Mechanisms
|
Application Delivery Controller •
Attestation Service •
Attribute Authority •
Attribute-Based Access Control System •
Audit Monitor •
Authentication Gateway Service •
Automated Scaling Listener •
Automatically Defined Perimeter Controller •
Billing Management System •
Certificate •
Certificate Authority •
Certificate Revocation List •
Certificate Trust Store •
Certificate Validation Service •
Cloud-Based Security Group •
Cloud Consumer Gateway •
Cloud Storage Data Aging Management •
Cloud Storage Data Placement Auditor •
Cloud Storage Device •
Cloud Storage Device Performance Monitor •
Cloud Storage Management Portal •
Cloud Usage Monitor •
Cloud Workload Scheduler •
Cryptographic Key Management System •
Data Transport •
Digital Signature •
Domain Name Service •
Encryption •
Endpoint Threat Detection and Response •
Enterprise Mobility Management System •
Failover System •
Geotag •
Hardened Virtual Server Image •
Hardware-Based VM Discovery System •
Hardware Security Module •
Honeypot •
Host Based Security System •
Hypervisor •
Identity and Access Management •
Import and Export •
Intrusion Detection and Prevention Systems •
Live VM Migration •
Load Balancer •
Logical Network Perimeter •
LUN Masking •
Malware Hash •
Multi-Device Broker •
Network Forensic Monitor •
Orchestration Engine •
Pay-Per-Use Monitor •
Physical Uplink •
Platform Trust Policy •
Public Key Infrastructure •
RAID-level Identifier •
Ready-Made Environment •
Remote Administration System •
Resource Cluster •
Resource Management System •
Resource Replication •
Sandbox •
Secure Token Service •
Security Information and Event Management System •
Single Sign-On •
SLA Management System •
SLA-Monitor •
State Management Database •
Storage Path Masking •
Sub-LUN Migration •
Threat Intelligence System •
Traffic Filter •
Traffic Monitor •
Trusted Platform Module •
Virtual Appliance •
Virtual CPU •
Virtual Disk •
Virtual Firewall •
Virtual Infrastructure Manager •
Virtual Network •
Virtual Private Cloud •
Virtual Private Network •
Virtual RAM •
Virtual Server •
Virtual Server Snapshot •
Virtual Server State Manager •
Virtual Switch •
Virtualization Agent •
Virtualization Monitor •
VPN Cloud Hub
|
Sharing Scaling Elasticity
|
Broad Access •
Cross-Storage Device Vertical Tiering •
Dynamic Data Normalization •
Dynamic Scalability •
Elastic Disk Provisioning •
Elastic Network Capacity •
Elastic Resource Capacity •
Intra-Storage Device Vertical Data Tiering •
Load Balanced Virtual Server Instances •
Load Balanced Virtual Switches •
Memory Over-Committing •
NIC Teaming •
Service Load Balancing •
Service State Management •
Shared Resources •
Storage Workload Management •
Workload Distribution
|
Reliablility Resiliency Recovery
|
Dynamic Failure Detection and Recovery •
Hypervisor Clustering •
Multipath Resource Access •
Non-Disruptive Service Relocation •
Redundant Physical Connection for Virtual Servers •
Redundant Storage •
Resource Pooling •
Resource Reservation •
Storage Maintenance Window •
Synchronized Operating State •
Virtual Server Auto Crash Recovery •
Zero Downtime
|
Data Management Storage Devices
|
Cloud Storage Data at Rest Encryption •
Cloud Storage Data Lifecycle Management •
Cloud Storage Data Management •
Cloud Storage Data Placement Compliance Check •
Cloud Storage Device Masking •
Cloud Storage Device Path Masking •
Cloud Storage Device Performance Enforcement •
Direct I/O Access •
Direct LUN Access •
IP Storage Isolation •
RAID-Based Data Placement •
Single Root I/O Virtualization •
Sub-LUN Tiering •
Virtual Disk Splitting
|
Virtual Server Hypervisor Connectivity Management
|
Cross-Hypervisor Workload Mobility •
External Virtual Server Accessibility •
Persistent Virtual Network Configuration •
Stateless Hypervisor •
Virtual Server Connectivity Isolation •
Virtual Server Folder Migration •
Virtual Server NAT Connectivity •
Virtual Server-to-Host Affinity •
Virtual Server-to-Host Anti-Affinity •
Virtual Server-to-Host Connectivity •
Virtual Server-to-Virtual Server Affinity •
Virtual Server-to-Virtual Server Anti-Affinity •
Virtual Switch Isolation
|
Monitoring Provisioning Administration
|
Cloud Data Breach Protection •
Cloud Resource Access Control •
Cloud VM Platform Encryption •
Detecting and Mitigating User-Installed VMs •
Geotagging •
Hypervisor Protection •
In-Transit Cloud Data Encryption •
Mobile BYOD Security •
Permanent Data Loss Protection •
Secure Cloud Interfaces and APIs •
Trusted Cloud Resource Pools •
Trusted Platform BIOS •
Automated Administration •
Bare-Metal Provisioning •
Centralized Remote Administration •
Pay-as-You-Go •
Platform Provisioning •
Power Consumption Reduction •
Rapid Provisioning •
Realtime Resource Availability •
Resource Management •
Self-Provisioning •
Usage Monitoring
|
Cloud Service Storage Security
|
Cloud Data Breach Protection •
Cloud Resource Access Control •
Cloud VM Platform Encryption •
Detecting and Mitigating User-Installed VMs •
Geotagging •
Hypervisor Protection •
In-Transit Cloud Data Encryption •
Mobile BYOD Security •
Permanent Data Loss Protection •
Secure Cloud Interfaces and APIs •
Trusted Cloud Resource Pools •
Trusted Platform BIOS
|
Network Security Identity & Access Management Trust Assurance
|
Automatically Defined Perimeter •
Cloud Authentication Gateway •
Cloud Denial-of-Service Protection •
Cloud Key Management •
Cloud Traffic Hijacking Protection •
Collaborative Monitoring and Logging •
Federated Cloud Authentication •
Independent Cloud Auditing •
Secure Connection for Scaled VMs •
Secure External Cloud Connection •
Secure On-Premise Internet Access •
Threat Intelligence Processing •
Trust Attestation Service
|
Compound
|
Burst In •
Burst Out to Private Cloud •
Burst Out to Public Cloud •
Cloud Authentication •
Cloud Balancing •
Cloud Bursting •
Elastic Environment •
IaaS •
Isolated Trust Boundary •
Multitenant Environment •
PaaS •
Private Cloud •
Public Cloud •
Resilient Environment •
Resource Workload Management •
Secure Burst Out to Private Cloud/Public Cloud •
SaaS
|
Weitere
|
Service-Discovery •
Service-Registry
|