Académique Documents
Professionnel Documents
Culture Documents
http://www.8KMiles.com
Discussion Areas
Background
Cloud Engineering and Migration Services
8KMiles AWS Security Framework
8KMiles Mobile Collaboration Solution
Technology Partnership Discussion
Assess
Operate
PublicTarget
Sector/SLED
Servic
Customers
Commercial
es
Enterprises
SaaS Solution
Providers
Managed Service
rs Providers
e
n
r
a
P
On-board
Deploy
VPC
Migration Strategy
Select apps
Test platform
Plan migration
Plan
Deplo
y
Set Up Infrastructure
Migrate
data/components
Cutover
Embrace AWS
Services
Re-factor
Optimiz
architecture
NAT
Interne
Interne
tt
Router
VPN
Gateway
Secure VPN
Connection over
the Internet
VPC
Amazon Classic
Web Services
Cloud
Customers
Network
5
HIPAA
FedRamp/FISMA
PCI
SOC
Application Layer
Management Layer
Application Layer
Management Layer
Remote
Remote access:
access: SSL,
SSL,
IPsec,
iPhone/iPad/Cisco
IPsec, iPhone/iPad/Cisco
VPN
VPN client
client support
support
Leverages pay-per-use
and elastic Amazon Web
Services infrastructure to
deliver secure and highly
available collaboration
solution
Zero
Zero trust
trust controls
controls to
to
support
improved
security
support improved security
and
and compliance
compliance
Intrusion
Intrusion protection
protection
using
deep
using deep packet
packet
inspection
inspection
Flood
Flood protection
protection using
using
DoS,
DDoS,
DoS, DDoS, and
and
PortScan
PortScan blocking
blocking
Site-to-site
Site-to-site VPN:
VPN: SSL,
SSL,
IPSec,
256-bit
IPSec, 256-bit AES,
AES, PFS,
PFS,
RSA,
X.509
certificates,
RSA, X.509 certificates,
and
and pre-shared
pre-shared key
key
Browser-based
Browser-based HTML5
HTML5
VPN
portal
requires
VPN portal requires no
no
plugins
or
ActiveX
for
plugins or ActiveX for
access
access to
to remote
remote
desktop,
SSH,
desktop, SSH, and
and other
other
programs
programs
9
Unified
Unified Policy
Policy
Management
Management provides
provides
clarity
regarding
clarity regarding which
which
controls
are
in
place
controls are in place and
and
for
whom,
and
reduces
for whom, and reduces
TCO
TCO
Integration
Integration with
with key
key
security
and
network
security and network
infrastructure:
infrastructure:
AD/LDAP,
AD/LDAP, X.509/PKI,
X.509/PKI,
Authentication
Authentication systems
systems
(Radius,
PIV/CAC,
(Radius, PIV/CAC, etc.)
etc.)
Real-time
Real-time forensics
forensics to
to
watch
for
hard-to-detect
watch for hard-to-detect
patterns
patterns of
of malicious
malicious
activity
that
activity that traditional
traditional
security
security systems
systems may
may not
not
register
register
Application Layer
Management Layer
2000
Highly Secure Drop Box
3000
5000
10000
Business Discussion
14
Backup Material
WWW.8KMiles.com
Contact Info
Sri Vasireddy
Chief Cloud Officer
Email: sri@8kmiles.com
Tel: 703-371-8274
44121 Harry Byrd Hwy #275,
Ashburn, VA 20147
twitter:@8kmiles
linkedln:/company8kmiles.com
WWW.8KMiles.com