SlideShare a Scribd company logo
Secure Mobility - FIPS, CAC and Beyond
Paul Arnpriester, CDW Nonprofit
Glenn Exline, VMware
Paul Pindell, F5 Networks
Deepak Puri, VMware
EUC5196
#EUC5196
Today’s Agenda
• VMware Horizon Suite Overview
• Federal / Nonprofit and other highly security conscious
customers concerns
• FIPS, CAC, and Smart Card requirements
• How F5 Access Policy Manager can secure Horizon Workspace
and provide a FIPS and CAC Compliant solution
Centralized layered image management
for local deployment
Multi-device workspace for IT services
HORIZON SUITE
The platform for workforce mobility
Horizon
View
Horizon
Mirage
Horizon
Workspace
Complete desktop and application
virtualization
NEW
v5.2
NEW
v4.0
NEW
v1.0
F5 + HORIZON SUITE
Support for VMware validated solutions
 Mobile Secure Desktop
 Business Process Desktop
 AlwaysOn Desktop
 Branch Office Desktop
Unique F5 solutions
 PCoIP Proxy
 Single Namespace
 Username Persistence
Intelligent traffic management and security
 Local and global traffic management
 Multi-site and multi-pod deployments
 Access management and data center firewall
Horizon View
Intelligent Services
Framework
Secure • Fast • Available
Anywhere, any
service, any device
Intelligent Dynamic, agile,
adaptive
Horizon Mirage
Horizon Workspace
VM
VDI
VMware Horizon Workspace
Broker: Manage & secure
centrally and broker services to
your
workforce by policy
Transform: Transform
desktops, diverse apps and
data into centralized services
Deliver: Empower your
workforce
with flexible access across
devices, locations and
connectivity
Control & Governance Is More Challenging
People you employ
Using a network you
own to connect to…
Using software you own
on a Windows desktop
you own
An application you own,
running on a server you
own
Apps live in many
clouds and are easily
procured without IT
Always connected, via
3G, 4G and public or
personal wifi
Non-owned devices and
multiple non-Windows
OSs
Employees, contractors
outsourcers, partners
citizens, students
Encryption & Authentication
The [FIPS 140-2] standard specifies the security requirements that
must be satisfied by a cryptographic module utilized within a
security system that protects unclassified information within
computer and telecommunication systems including voice
systems. The standard provides four increasing, qualitative levels
of security: Level 1, Level 2, Level 3, and Level 4.
Source : Google
How F5 Access Policy Manager can
secure Horizon Workspace and provide a
FIPS and CAC Compliant solution
• Introduction to F5 Networks
• Introduction to F5 Access Policy Manager (APM)
F5 and VMware
A long-standing strategic partnership
VMware named F5
‘Global Technology Innovator Partner
of the Year’ (2011)
F5 was key launch partner for
VMware Ready for
Networking
and Security
Program
Across all
major VMware
solutions
and F5 products
Coordinated
back-end
customer
support
76%
Market Share
60%
Market Still
Untouched
$40 BILLION
Market
Capitalization
$4.2
BILLION
Annual Sales
Traffic Management Operating System
01010101010101010101010101
SwitchFabric
HighSpeedBridge
01010101010101010101010101
Disaggregator
SwitchFabric
HighSpeedBridge
TM Microkernel
TM Microkernel
TM Microkernel
TM Microkernel
Disaggregator
L2 - L4 Hardware L5 - L7 Software L2 - L4 Hardware
TCP
Proxy Server side connectionClient side connection
TMM
SSLOffload
RateShaping
WebCaching
HTTPProxy
TCPExpress
ClientAuth
OneConnect
ServerMonitor
LoadBalance
TCPExpress
Compression
iRules
ASIC FPGA FPGA CPUs
BIG-IP Access Policy Manager
Identify, authenticate, and control user access to your applications
• Secure and accelerate application
access from any device and location
• Consolidate AAA and SSO services for
enterprise applications
• RDP, View, Citrix Xen Support
• Federate via SAML
Single Sign On
• Scalable SSL VPN w DTLS
• Advanced Endpoint checks
• BYOD: IOS, Win8, Android Support
Mobile User Access
Application Delivery Networking for
Horizon Workspace 1.5
• F5 Networks LTM (Local Traffic Manager)
• Layer 4-7 Services
• Highly available Horizon Workspace environments
Application Delivery Networking for
Horizon Workspace 1.5
• https://communities.vmware.com/docs/DOC-
24577
• Document Written by Rasmus Jensen
• #EUC5238
• Shows how to use F5 to provide L4-7 traffic
management in front of both the Workspace
Gateway VAs, and the Connector VAs.
VMworld 2013: Secure Mobility - FIPS, CAC and Beyond
CAC in the Front, SAML in the back.
• Workflow of a connection
• F5 APM CAC Implementation
• F5 APM SAML Implementation
• F5 APM and Horizon Connector configurations
VMworld 2013: Secure Mobility - FIPS, CAC and Beyond
VMworld 2013: Secure Mobility - FIPS, CAC and Beyond
Demo Time
VMworld 2013: Secure Mobility - FIPS, CAC and Beyond
Questions, Answers, and Key Takeaways
VMworld 2013: Secure Mobility - FIPS, CAC and Beyond
THANK YOU
VMworld 2013: Secure Mobility - FIPS, CAC and Beyond
Secure Mobility - FIPS, CAC and Beyond
Paul Arnpriester, CDW Nonprofit
Glenn Exline, VMware
Paul Pindell, F5 Networks
Deepak Puri, VMware
EUC5196
#EUC5196

