Protecting Intellectual Property CAD/CAM for Contractors and Countries of Concern NVIDIA GTC 2015 Fred Devoir & Randall Siggers
Who are we? Fred Devoir Randal Siggers Sr. Architect Solutions Architect TEXTRON TEXTRON MIS, EMCCAe, ITILv3 Relevant VDI Experience: Relevant VDI Experience: • GRID enabled vSGA VMware • Citrix VDI solution for NASA solution for Jacobs Engineering International Space Station • Working with Nvidia GRID team • Citrix HDX 3DPro development to validate vGPU for VMware team member on customer side NASA/Boeing • Working on GRID enabled VMware vGPU POC for TEXTRON • Citrix XenDesktop 6.5 GPU Tool and Test pass-through solution for NASA Engineering Directorate at JSC. • Citrix XenDesktop 7.6 GRID K2 enabled vGPU solution for Bell Helicopter. 2
Perimeter Boundaries • Ubiquitous VPN-less connections Linked – Security Appliances Clones » Reduced risk » Platform agnostic » BYOD enablement Microsoft Active Directory » Multi-factor View » FIPS 140-2 Composer • Data leak prevention (DLP) View Connection • Security policies for device pass-through Servers vCenter View Security Servers Citrix StoreFront PCoIP Desktop Delivery Controller Citrix View Client Netscaler ICA/HDX 3DPro Citrix Reciever 3
Authentication & Access Control • Who is connecting? – Contractors, Business Partners, Employees, Customers, etc. • Why are they connecting? – Teleworkers, Sales & Marketing, Contractors, etc. • How are they connecting? – Internal, External, VPN/Non-VPN • Where are they connecting from? – LAN, MAN, WAN, or Internet (home country or offshore) 4
Policy Based Restrictions • Credential pass-through • Copy & Paste (Clipboard) • Local disk and USB drives • Printing • Screen printing • Location dependencies • Group or role dependencies 5
Containerized Resources • Physical Containers – Storage frame targets – Network – Compute nodes • Logical Containers – Storage pools and LUNs – Network VLANs and vSwitches – Compute resource VM pools and HA policies – Affinity groups and policies 6
Application & Environment Controls • Windows 7+ Operating System & Active Directory – Access based enumeration – AppLocker – Domain Local Groups – Group Policy Objects • Virtual Desktop Infrastructure – Non-Persistence/random pools w/ auto rollback – Persona management – Hypervisor based virus scan introspection – Image version control/application release cycles • Third Party – McAfee Application Control (SolidCore) , AppSense Environment Manager, etc. 7
QUESTIONS 8
Contact Us Fred Devoir Randal Siggers Solutions Architect Sr. Architect TEXTRON TEXTRON MIS, EMCCAe, ITILv3 Email: fdevoir@textron.com Email: rsiggers@textron.com Twitter: @devoirf Twitter: @siggtonium LinkedIn: LinkedIn: http://www.linkedin.com/in/rsiggers http://www.linkedin.com/in/devoir Thanks and Acknowledgements 9
Recommend
More recommend