Monday, October 25, 2010

F5 Tutorial: BIG-IP APM with SecureAuth

This video demonstrates the flexibility of BIG-IP Access Policy Manager and integration with SecureAuth, which provides two-factor authentication using SSL certificates. F5's Tony Torzillo shows how these integrate with the AD server to allow you to login to the AD server, and it will then retrieve the user's phone number and email and allow them to authenticate via a text message, voice call, or email as stored in their AD policy.  For more videos, check out F5’s YouTube channel.

BIG-IP APM with SecureAuth

ps

twitter: @psilvas

Technorati Tags: F5, infrastructure 2.0, integration, cloud connect, Pete Silva, security, business, education, technology, application delivery, intercloud, cloud, context-aware, infrastructure 2.0, automation, web, internet

Friday, October 22, 2010

Audio White Paper: Optimize and Accelerate Applications across the WAN

Although networks have improved over time, application traffic has increased at an alarming rate. Bandwidth-efficient client server applications have been replaced with bandwidth-demanding web applications, which can put a strain on your infrastructure.  Where previous-generation client server transactions involved tens of kilobytes of data, rich web-based portal applications can transfer hundreds of kilobytes per transaction—and with the explosion of social media and video, megabytes per transaction is not uncommon.  This bandwidth-hungry society, in which people often watch videos right on their mobile devices, can have both a financial and technical effect on the infrastructure needed to deliver such large pieces of content.  Maximize your network and application delivery with WAN optimization.  Running Time: 20:50  Read full white paper here.  And click here for more F5 Audio.

ps

twitter: @psilvas

Technorati Tags: F5, infrastructure 2.0, integration, cloud connect, Pete Silva, security, business, education, technology, application delivery, intercloud, cloud, context-aware, infrastructure 2.0, automation, web, internet

Posted via email from psilva's prophecies

Tuesday, October 19, 2010

The New Certificate 2048 My Performance

SSL is a cryptographic protocol used to secure communications over the internet.  SSL ensures secure end-to-end transmission and is implemented in every Web browser.  It can also be used to secure email, instant messaging and VoIP sessions.  The encryption and decryption of SSL is computationally intensive and can put a strain on server resources like CPU.  Currently, most server SSL Certificates are 1024-bit key length and the National Institute of Standards and Technology (NIST) is recommending a transition to 2048-bit key lengths by Jan 1st 2011.

SSL and its brethren, TLS (Transport Layer Security) provide the security and encryption necessary for secure communications over the internet, and particularly for creating an encrypted link between the browser and web server.  You will see ‘https’ in your browser address bar when visiting a site that is SSL enabled.  The strength of SSL is tied to the size of the Public Key Infrastructure (PKI) key.  Key length or key size (1024 bit, 2048 bit, 4092 bit) is measured in bits and typically used to indicate the strength of the encryption algorithm; the longer the key length, the harder it is decode.  In order to enable an SSL connection, the server needs to have a digital certificate installed.  If you have multiple servers, each requiring SSL, then each server must have a digital certificate.

image
Transactions handled over SSL can require substantial computational power to establish the connection (handshake) and then to encrypt and decrypt the transferred data.  If you need the same performance as non-secured data, then additional computing power (CPU) is needed.  SSL processing can be up to 5 times more computationally expensive than clear text to have the same level of performance, no matter which vendor is providing the hardware.  This can have significant, detrimental ramifications to server performance.  SSL Offload takes much of that computing burden off the servers and places it on dedicated SSL hardware.  SSL offload allows organizations to migrate 100% of their communications to SSL for greater security, consolidation of certificates, centralized management, and reduction of cost and allows for selective content encryption & encrypted cookies along with the ability to inspect and modify encrypted traffic.  SSL offloading can relieve the Web server of the processing burden of encrypting and/or decrypting traffic sent via SSL.

Customers, vendors and the industry as a whole will soon face the challenge of what to do regarding their SSL strategy.  Those who have valid 1024-bit certificates need to understand the ramifications of the switch and that next time they go to renew their certificates, they will be forced to buy 2048-bit certificates.  This will drastically affect their SSL capacity on both the servers and the load balancer.  There is a significant increase in needed computational power going from 1024-bit to 2048-bit and an exponential drop off in performance when doubling key sizes regardless of the platform or vendor.  Most CAs, like Entrust have already stopped issuing 1024-bit certificates, and Verisign will stop doing so in 4-5 months. Since many certificate vendors are now only issuing 2048-bit certificates, customers might not understand the potential SSL performance capacity.  The overall performance impact of 2048-bit keys on the servers if you don’t offload will increase significantly.  This can be a challenge when you have hundreds of servers providing content