More Related Content

PDF
Automate and customise application services and deployment
PDF
Case Study: Technology Services Company
PDF
Accelerating Application Delivery with Cisco and F5
PPTX
F5 Certified! Program Overview and Update
PPTX
Over-the-air (OTA) updates and the Connected car
PDF
Case Study: Leading European Airline
PDF
Path to NFV Nirvana
PPTX
Operationalize all the Network Things
Automate and customise application services and deployment
Case Study: Technology Services Company
Accelerating Application Delivery with Cisco and F5
F5 Certified! Program Overview and Update
Over-the-air (OTA) updates and the Connected car
Case Study: Leading European Airline
Path to NFV Nirvana
Operationalize all the Network Things

Viewers also liked (6)

PPTX
F5 Application Delivery Optimization
PPTX
Useridentity 150909123719-lva1-app6891
PDF
Barracuda in Microsoft Azure
PDF
2 factor authentication beyond password : enforce advanced security with au...
PPTX
Palo Alto Networks authentication
PDF
Bring your own device
F5 Application Delivery Optimization
Useridentity 150909123719-lva1-app6891
Barracuda in Microsoft Azure
2 factor authentication beyond password : enforce advanced security with au...
Palo Alto Networks authentication
Bring your own device
Ad

Similar to VMworld 2013: Secure Mobility - FIPS, CAC and Beyond (20)

PPTX
F5’s VMware Horizon View Reference Architecture
PPTX
F5’s VMware Horizon View Reference Architecture
PPTX
F5’s VMware Horizon View Reference Architecture
PPSX
Bezpečný a optimalizovaný přístup k VMware VDI pomocí technologií F5
PDF
Presentation network design and security for your v mware view deployment w...
PDF
VMworld 2013: Enhancing Workplace Mobility and BYOD with the VMware Mobile Se...
PDF
Оптимизированное решение F5 для VMware Horizon View: рекомендации по дизайну ...
PPTX
F5 Infosec Israel 2013 Locking the Door in the Clouds
PDF
管理向云的迁移过程
PPTX
F5 Value For Virtualization
PPTX
F5 Infosec Israel 2013 Application Centric Security
PPTX
Check Point75 Makes3 D Security A Reality Q22011
PDF
Cisco vmd cwithf5_big-ip_ltm_whitepaper
PDF
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastruktury
PPTX
Customer Highleveloverview
PDF
Cybersecurity
PPSX
Business Mobility - otevřete svou mysl k tomu, co je možné
PPTX
APM Overall Use Case Presentation - Final
PDF
Seguridad en la Nube
PDF
Security and optimization solution primer [compatibility mode]
F5’s VMware Horizon View Reference Architecture
F5’s VMware Horizon View Reference Architecture
F5’s VMware Horizon View Reference Architecture
Bezpečný a optimalizovaný přístup k VMware VDI pomocí technologií F5
Presentation network design and security for your v mware view deployment w...
VMworld 2013: Enhancing Workplace Mobility and BYOD with the VMware Mobile Se...
Оптимизированное решение F5 для VMware Horizon View: рекомендации по дизайну ...
F5 Infosec Israel 2013 Locking the Door in the Clouds
管理向云的迁移过程
F5 Value For Virtualization
F5 Infosec Israel 2013 Application Centric Security
Check Point75 Makes3 D Security A Reality Q22011
Cisco vmd cwithf5_big-ip_ltm_whitepaper
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastruktury
Customer Highleveloverview
Cybersecurity
Business Mobility - otevřete svou mysl k tomu, co je možné
APM Overall Use Case Presentation - Final
Seguridad en la Nube
Security and optimization solution primer [compatibility mode]
Ad

