SlideShare una empresa de Scribd logo
1 de 23
Descargar para leer sin conexión
GRAU Data Space 2.0 –
The Secure Communication Platform for
Businesses and Organizations
YOUR DATA. YOUR CONTROL

7. Dez 2013
Introduction
●

●

WebAttached Drive and WebAttached Backup have been introduced
to the market in 2000 by GRAU DATA in Germany
Data Space 2.0 can be deployed in house leveraging existing
infrastructures

●

Customer specific development is possible (open API)

●

Customer specific branding without programming

●

Product of the month January 2013 in SearchStorage magazine
Usage scenarios
●

Encrypted and secure file sharing (internal or external)

●

Reducing the load on e-mail system (attachments)

●

Replacement of FTP or proprietary solutions

●

Eliminates security holes in file sharing processes

●

Multilevel access control

●

Solution for reception of mission critical corporate files

●

Secure mobile access to enterprise data

●

Synchronization of files on different devices

●

Replacement of local file server

●

Synchronization between branch offices
Features (1)
●

Easy to use file sharing for internal, external and anonymous users

●

File sharing via public up- and download links

●

Expiration date for up-/download links, users, folders and files

●

Flexible right management
–
–

●

Rightsmanagement on folder level
Roles, Groups, optional ACLs

Platform-independent access via
–

WebGUI

–

WebDAV (Windows, MacOSX, Linux)

–

Mobile Apps (iOS, Android, BB10)

–

Desktop Sync für Windows, Linux, MacOSX (CMIS)

–

Interoperability with OwnCloud clients via gateway

–

CIFS protocol
Features (2)
●

IT compliance:
–

Compliance with German and European data-protection and data-security
regulations (official certification in progress)

–

Audit-proof logging of all activities (optional)

–

Automated versioning of all file objects
World-wide unique identification of all objects
Integration with existing identity management (AD, SAML, OAUTH2)

–
–
●

IT security:
–
–
–

Integration with BoxCryptor (group level encryption)
Implementation of private or hybrid clouds possible

–
●

Encrypted file transfer

Master/master replication between sites (folder level)

Flexible storage backends:
–

SQL-DB, filesystem, object store, NAS (CIFS)
Features (3)
●

Easy integration of existing IT systems
●
●
●
●

Groupware systems
Portals
Provisioning systems
CMS systems

●
●
●
●

Online marketplaces
CRM/ERP systems
DMS/ECM systems
Accounting-/Billing systems

Innovative cloud oriented solution for
secure file sharing - designed for global
enterprises and organizations
Security & Compliance
●

Architecture
–
–

Vendor independence (storage, operating System, database, clients)

–
●

Statically typed language on server-side (stability & security)

Scalability through shared-nothing architecture (no single point of failure)

Compliance
–
–

Versioning and unique identification of objects (consistency)

–

Logging of all events (configurable)

–

Classification of objects (e.g.level of confidentiality)

–
●

Separated between user and administrative access (confidentiality)

WORM functionality on objects (long-time archiving)

Security
–

On-/Off premise deployment (distributable)

–

End-to-end encryption (BoxCryptor)

–

Plugin infrastructure for server side encryption
Open interfaces
●

Open standard interfaces
–
–

JSON/SOAP core API

–
●

WebDAV
CIFS

Gateways
–
–

CMIS 1.1 (SOAP, AtomPub, JSON)

–
●

OwnCloud
LDAP/AD

Source code access
– Based on a variety of open source components
–

Source code access for customers
Technologies used
●

GDS core
–
–

●

Java
JBOSS, Enterprise Java Beans

Interfaces
–
–

●

JSON (Jersey)
CMIS (OpenCMIS)

WebGUI
–

●

Desktop Clients
–

●

ExtJS/Sencha Touch

C# (.net/mono)

Data Persistence
–
–

●

Data bases: DB/2, MS-SQL, MySQL, Oracle, Postgres
Object stores: Caringo, S3, SWIFT

Metadata Persistence
–

DB/2, MS-SQL, MySQL, Oracle, Postgres
Architecture (1)
WebGUI

Admin GUI

GUI GW

Admin GW

GDS2 API (JSON)

ownCloudGW

CMIS GW
CIFS

WebDAV
GDS core

Storage Backend
Object-Store

Caringo
S3
SWIFT

FS/CIFS

GAM
NAS

Meta data
SQL

DB/2
Oracle
MySQL
Postgres

SQL/HA

DB/2
Oracle
MySQL
Postgres
Architecture (2)
GDS core
Storage Backend
Hashing
(optional)

Chunking
(e.g. 512kB)

Crypto
(sym.)