Existing certificates issued with 1024-bit encryption will not stop working.  If you still have valid certificates but need to ensure you are delivering 2048-bit certificates to users (or due to regulatory requirements), one option, as mentioned in Lori’s blog, is to install the 2048-bit certificate on your BIG-IP LTM for the off-load performance capabilities and then use your existing 1024-bit keys from BIG-IP LTM to the back-end server farm.  Simply import the server certificates directly into BIG-IP.  This means that the SSL Certificates that would normally go on each server can be centrally stored and managed by LTM, thereby reducing the cost of the certificates needed as well as the cost for any specialized server software/hardware required.  This keeps the load off the servers, potentially eliminating any performance issues and allows you to stay current with NIST guidelines while still providing an end to end SSL connection for your web applications.  This is a huge advantage over commodity hardware with no SSL offload capabilities.  BIG-IP LTM has specialized SSL chips which are dedicated and optimized for SSL encryption and decryption.  These chips provide the ability to maintain performance levels even at longer key lengths, whereas in commodity hardware the computational load of SSL decreases the overall system performance impacting user experience and other server tasks.
image_thumb_6

The F5 SSL Acceleration Module removes all the bottlenecks for secure, wire-speed processing, including concurrent users, bulk throughput, and new transactions per second along with supporting certificates up to 4092-bits.  The fully loaded F5 VIPRION chassis is the most powerful SSL-offloading engine on the market today and, along with the BIG-IP LTM Virtual Edition (VE), provides a powerful solution to the SSL challenge.  By front-ending BIG-IP VE farms with a VIPRION, you can assign load balancing or SSL offloading to a dedicated ADC.  The same approach can remedy access to legacy systems that might not support 2048-bit certificates or cannot be upgraded due to business restrictions or other rationale.  By deploying an F5 BIG-IP device with 2048k certificate in front of the legacy systems, back-end encryption can be accomplished using existing 1024-bit certificates.  F5 does support 4096-bit keys, future-proofing support for longer keys down the road and offers backwards and forwards compatibility but unless there is a strong business case, 2048-bit keys are recommended for optimal performance and protection.

ps

Related:
Digg This

Wednesday, October 13, 2010

Now ReTweet After Me! Ah, Never Mind.

There is some interesting research over on Sysomos Inc. which indicates that 71% of twitter messages get no reaction at all, like a reply or retweet, 85% get one @reply and 92% of the actual retweets happen within the first hour.  Over the last two months, they examined 1.2 Billion tweets and found that 29% beget a reaction and only 6% were retweets.  Heck, even my tweet about the story only got 1 click according to http://j.mp:

twitter stats

While many will take this as and argue that twitter is useless, but Tom Webster at BrandSavant has a different take in this blog.  He notes that measuring click-stream data alone will never give accurate results, you need to measure both online and offline exploration to gauge audience participation.  We already know that most people don’t really engage on twitter and Tom makes the comparison to a newspaper editorial page.  You can’t measure the circulation of the New York Times just by how many people write letters.  His follow up blog also looked at it another way – instead of 71% not responding, how about ‘Nearly 3 in 10 Tweets Provoke a Reaction.’  That actually sounds better and depending on the number of followers, could be a huge number.

The other question is not necessarily how many responded to your company’s tweet – but do you watch and listen to what’s being said about YOU – which is probably one of the biggest benefits of micro-blogging.  You can engage your audience by responding to their needs rather than blasting what you think they need.  Quickly responding to a dissatisfied customer (who may not follow you at all) can transform them into a huge advocate.  We’ve seen that here.  Someone might be having difficulties with a configuration or simply expressing frustration and we either provide some guidance or a link to the solution and voila!  Their next tweet is about how awesome we are.  That’s how we humans operate.  It’s not so much that we get what we want when things go bad, it’s that someone actually listened and had empathy to our situation.  We gravitate to those who care, are willing to help, or just lend an ear to our grief. 

This NYT article talks about small businesses can take advantage of twitter.  Many small businesses don’t have a lot to spend on advertising and their inventory may change often.  They can use twitter to update their customers about new flavors, colors or a weekend sale for free.  The key is not to be boring.  With any advertising, you need to stand out amongst all the other billboards fighting for our attention.  Add a touch of attitude without arrogance and folks will notice.  Interesting and entertaining.