More from VMworld (20)

PPTX
VMworld 2016: vSphere 6.x Host Resource Deep Dive
PPTX
VMworld 2016: Troubleshooting 101 for Horizon
PPTX
VMworld 2016: Advanced Network Services with NSX
PPTX
VMworld 2016: How to Deploy VMware NSX with Cisco Infrastructure
PPTX
VMworld 2016: Enforcing a vSphere Cluster Design with PowerCLI Automation
PPTX
VMworld 2016: What's New with Horizon 7
PPTX
VMworld 2016: Virtual Volumes Technical Deep Dive
PPTX
VMworld 2016: Advances in Remote Display Protocol Technology with VMware Blas...
PPTX
VMworld 2016: The KISS of vRealize Operations!
PPTX
VMworld 2016: Getting Started with PowerShell and PowerCLI for Your VMware En...
PPTX
VMworld 2016: Ask the vCenter Server Exerts Panel
PPTX
VMworld 2016: Virtualize Active Directory, the Right Way!
PPTX
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
PPTX
VMworld 2015: Troubleshooting for vSphere 6
PPTX
VMworld 2015: Monitoring and Managing Applications with vRealize Operations 6...
PPTX
VMworld 2015: Advanced SQL Server on vSphere
PPTX
VMworld 2015: Virtualize Active Directory, the Right Way!
PPTX
VMworld 2015: Site Recovery Manager and Policy Based DR Deep Dive with Engine...
PPTX
VMworld 2015: Building a Business Case for Virtual SAN
PPTX
VMworld 2015: Explaining Advanced Virtual Volumes Configurations
VMworld 2016: vSphere 6.x Host Resource Deep Dive
VMworld 2016: Troubleshooting 101 for Horizon
VMworld 2016: Advanced Network Services with NSX
VMworld 2016: How to Deploy VMware NSX with Cisco Infrastructure
VMworld 2016: Enforcing a vSphere Cluster Design with PowerCLI Automation
VMworld 2016: What's New with Horizon 7
VMworld 2016: Virtual Volumes Technical Deep Dive
VMworld 2016: Advances in Remote Display Protocol Technology with VMware Blas...
VMworld 2016: The KISS of vRealize Operations!
VMworld 2016: Getting Started with PowerShell and PowerCLI for Your VMware En...
VMworld 2016: Ask the vCenter Server Exerts Panel
VMworld 2016: Virtualize Active Directory, the Right Way!
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
VMworld 2015: Troubleshooting for vSphere 6
VMworld 2015: Monitoring and Managing Applications with vRealize Operations 6...
VMworld 2015: Advanced SQL Server on vSphere
VMworld 2015: Virtualize Active Directory, the Right Way!
VMworld 2015: Site Recovery Manager and Policy Based DR Deep Dive with Engine...
VMworld 2015: Building a Business Case for Virtual SAN
VMworld 2015: Explaining Advanced Virtual Volumes Configurations

Recently uploaded (20)

PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Electronic commerce courselecture one. Pdf
PPTX
Cloud computing and distributed systems.
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
A Presentation on Artificial Intelligence
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
NewMind AI Monthly Chronicles - July 2025
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Spectral efficient network and resource selection model in 5G networks
PPT
Teaching material agriculture food technology
PPTX
Big Data Technologies - Introduction.pptx
Encapsulation_ Review paper, used for researhc scholars
Diabetes mellitus diagnosis method based random forest with bat algorithm
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Electronic commerce courselecture one. Pdf
Cloud computing and distributed systems.
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
NewMind AI Weekly Chronicles - August'25 Week I
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
20250228 LYD VKU AI Blended-Learning.pptx
Mobile App Security Testing_ A Comprehensive Guide.pdf
A Presentation on Artificial Intelligence
Reach Out and Touch Someone: Haptics and Empathic Computing
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Review of recent advances in non-invasive hemoglobin estimation
NewMind AI Monthly Chronicles - July 2025
Digital-Transformation-Roadmap-for-Companies.pptx
Spectral efficient network and resource selection model in 5G networks
Teaching material agriculture food technology
Big Data Technologies - Introduction.pptx