Mirroring

Object store

Filesystem

CIFS

SQL

NAS
GAM/Archive

DB/2
Oracle
MySQL
Postgres

Caringo
RADOS
SWIFT/S3

ext4
XFS
Architecture (3)
Load Balancer

Load Balancer

GDS (Session) Director

GDS (Session) Director

GDS2 API (JSON)

GDS2 API (JSON)

GDS core

GDS core

Storage

Metadata

Replication
Data
Metadata

Storage

Metadata
Architecture (4)
Load Balancer

Load Balancer

GDS (Session) Director

GDS (Session) Director
CMIS Cache

CMIS Cache

CMIS Cache

CMIS Cache

GDS2 API (JSON)

GDS2 API (JSON)

GDS2 API (JSON)

GDS core

GDS core

GDS core

MD

Data

Metadata
Replication

MD

Data

Metadata
Replication

Objectstore / Cluster filesystem

MD

Data
Architecture (5)
WebGUI

Admin GUI

Admin GW
GDS2 API (JSON)

Provisioning
Gateway

LDAP/AD
SQL
SAML

GDS core
Storage Backend

Metadata

Authentication
Gateway

LDAP/AD
SAML
RADIUS
Distributed Data Space
GDS2
CIFS

FW

Site B

GDS2

CIFS JSON

LAN

Site A

CIFS JSON

HT
T

S
TP
HT

CIFS

FW

LAN

FW

LAN

GDS2

CIFS

PS

Internet
HT
T

LAN

CIFS

FW

GDS2
CIFS JSON

PS

Site C

HT

Site D

PS
T

CIFS JSON
CMIS

Site B1

Site B2

WebDAV

GDS

HT
T

Site B
CIFS

GDS

CMIS

GDS

WebDAV
PS

OS

OS

Site C
CIFS
CMIS
WebDAV

GDS

HT
T

PS

CMIS Cache

HT

S
TP

SD

WebDAV

CMIS

GDS

GDS

CMIS

CIFS

HT

WebDAV

PS
T

HTTPS

CIFS

GDS

SD

CIFS

CMIS Cache

Site A

CMIS Cache

Corporate CDN

OS
GDS
GRAU Data Space 2.0 –
USABILITY AND USER INTERFACE
Web GUI (1.0)
Web GUI (1.1)
Mobile Clients (iOS)
Mobile Clients (Android)
Desktop Sync
YOUR DATA. YOUR CONTROL.

WWW:

HTTP://WWW.GRAUDATA.COM/DATASPACE

E-MAIL:

THOMAS.UHL@GRAUDATA.COM

CEL:

+49 172 7277920

TWITTER:

@graudata

Más contenido relacionado

Similar a GRAU DataSpace Features and Functions

Vaultize Cloud Architecture - Enterprise File Sync and Share (EFSS)
Vaultize Cloud Architecture - Enterprise File Sync and Share (EFSS)Vaultize Cloud Architecture - Enterprise File Sync and Share (EFSS)
Vaultize Cloud Architecture - Enterprise File Sync and Share (EFSS)Vaultize
 
Next-Generation Security Operations with AWS | AWS Public Sector Summit 2016
Next-Generation Security Operations with AWS | AWS Public Sector Summit 2016Next-Generation Security Operations with AWS | AWS Public Sector Summit 2016
Next-Generation Security Operations with AWS | AWS Public Sector Summit 2016Amazon Web Services
 
Enterprise Cloud Security
Enterprise Cloud SecurityEnterprise Cloud Security
Enterprise Cloud SecurityMongoDB
 
IBM DataPower Gateways - What's new in 2016 v7.5.2
IBM DataPower Gateways - What's new in 2016 v7.5.2IBM DataPower Gateways - What's new in 2016 v7.5.2
IBM DataPower Gateways - What's new in 2016 v7.5.2IBM DataPower Gateway
 
ArchivePod a legacy data solution when migrating to the #CLOUD
ArchivePod a legacy data solution when migrating to the #CLOUDArchivePod a legacy data solution when migrating to the #CLOUD
ArchivePod a legacy data solution when migrating to the #CLOUDGaret Keller
 