Other ways to take advantage of the medium is use it like a live FAQ as Whole Foods does.  Use it as a portable focus group like Kiss My Bundt.  Don’t just sell but pique interest or arouse curiosity and include a link.  Throw some trivia out there.  Create the intimacy as if you’re the neighborhood corner store.  The age-old notion that people buy from people still holds. 

ps

Related:

Technorati Tags: F5, infrastructure 2.0, integration, cloud computing, Pete Silva, security, business, education, technology, application delivery, cloud, context-aware, infrastructure 2.0, web, internet

twitter: @psilvas

Digg This

Monday, October 11, 2010

CloudFucius Closes This Cloud Canon

Konfuzius-1770 Well, this is the 27th entry (26 not counting the intro) in the CloudFucius Series and what an interesting ride!  What started out as a cloud version of the 26 Short Topics about Security series, soon turned into an exploration of the numerous cloud computing surveys, reports, statistics and other feelings about the technology.  I also intended to investigate areas of cloud computing that I was not so familiar with and there were a few areas that I was able to dig further – like Radio and the NFL.  Readers really seemed to like the ‘CloudFucius’ notion and while this is the last of this series, CloudFucius is not retired.  We’ll bring him back from time to time to help decipher some of those cloud surveys.  Another interesting tid-bit is that a few weeks into the series, someone from the Pacific Northwest actually created a twitter handle @cloudfucius.  It wasn’t me but I had great interest in that, as you can imagine.  I tried contacting them several times and then within the last week or so, the account disappeared.  If you are out there, give me a shout!!  Lastly, I included a real Confucius quote in each entry since his words seem to resonate when it comes to cloud computing.

What did I learn?  While I would notice various cloud surveys during my weekly perusal of the internet, I didn’t realize that there are/were so many, so frequently.  Some weeks, literally 4-5 surveys would be released covering some aspect of cloud computing – adoption, budget, compliance, deployment, effectiveness, fears, guests, hijacking, insiders, justification, PKI, litigation, management, networks, open standards, public vs. private, questions, reliability, social media, IPv6, user experience, virtualization, gaming, control, vendors and security just to name 26.  Security is cited as the biggest hurdle in almost 90% of the surveys but I also found that availability, control and a general lack of understanding are also drivers in challenges to cloud adoption.  I also wondered if ‘security’ is the real culprit or are IT professionals just answering with that to keep the assets in-house and under their control.  I bet a little of both.  The ease of shoving stuff to the cloud has made anyone with a office cube an instant IT administrator.  That has brought challenges too.  Those who have touched the clouds, clearly see and recognize the benefits and continue to move more assets to the cloud.  Those who haven’t, are hesitant or risk averse.  And then there’s the group who are either testing or investigating ways to take advantage of the flexibility, scalability, cost savings and agility.

This final entry wouldn’t be complete without some reporting on the most recent cloud surveys.  Hubspan reported that 64% said that 'moving to the cloud for applications, infrastructure, integration and other solutions is a strategic direction for their organization and department.'  Main reasons for not moving to the cloud are lack of understanding the benefits and IT having their own way of doing things.  Finally some honesty.

CA Technologies recently found in their Mainframe - The Ultimate Cloud Platform? survey that '79% of IT organizations consider the mainframe to be an essential component of their cloud computing strategy.'  The kicker is that they are having trouble finding and retaining skilled mainframe professionals.  44% of surveyed companies said they are "grappling" with staffing issues to manage and maintain their production systems.
A new TechTarget survey of more than 800 IT pros found that SMBs are not convinced that Private Clouds are beneficial.  Virtualization Decisions 2010 survey shows that while large organizations might be building and experimenting with cloud technologies, almost two-thirds  said they have no plans to try the private cloud model.  They have enough to do and with smaller budgets, they don’t have the luxury of experimenting with  new technologies.  Also, unlike most surveys, security was not the major barrier.  The number 1 reason was that they really didn't need a couple key components – metered usage and department chargeback – 35% said so.  Complexity and skilled staff also keep them from adopting.

And just to magnify the TechTarget survey, a new Harris Interactive poll of more than 200 IT pros at large enterprises indicates a 'much broader adoption of cloud computing, and shows accelerating momentum behind developing private cloud infrastructures.'  89% said that private clouds are the next logical step for organizations already implementing virtualization.  With this one, we’re also back to citing Security as the main barrier – 91% are concerned about security issues in the public cloud, with 50 percent indicating security as the primary barrier to implementation.

So the survey results are in and more will arrive this week, next week, next month and into the foreseeable future as long as there are questions surrounding the cloud.  I do think I covered a good portion of the survey data available over the last couple months so if you need to research cloud statistics or if you missed any CloudFucius columns, here they are in order:

The CloudFucius Series
And one from Confucius: The superior man, when resting in safety, does not forget that danger may come. When in a state of security he does not forget the possibility of ruin. When all is orderly, he does not forget that disorder may come. Thus his person is not endangered, and his States and all their clans are preserved.

ps

The CloudFucius Series: Intro, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25

Resources:
Technorati Tags: F5, infrastructure 2.0, integration, cloud computing, Pete Silva, security, business, education, technology, application delivery, cloud, context-aware, infrastructure 2.0, web, internet
twitter: @psilvas
Digg This

Tuesday, October 5, 2010

CloudFucius Has: Déjà Vu and Amnesia…

Konfuzius-1770 …at the same time!  Wow, faster than you can mutter, ‘Survey Says…’ more cloud computing survey results appear.  Just last week, CloudFucius reported on 4 cloud surveys which confirmed the trend of our Love/Hate Relationship with the cloud.  Before the week was over, a couple more surveys reiterated our feelings toward cloud computing.  We love it since it helps IT with cost control, yet we’re still very cautious about deployments due to the concerns about security and control. 