VMworld 2013: Secure Mobility - FIPS, CAC and Beyond

  • 1. Secure Mobility - FIPS, CAC and Beyond Paul Arnpriester, CDW Nonprofit Glenn Exline, VMware Paul Pindell, F5 Networks Deepak Puri, VMware EUC5196 #EUC5196
  • 2. Today’s Agenda • VMware Horizon Suite Overview • Federal / Nonprofit and other highly security conscious customers concerns • FIPS, CAC, and Smart Card requirements • How F5 Access Policy Manager can secure Horizon Workspace and provide a FIPS and CAC Compliant solution
  • 3. Centralized layered image management for local deployment Multi-device workspace for IT services HORIZON SUITE The platform for workforce mobility Horizon View Horizon Mirage Horizon Workspace Complete desktop and application virtualization NEW v5.2 NEW v4.0 NEW v1.0 F5 + HORIZON SUITE Support for VMware validated solutions  Mobile Secure Desktop  Business Process Desktop  AlwaysOn Desktop  Branch Office Desktop Unique F5 solutions  PCoIP Proxy  Single Namespace  Username Persistence Intelligent traffic management and security  Local and global traffic management  Multi-site and multi-pod deployments  Access management and data center firewall Horizon View Intelligent Services Framework Secure • Fast • Available Anywhere, any service, any device Intelligent Dynamic, agile, adaptive Horizon Mirage Horizon Workspace VM VDI
  • 4. VMware Horizon Workspace Broker: Manage & secure centrally and broker services to your workforce by policy Transform: Transform desktops, diverse apps and data into centralized services Deliver: Empower your workforce with flexible access across devices, locations and connectivity
  • 5. Control & Governance Is More Challenging People you employ Using a network you own to connect to… Using software you own on a Windows desktop you own An application you own, running on a server you own Apps live in many clouds and are easily procured without IT Always connected, via 3G, 4G and public or personal wifi Non-owned devices and multiple non-Windows OSs Employees, contractors outsourcers, partners citizens, students
  • 6. Encryption & Authentication The [FIPS 140-2] standard specifies the security requirements that must be satisfied by a cryptographic module utilized within a security system that protects unclassified information within computer and telecommunication systems including voice systems. The standard provides four increasing, qualitative levels of security: Level 1, Level 2, Level 3, and Level 4.
  • 8. How F5 Access Policy Manager can secure Horizon Workspace and provide a FIPS and CAC Compliant solution • Introduction to F5 Networks • Introduction to F5 Access Policy Manager (APM)
  • 9. F5 and VMware A long-standing strategic partnership VMware named F5 ‘Global Technology Innovator Partner of the Year’ (2011) F5 was key launch partner for VMware Ready for Networking and Security Program Across all major VMware solutions and F5 products Coordinated back-end customer support 76% Market Share 60% Market Still Untouched $40 BILLION Market Capitalization $4.2 BILLION Annual Sales
  • 10. Traffic Management Operating System 01010101010101010101010101 SwitchFabric HighSpeedBridge 01010101010101010101010101 Disaggregator SwitchFabric HighSpeedBridge TM Microkernel TM Microkernel TM Microkernel TM Microkernel Disaggregator L2 - L4 Hardware L5 - L7 Software L2 - L4 Hardware TCP Proxy Server side connectionClient side connection TMM SSLOffload RateShaping WebCaching HTTPProxy TCPExpress ClientAuth OneConnect ServerMonitor LoadBalance TCPExpress Compression iRules ASIC FPGA FPGA CPUs
  • 11. BIG-IP Access Policy Manager Identify, authenticate, and control user access to your applications • Secure and accelerate application access from any device and location • Consolidate AAA and SSO services for enterprise applications • RDP, View, Citrix Xen Support • Federate via SAML Single Sign On • Scalable SSL VPN w DTLS • Advanced Endpoint checks • BYOD: IOS, Win8, Android Support Mobile User Access
  • 12. Application Delivery Networking for Horizon Workspace 1.5 • F5 Networks LTM (Local Traffic Manager) • Layer 4-7 Services • Highly available Horizon Workspace environments
  • 13. Application Delivery Networking for Horizon Workspace 1.5 • https://communities.vmware.com/docs/DOC- 24577 • Document Written by Rasmus Jensen • #EUC5238 • Shows how to use F5 to provide L4-7 traffic management in front of both the Workspace Gateway VAs, and the Connector VAs.
  • 15. CAC in the Front, SAML in the back. • Workflow of a connection • F5 APM CAC Implementation • F5 APM SAML Implementation • F5 APM and Horizon Connector configurations
  • 20. Questions, Answers, and Key Takeaways
  • 24. Secure Mobility - FIPS, CAC and Beyond Paul Arnpriester, CDW Nonprofit Glenn Exline, VMware Paul Pindell, F5 Networks Deepak Puri, VMware EUC5196 #EUC5196