Why ClouDoc to protect CAD files?
Why ClouDoc to protect CAD files? Why ClouDoc to protect CAD files?
Why ClouDoc to protect CAD files? Sang Yoo
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1DianaGray10
 
CISSP Week 22
CISSP Week 22CISSP Week 22
CISSP Week 22jemtallon
 
Storware KODO - Enterprise Endpoint Data Protection v3.6
Storware KODO - Enterprise Endpoint Data Protection v3.6Storware KODO - Enterprise Endpoint Data Protection v3.6
Storware KODO - Enterprise Endpoint Data Protection v3.6Bartosz Bredy
 
Storware KODO O'SPRING 3.12
Storware KODO O'SPRING 3.12Storware KODO O'SPRING 3.12
Storware KODO O'SPRING 3.12Patryk Bobak
 
Enterprise data in the WSO2 platform
Enterprise data in the WSO2 platformEnterprise data in the WSO2 platform
Enterprise data in the WSO2 platformWSO2
 
What is Digital Asset Management?
What is Digital Asset Management?What is Digital Asset Management?
What is Digital Asset Management?Asset Bank
 
[OW2con'21] Hosting Identity in the Cloud with OW2 free softwares
[OW2con'21] Hosting Identity in the Cloud with OW2 free softwares[OW2con'21] Hosting Identity in the Cloud with OW2 free softwares
[OW2con'21] Hosting Identity in the Cloud with OW2 free softwaresWorteks
 
Mct summit 2013 rt in the enterprise
Mct summit 2013   rt in the enterpriseMct summit 2013   rt in the enterprise
Mct summit 2013 rt in the enterprisePeter De Tender
 
Mct summit 2013 Windows RT in the enterprise
Mct summit 2013  Windows RT in the enterpriseMct summit 2013  Windows RT in the enterprise
Mct summit 2013 Windows RT in the enterprisePeter De Tender
 
Storware KODO - Enterprise Collaboration & Data Protection for mobile workforce
Storware KODO - Enterprise Collaboration & Data Protection for mobile workforceStorware KODO - Enterprise Collaboration & Data Protection for mobile workforce
Storware KODO - Enterprise Collaboration & Data Protection for mobile workforcePawel Maczka
 

Similar a GRAU DataSpace Features and Functions (20)

Vaultize Cloud Architecture - Enterprise File Sync and Share (EFSS)
Vaultize Cloud Architecture - Enterprise File Sync and Share (EFSS)Vaultize Cloud Architecture - Enterprise File Sync and Share (EFSS)
Vaultize Cloud Architecture - Enterprise File Sync and Share (EFSS)
 
GO AnyWhere - MFT
GO AnyWhere - MFTGO AnyWhere - MFT
GO AnyWhere - MFT
 
Next-Generation Security Operations with AWS | AWS Public Sector Summit 2016
Next-Generation Security Operations with AWS | AWS Public Sector Summit 2016Next-Generation Security Operations with AWS | AWS Public Sector Summit 2016
Next-Generation Security Operations with AWS | AWS Public Sector Summit 2016
 
Enterprise Cloud Security
Enterprise Cloud SecurityEnterprise Cloud Security
Enterprise Cloud Security
 
IBM DataPower Gateways - What's new in 2016 v7.5.2
IBM DataPower Gateways - What's new in 2016 v7.5.2IBM DataPower Gateways - What's new in 2016 v7.5.2
IBM DataPower Gateways - What's new in 2016 v7.5.2
 
ArchivePod a legacy data solution when migrating to the #CLOUD
ArchivePod a legacy data solution when migrating to the #CLOUDArchivePod a legacy data solution when migrating to the #CLOUD
ArchivePod a legacy data solution when migrating to the #CLOUD
 
Why ClouDoc to protect CAD files?
Why ClouDoc to protect CAD files? Why ClouDoc to protect CAD files?
Why ClouDoc to protect CAD files?
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
 
CISSP Week 22
CISSP Week 22CISSP Week 22
CISSP Week 22
 
Storware KODO - Enterprise Endpoint Data Protection v3.6
Storware KODO - Enterprise Endpoint Data Protection v3.6Storware KODO - Enterprise Endpoint Data Protection v3.6
Storware KODO - Enterprise Endpoint Data Protection v3.6
 
Storware KODO O'SPRING 3.12
Storware KODO O'SPRING 3.12Storware KODO O'SPRING 3.12
Storware KODO O'SPRING 3.12
 
Enterprise data in the WSO2 platform
Enterprise data in the WSO2 platformEnterprise data in the WSO2 platform
Enterprise data in the WSO2 platform
 
DoChronicle
DoChronicleDoChronicle
DoChronicle
 
What is Digital Asset Management?
What is Digital Asset Management?What is Digital Asset Management?
What is Digital Asset Management?
 
