5
Security, Stability and Scalability Sales Conference 2015

Ignite 2015 EU - Technology Breakout Session "Security, Stability and Scalability"

  • Upload
    elemica

  • View
    208

  • Download
    1

Embed Size (px)

Citation preview

Page 1: Ignite 2015 EU -  Technology Breakout Session "Security, Stability and Scalability"

Security,  Stability  and  Scalability    

Sales  Conference  2015  

Page 2: Ignite 2015 EU -  Technology Breakout Session "Security, Stability and Scalability"

Business Model

Security,  Stability  and  Scalability  

Scala (Parallel Message

Processing)

Clojure (X-Form Logic)

JS (Custom Functions)

Akka 2.3

JVM 1.8 Ubuntu 12/04 Clojure 1.6 Rhino 5.4

Browser or Mobile

HTML 5

Knockout JQuery

Hazelcast CACHE

Cloud Search

QL Portal

Auto Scaling

Redundant Connectivity

Array

Integration Service Fabric

Auto Scaling

Availability Zone 2

Data Facade

QL Portal

Auto Scaling

Redundant Connectivity

Array

Integration Service Fabric

Auto Scaling

Availability Zone 3

Data Facade

Rabbit MQ AMPQ

Quicklink 1.0 Integration Platform

Smartlink 1.0 Applications

Scala/Lift

JVM 1.8

Jetty 9

Ubuntu 12/04

Authy Multifactor

Authentication

QL Portal

Auto Scaling

Redundant Connectivity

Array

Integration Service Fabric

Auto Scaling

Availability Zone 1

Data Facade

S3 with AES 256

EU Region

AWS Cloud

Page 3: Ignite 2015 EU -  Technology Breakout Session "Security, Stability and Scalability"

Security

4. Key based access to cloud infrastructure

1. QuickLink Portal: Multi Factor Authentication

2. QuickLink Connection: Two-Factor Authentication

3. Data Secured at Rest and in Motion

Page 4: Ignite 2015 EU -  Technology Breakout Session "Security, Stability and Scalability"

Stability

1.  Store First Approach

2. Queue Based Processing

4. Decoupled Connectivity and Data Transformation

3. Multi-channel Data Handling

Page 5: Ignite 2015 EU -  Technology Breakout Session "Security, Stability and Scalability"

Scalability

1. Automatically provision environments

2. Increment or Decrement based on Utilization

4. Distribute traffic Across Instances

3. Alarms to Trigger Scaling Activities