protecting intellectual property
play

Protecting Intellectual Property CAD/CAM for Contractors and - PowerPoint PPT Presentation

Protecting Intellectual Property CAD/CAM for Contractors and Countries of Concern NVIDIA GTC 2015 Fred Devoir & Randall Siggers Who are we? Fred Devoir Randal Siggers Sr. Architect Solutions Architect TEXTRON TEXTRON MIS, EMCCAe,


  1. Protecting Intellectual Property CAD/CAM for Contractors and Countries of Concern NVIDIA GTC 2015 Fred Devoir & Randall Siggers

  2. Who are we? Fred Devoir Randal Siggers Sr. Architect Solutions Architect TEXTRON TEXTRON MIS, EMCCAe, ITILv3 Relevant VDI Experience: Relevant VDI Experience: • GRID enabled vSGA VMware • Citrix VDI solution for NASA solution for Jacobs Engineering International Space Station • Working with Nvidia GRID team • Citrix HDX 3DPro development to validate vGPU for VMware team member on customer side NASA/Boeing • Working on GRID enabled VMware vGPU POC for TEXTRON • Citrix XenDesktop 6.5 GPU Tool and Test pass-through solution for NASA Engineering Directorate at JSC. • Citrix XenDesktop 7.6 GRID K2 enabled vGPU solution for Bell Helicopter. 2

  3. Perimeter Boundaries • Ubiquitous VPN-less connections Linked – Security Appliances Clones » Reduced risk » Platform agnostic » BYOD enablement Microsoft Active Directory » Multi-factor View » FIPS 140-2 Composer • Data leak prevention (DLP) View Connection • Security policies for device pass-through Servers vCenter View Security Servers Citrix StoreFront PCoIP Desktop Delivery Controller Citrix View Client Netscaler ICA/HDX 3DPro Citrix Reciever 3

  4. Authentication & Access Control • Who is connecting? – Contractors, Business Partners, Employees, Customers, etc. • Why are they connecting? – Teleworkers, Sales & Marketing, Contractors, etc. • How are they connecting? – Internal, External, VPN/Non-VPN • Where are they connecting from? – LAN, MAN, WAN, or Internet (home country or offshore) 4

  5. Policy Based Restrictions • Credential pass-through • Copy & Paste (Clipboard) • Local disk and USB drives • Printing • Screen printing • Location dependencies • Group or role dependencies 5

  6. Containerized Resources • Physical Containers – Storage frame targets – Network – Compute nodes • Logical Containers – Storage pools and LUNs – Network VLANs and vSwitches – Compute resource VM pools and HA policies – Affinity groups and policies 6

  7. Application & Environment Controls • Windows 7+ Operating System & Active Directory – Access based enumeration – AppLocker – Domain Local Groups – Group Policy Objects • Virtual Desktop Infrastructure – Non-Persistence/random pools w/ auto rollback – Persona management – Hypervisor based virus scan introspection – Image version control/application release cycles • Third Party – McAfee Application Control (SolidCore) , AppSense Environment Manager, etc. 7

  8. QUESTIONS 8

  9. Contact Us Fred Devoir Randal Siggers Solutions Architect Sr. Architect TEXTRON TEXTRON MIS, EMCCAe, ITILv3 Email: fdevoir@textron.com Email: rsiggers@textron.com Twitter: @devoirf Twitter: @siggtonium LinkedIn: LinkedIn: http://www.linkedin.com/in/rsiggers http://www.linkedin.com/in/devoir Thanks and Acknowledgements 9

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend