The Resilient Cloud for Defense Catalyst is being championed by Telstra on behalf of Defense Agencies. Participants, CA Technologies, Esri, Layer 7, and Thales, will demonstrate external threat detection and evaluation, network management systems, and the ability to proactively move mission critical applications to other cloud resources prior to alarm notification of physical network damage. Downloads
- The cloud promises to deliver unlimited, instant access to computing and storage resources, but only if concerns about security and survivability can be overcome. In the case of defense, security and survivability take on increased importance as lives are often at stake. Mission-critical applications residing in the cloud must survive harsh and rapidly developing external threats. In order to transfer mission critical applications to less threatened resources, organizations need the ability to thoroughly understand developing threats before an incident occurs. Most of today’s network alarm and management systems are unable to detect developing threats and are only able to react after the network performance has been compromised. When lives are at stake, it is crucial to have a system capable of sensing impending threats and reallocating resources as needed.
TM Forum Standards in Use or Development
- Information Framework (SID)
- Interfaces (OSS/J)
- Business Process Framework (eTOM)
- This Catalyst demonstration will show how the interface with a GIS and network management systems enables multiple vendors to connect through a standardized set of interfaces. These interfaces allow for the evaluation of external threats and an assessment of potential impact on operations. The Catalyst uses scenarios, such as the snow and ice storm that crossed the United States in 2011, to simulate a developing threat that is jeopardizing the ongoing operation of several major data centers and endangering the mission critical applications hosted in those centers. In typical external threat scenarios, the network is capable of reacting only once network becomes impaired and service is disrupted. In this Catalyst, the use of geographic information system (GIS) technology will provide an added level of capability to the network monitoring and management system.
Using GIS as a trigger to deliver advanced notification, the management system will be able to detect and identify the developing threat and model its potential impact on the network prior to any actual impairment. Advanced notice will provide time to identify critical application services that could be disrupted by the threat, and to relocate those critical application services to network resources that are not under threat. By providing an application grid that separates applications from their underlying resources, a proactive approach will ensure continued availability of services without relying solely on the traditional network alarm and without a service interruption to trigger resource reallocation.
Other Catalyst Demos