The results of the Eighth Annual Global Information Security Survey were released last week and once again the theme is, ‘we see the value and understand the benefits but still scared about the provider’s ability to secure critical data and IT’s ability to control access to that data.  CSO, CIO and PriceWaterhouseCoopers surveyed 12,847 technology and business executives from around the world and 62% of you have little or no confidence in your ability to secure any data in the cloud.  49% have ventured into the cloud but of those, 39% still have major questions about cloud security.  Sounds familiar huh?  The greatest risk to their own (your own) cloud computing strategy is the ability to enforce security policies at the cloud provider’s site.  Inadequate knowledge/training and IT auditing also made the list.  If you remember the PhoneFactor survey from last week, the biggest security concern was preventing unauthorized access to company data.  Enforce security policy and prevent unauthorized access is almost the same thing.  Enforcing a security policy should prevent unauthorized access.  There needs to be more specific guidelines as to what types of data are acceptable for the cloud along with how to handle regulatory reporting of data in the cloud.

The CSO survey also found security concerns in regards to ‘third parties’.   There is a concern about cloud vendors who use third parties to host data centers and hardware along with serious fears about our third party business partners.  The vendor issue has to do with not knowing any of the people hired to work on your systems; with partners, many organizations are concerned that their own security is at risk if their associate’s or partner’s security has taken a hit over the last year.  77% felt that their strategic partners had been weakened by the recession over the last year.  If you remember Verizon  Business' "2009 Data Breach Investigations Report (pdf)" 32% of the data breaches implicated a business partner and in fact, the majority was due to lax security practices at the connection level from the third-party.  In 2009, it was usually the third-party systems that were compromised and the attacker used the trusted connection to make inroads to the target.  Since it’s coming from a ‘trusted’ authorized connection, these are difficult to detect and stop.  The more things change, the more they stay the same.

Speaking of surveys, Lauren Carlson, a CRM Market Analyst asked me to share her short survey with you.  Software Advice, a company that reviews CRM software, is conducting a survey on their blog to see who the real leader is in CRM.

And one from Confucius: Ignorance is the night of the mind, but a night without moon and star.

ps

The CloudFucius Series: Intro, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24

Resources:

Technorati Tags: F5, infrastructure 2.0, integration, cloud computing, Pete Silva, security, business, education, technology, application delivery, cloud, context-aware, infrastructure 2.0, web, internet

twitter: @psilvas
Digg This

Monday, October 4, 2010

Orbital Sciences Corporation Case Study - F5 Networks

One of the world's leading space technology companies, Orbital Sciences Corporation has pioneered new classes of rockets, satellites, and other technologies that help make the benefits of space more affordable, accessible, and useful to millions of people on Earth.

Watch this interview with Orbital Sciences Senior Director, Information Services, Tom Hall and Senior IS Manager, Bryan Pretre to learn how implementing F5 ARX helped the organization boost operational efficiencies, minimize disruptive downtime and significantly reduce overall storage costs. As the business has grown, its use of complex engineering applications and the need to keep increasing amounts of data accessible for up to 20 years was pushing its storage environment to the limit.  Printed case study can be found here (pdf).

ps

Technorati Tags: F5, integration, security, business, education, technology, application delivery, storage

twitter: @psilvas

Digg This

Friday, October 1, 2010

F5 Access Policy Manager & Oracle Access Manager Integration - Part 1

A couple days ago, I posted the F5 BIG-IP Access Policy Manager and Oracle Access Manager Integration demo video created by Chris Akker and narrated by Chris Manley – who does a great job, by the way.  That was actually Part 2 of a longer video and was edited to show the actual admin GUI steps required to configure the BIG-IP Access Policy Manager for Oracle Access Manager integration on the BIG-IP.  This video, Part 1, helps you understand the basics of both APM and OAM and the details of how Access Policy Manager and Oracle Access Manager are integrated.  After this, (if you haven’t already) proceed to F5 BIG-IP Access Policy Manager and Oracle Access Manager Integration Part 2.  :-)

ps

Technorati Tags: F5, infrastructure 2.0, integration, Pete Silva, security, business, education, technology, application delivery, cloud, virtualization, oracle, oow

twitter: @psilvas

Digg This