protecting intellectual property
play

Protecting Intellectual Property CAD/CAM for Contractors and - PowerPoint PPT Presentation

Protecting Intellectual Property CAD/CAM for Contractors and Countries of Concern NVIDIA GTC 2015 Fred Devoir & Randall Siggers Who are we? Fred Devoir Randal Siggers Sr. Architect Solutions Architect TEXTRON TEXTRON MIS, EMCCAe,


  1. Protecting Intellectual Property CAD/CAM for Contractors and Countries of Concern NVIDIA GTC 2015 Fred Devoir & Randall Siggers

  2. Who are we? Fred Devoir Randal Siggers Sr. Architect Solutions Architect TEXTRON TEXTRON MIS, EMCCAe, ITILv3 Relevant VDI Experience: Relevant VDI Experience: • GRID enabled vSGA VMware • Citrix VDI solution for NASA solution for Jacobs Engineering International Space Station • Working with Nvidia GRID team • Citrix HDX 3DPro development to validate vGPU for VMware team member on customer side NASA/Boeing • Working on GRID enabled VMware vGPU POC for TEXTRON • Citrix XenDesktop 6.5 GPU Tool and Test pass-through solution for NASA Engineering Directorate at JSC. • Citrix XenDesktop 7.6 GRID K2 enabled vGPU solution for Bell Helicopter. 2

  3. Perimeter Boundaries • Ubiquitous VPN-less connections Linked – Security Appliances Clones » Reduced risk » Platform agnostic » BYOD enablement Microsoft Active Directory » Multi-factor View » FIPS 140-2 Composer • Data leak prevention (DLP) View Connection • Security policies for device pass-through Servers vCenter View Security Servers Citrix StoreFront PCoIP Desktop Delivery Controller Citrix View Client Netscaler ICA/HDX 3DPro Citrix Reciever 3

  4. Authentication & Access Control • Who is connecting? – Contractors, Business Partners, Employees, Customers, etc. • Why are they connecting? – Teleworkers, Sales & Marketing, Contractors, etc. • How are they connecting? – Internal, External, VPN/Non-VPN • Where are they connecting from? – LAN, MAN, WAN, or Internet (home country or offshore) 4

  5. Policy Based Restrictions • Credential pass-through • Copy & Paste (Clipboard) • Local disk and USB drives • Printing • Screen printing • Location dependencies • Group or role dependencies 5

  6. Containerized Resources • Physical Containers – Storage frame targets – Network – Compute nodes • Logical Containers – Storage pools and LUNs – Network VLANs and vSwitches – Compute resource VM pools and HA policies – Affinity groups and policies 6

  7. Application & Environment Controls • Windows 7+ Operating System & Active Directory – Access based enumeration – AppLocker – Domain Local Groups – Group Policy Objects • Virtual Desktop Infrastructure – Non-Persistence/random pools w/ auto rollback – Persona management – Hypervisor based virus scan introspection – Image version control/application release cycles • Third Party – McAfee Application Control (SolidCore) , AppSense Environment Manager, etc. 7

  8. QUESTIONS 8

  9. Contact Us Fred Devoir Randal Siggers Solutions Architect Sr. Architect TEXTRON TEXTRON MIS, EMCCAe, ITILv3 Email: fdevoir@textron.com Email: rsiggers@textron.com Twitter: @devoirf Twitter: @siggtonium LinkedIn: LinkedIn: http://www.linkedin.com/in/rsiggers http://www.linkedin.com/in/devoir Thanks and Acknowledgements 9

Recommend


More recommend