Azure 101
Azure 101Azure 101
Azure 101
 
[OW2con'21] Hosting Identity in the Cloud with OW2 free softwares
[OW2con'21] Hosting Identity in the Cloud with OW2 free softwares[OW2con'21] Hosting Identity in the Cloud with OW2 free softwares
[OW2con'21] Hosting Identity in the Cloud with OW2 free softwares
 
Mct summit 2013 rt in the enterprise
Mct summit 2013   rt in the enterpriseMct summit 2013   rt in the enterprise
Mct summit 2013 rt in the enterprise
 
Mct summit 2013 Windows RT in the enterprise
Mct summit 2013  Windows RT in the enterpriseMct summit 2013  Windows RT in the enterprise
Mct summit 2013 Windows RT in the enterprise
 
Storware KODO - Enterprise Collaboration & Data Protection for mobile workforce
Storware KODO - Enterprise Collaboration & Data Protection for mobile workforceStorware KODO - Enterprise Collaboration & Data Protection for mobile workforce
Storware KODO - Enterprise Collaboration & Data Protection for mobile workforce
 
Mechsoft products services
Mechsoft  products  servicesMechsoft  products  services
Mechsoft products services
 

Último

الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهMohamed Sweelam
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024Lorenzo Miniero
 
Microsoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfMicrosoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfOverkill Security
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch TuesdayIvanti
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Skynet Technologies
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfalexjohnson7307
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...caitlingebhard1
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxFIDO Alliance
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuidePixlogix Infotech
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard37
 
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...SOFTTECHHUB
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightSafe Software
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxMasterG
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfdanishmna97
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxFIDO Alliance
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityVictorSzoltysek
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Paige Cruz
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxFIDO Alliance
 

Último (20)

الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهله
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Microsoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfMicrosoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdf
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 

