE 1

Protecting Intellectual Property

CAD/CAM for Contractors and Countries of Concern

NVIDIA GTC 2015

Fred Devoir & Randall Siggers

slide-2
SLIDE 2

Who are we?

2

Fred Devoir

  • Sr. Architect

TEXTRON

MIS, EMCCAe, ITILv3

Relevant VDI Experience:

  • Citrix VDI solution for NASA

International Space Station

  • Citrix HDX 3DPro development

team member on customer side NASA/Boeing

  • Citrix XenDesktop 6.5 GPU

pass-through solution for NASA Engineering Directorate at JSC.

  • Citrix XenDesktop 7.6 GRID K2

enabled vGPU solution for Bell Helicopter.

Randal Siggers

Solutions Architect TEXTRON

Relevant VDI Experience:

  • GRID enabled vSGA VMware

solution for Jacobs Engineering

  • Working with Nvidia GRID team

to validate vGPU for VMware

  • Working on GRID enabled

VMware vGPU POC for TEXTRON Tool and Test

slide-3
SLIDE 3

View Connection Servers View Composer vCenter View Security Servers Linked Clones PCoIP View Client Citrix Netscaler ICA/HDX 3DPro Citrix Reciever Microsoft Active Directory Citrix StoreFront Desktop Delivery Controller

Perimeter Boundaries

  • Ubiquitous VPN-less connections

– Security Appliances » Reduced risk » Platform agnostic » BYOD enablement » Multi-factor » FIPS 140-2

  • Data leak prevention (DLP)
  • Security policies for device pass-through

3

slide-4
SLIDE 4

Authentication & Access Control

  • Who is connecting?

– Contractors, Business Partners, Employees, Customers, etc.

  • Why are they connecting?

– Teleworkers, Sales & Marketing, Contractors, etc.

  • How are they connecting?

– Internal, External, VPN/Non-VPN

  • Where are they connecting from?

– LAN, MAN, WAN, or Internet (home country or offshore)

4

slide-5
SLIDE 5

Policy Based Restrictions

  • Credential pass-through
  • Copy & Paste (Clipboard)
  • Local disk and USB drives
  • Printing
  • Screen printing
  • Location dependencies
  • Group or role dependencies

5

slide-6
SLIDE 6

Containerized Resources

  • Physical Containers

– Storage frame targets – Network – Compute nodes

  • Logical Containers

– Storage pools and LUNs – Network VLANs and vSwitches – Compute resource VM pools and HA policies – Affinity groups and policies

6

slide-7
SLIDE 7

Application & Environment Controls

  • Windows 7+ Operating System & Active Directory

– Access based enumeration – AppLocker – Domain Local Groups – Group Policy Objects

  • Virtual Desktop Infrastructure

– Non-Persistence/random pools w/ auto rollback – Persona management – Hypervisor based virus scan introspection – Image version control/application release cycles

  • Third Party

– McAfee Application Control (SolidCore) , AppSense Environment Manager, etc.

7

slide-8
SLIDE 8

QUESTIONS

8

slide-9
SLIDE 9

Contact Us

9

Fred Devoir

  • Sr. Architect

TEXTRON

MIS, EMCCAe, ITILv3

Email: fdevoir@textron.com Twitter: @devoirf LinkedIn:

http://www.linkedin.com/in/devoir

Randal Siggers

Solutions Architect TEXTRON

Email: rsiggers@textron.com Twitter: @siggtonium LinkedIn:

http://www.linkedin.com/in/rsiggers

Thanks and Acknowledgements