GRAU DataSpace Features and Functions

  • 1. GRAU Data Space 2.0 – The Secure Communication Platform for Businesses and Organizations YOUR DATA. YOUR CONTROL 7. Dez 2013
  • 2. Introduction ● ● WebAttached Drive and WebAttached Backup have been introduced to the market in 2000 by GRAU DATA in Germany Data Space 2.0 can be deployed in house leveraging existing infrastructures ● Customer specific development is possible (open API) ● Customer specific branding without programming ● Product of the month January 2013 in SearchStorage magazine
  • 3. Usage scenarios ● Encrypted and secure file sharing (internal or external) ● Reducing the load on e-mail system (attachments) ● Replacement of FTP or proprietary solutions ● Eliminates security holes in file sharing processes ● Multilevel access control ● Solution for reception of mission critical corporate files ● Secure mobile access to enterprise data ● Synchronization of files on different devices ● Replacement of local file server ● Synchronization between branch offices
  • 4. Features (1) ● Easy to use file sharing for internal, external and anonymous users ● File sharing via public up- and download links ● Expiration date for up-/download links, users, folders and files ● Flexible right management – – ● Rightsmanagement on folder level Roles, Groups, optional ACLs Platform-independent access via – WebGUI – WebDAV (Windows, MacOSX, Linux) – Mobile Apps (iOS, Android, BB10) – Desktop Sync für Windows, Linux, MacOSX (CMIS) – Interoperability with OwnCloud clients via gateway – CIFS protocol
  • 5. Features (2) ● IT compliance: – Compliance with German and European data-protection and data-security regulations (official certification in progress) – Audit-proof logging of all activities (optional) – Automated versioning of all file objects World-wide unique identification of all objects Integration with existing identity management (AD, SAML, OAUTH2) – – ● IT security: – – – Integration with BoxCryptor (group level encryption) Implementation of private or hybrid clouds possible – ● Encrypted file transfer Master/master replication between sites (folder level) Flexible storage backends: – SQL-DB, filesystem, object store, NAS (CIFS)
  • 6. Features (3) ● Easy integration of existing IT systems ● ● ● ● Groupware systems Portals Provisioning systems CMS systems ● ● ● ● Online marketplaces CRM/ERP systems DMS/ECM systems Accounting-/Billing systems Innovative cloud oriented solution for secure file sharing - designed for global enterprises and organizations
  • 7. Security & Compliance ● Architecture – – Vendor independence (storage, operating System, database, clients) – ● Statically typed language on server-side (stability & security) Scalability through shared-nothing architecture (no single point of failure) Compliance – – Versioning and unique identification of objects (consistency) – Logging of all events (configurable) – Classification of objects (e.g.level of confidentiality) – ● Separated between user and administrative access (confidentiality) WORM functionality on objects (long-time archiving) Security – On-/Off premise deployment (distributable) – End-to-end encryption (BoxCryptor) – Plugin infrastructure for server side encryption
  • 8. Open interfaces ● Open standard interfaces – – JSON/SOAP core API – ● WebDAV CIFS Gateways – – CMIS 1.1 (SOAP, AtomPub, JSON) – ● OwnCloud LDAP/AD Source code access – Based on a variety of open source components – Source code access for customers
  • 9. Technologies used ● GDS core – – ● Java JBOSS, Enterprise Java Beans Interfaces – – ● JSON (Jersey) CMIS (OpenCMIS) WebGUI – ● Desktop Clients – ● ExtJS/Sencha Touch C# (.net/mono) Data Persistence – – ● Data bases: DB/2, MS-SQL, MySQL, Oracle, Postgres Object stores: Caringo, S3, SWIFT Metadata Persistence – DB/2, MS-SQL, MySQL, Oracle, Postgres
  • 10. Architecture (1) WebGUI Admin GUI GUI GW Admin GW GDS2 API (JSON) ownCloudGW CMIS GW CIFS WebDAV GDS core Storage Backend Object-Store Caringo S3 SWIFT FS/CIFS GAM NAS Meta data SQL DB/2 Oracle MySQL Postgres SQL/HA DB/2 Oracle MySQL Postgres
  • 11. Architecture (2) GDS core Storage Backend Hashing (optional) Chunking (e.g. 512kB) Crypto (sym.) Mirroring Object store Filesystem CIFS SQL NAS GAM/Archive DB/2 Oracle MySQL Postgres Caringo RADOS SWIFT/S3 ext4 XFS
  • 12. Architecture (3) Load Balancer Load Balancer GDS (Session) Director GDS (Session) Director GDS2 API (JSON) GDS2 API (JSON) GDS core GDS core Storage Metadata Replication Data Metadata Storage Metadata
  • 13. Architecture (4) Load Balancer Load Balancer GDS (Session) Director GDS (Session) Director CMIS Cache CMIS Cache CMIS Cache CMIS Cache GDS2 API (JSON) GDS2 API (JSON) GDS2 API (JSON) GDS core GDS core GDS core MD Data Metadata Replication MD Data Metadata Replication Objectstore / Cluster filesystem MD Data
  • 14. Architecture (5) WebGUI Admin GUI Admin GW GDS2 API (JSON) Provisioning Gateway LDAP/AD SQL SAML GDS core Storage Backend Metadata Authentication Gateway LDAP/AD SAML RADIUS
  • 15. Distributed Data Space GDS2 CIFS FW Site B GDS2 CIFS JSON LAN Site A CIFS JSON HT T S TP HT CIFS FW LAN FW LAN GDS2 CIFS PS Internet HT T LAN CIFS FW GDS2 CIFS JSON PS Site C HT Site D PS T CIFS JSON
  • 16. CMIS Site B1 Site B2 WebDAV GDS HT T Site B CIFS GDS CMIS GDS WebDAV PS OS OS Site C CIFS CMIS WebDAV GDS HT T PS CMIS Cache HT S TP SD WebDAV CMIS GDS GDS CMIS CIFS HT WebDAV PS T HTTPS CIFS GDS SD CIFS CMIS Cache Site A CMIS Cache Corporate CDN OS GDS
  • 17. GRAU Data Space 2.0 – USABILITY AND USER INTERFACE
  • 23. YOUR DATA. YOUR CONTROL. WWW: HTTP://WWW.GRAUDATA.COM/DATASPACE E-MAIL: THOMAS.UHL@GRAUDATA.COM CEL: +49 172 7277920 TWITTER: @graudata