WEBINAR Multi-Tenant Business Intelligence in a Cloud Computing Environment

Allie Gentry, Chief Technology Officer Scott deVillers, Solution Architect

February 18, 2010

Business Intelligence Trends
 For enterprises
 Increased BI adoption among business managers  Driven by improved usability and ease of use of ad-hoc

query and reporting capabilities

 For ISVs and SaaS vendor applications
 BI is becoming an embedded component of ISV and SaaS

vendor applications

 ISVs and SaaS vendors need to deliver BI in context to

the applications and the business

 For information aggregators
 Enterprises and information aggregators can productize

valuable data through packaging it with web-based BI

Broad-based adoption of BI requires integrating data from multiple sources, both inside and outside the corporate firewall.

What is Multi-Tenancy?
 Definition
 A single instance of software runs on a server, serving

multiple client organizations (tenants)

 How it works
 With a multi-tenant architecture, a software application is

designed to virtually partition its data and configuration, so each client organization works with a customized virtual application instance

 Critical considerations for multi-tenancy
 Scalability

 Security
 Re-branding  Localization  Support for cloud computing-based deployments

Use Cases for Multi-Tenant BI
 ISVs who want to offer hosted or SaaS solutions  Pure-play SaaS vendors  Enterprises deploying a solution globally across

different groups/regions

 Information aggregators seeking to offer access

to data via web-based BI tools

Today’s Agenda
 The benefits of a multi-tenant approach to BI

implementations in a cloud computing environment

 How to add capacity as you add clients  How to easily overcome the data security

concerns and challenges often associated with a multi-tenant approach main approaches to multi-tenant BI in a cloud computing environment, and which one is right for you

 The characteristics and benefits behind the four

Benefits of Multi-Tenant BI
 Increased efficiencies and cost savings
 Leveraging a single installation of the BI application to

support multiple clients provides for a lower cost of acquisition and ownership clients, time to productivity and revenue

 Operational efficiencies allow rapid onboarding of new  Provides lower user license expenses

 Simplified user and release management
 Zero-footprint, web-based solutions require zero

management at the client level
 No client-based license keys

 Simplified release management processes

 Increased responsiveness
 To both market changes and customer needs

 Easy re-branding
 Provides a personalized end user experience

Architecture – Technical Details
Interface Layer
(Client Side) Client Browser Layer

jQuery

Ext JS

HTML/CSS

Presentation Layer
(Server Side)

Admin UI
Portal Login Menus Admin SwiftView
Administration Base

Reporting UI
Grid Chart Meters Maps
Shared Components Reporting Base

Business Layer
Web Application Layer Security Layer

Admin Logic
Portal Login Menus Admin SwiftView
Administration Base App Shared Components

Reporting Logic
Filtering Calculations Security Variables
OLAP Rprt. Base Relation Rprt. Base

Data

Data Layer

SwiftKnowledge
Application Layer Users Roles Groups View Query

Database Layer Metadata Cache Metadata Access Logic Data Access Data Access Logic ADOMD/ADOMD.NET

OLAP

Database Layer Data Access Data Access Logic

Relational

Client Data Layer

Detail

Data Mining Layer

Custom Data API

Analysis

Data Sources

ADO.NET/LINQ

ADO.NET

ADO.NET ADO.NET

ADO.NET

SQL

SQL

SQL

Oracle

MySQL

Custom Database

Multi-Tenancy – Four Approaches
SWIFTKNOWLEDGE SUPPORTS EVERY DELIVERY OPTION Client Data Layer
1 Many

1

2

Web Application Layer

1

3
Many

4

Tenancy Approach 1 | 1 : 1
 Isolation at the data layer is logical

and managed with SwiftKnowledge Component-Level Security
 Uniform brand identity across clients  Application and data management

can be delegated to client
 Granularity of data security

to specific clients and users
 Data volume growth

requirements are a factor of all tenants

Tenancy Approach 1

Steps to Onboard a New Client
STEP 1: Load new client data into existing database STEP 2: Import users for new client
 Source can be ADS, LDAP or custom third-party authentication

 Users and groups are created on-the-fly

STEP 3: Define security at data layer for new client/users

Tenancy Approach 2 | 1 : Many
 Uniform brand identity across clients

 Granularity of data security

to specific clients and users
 Data volume and

growth requirements handled independently

Tenancy Approach 2

Steps to Onboard a New Client
STEP 1: Instantiate new hardware and populate database STEP 2: Import users for new client
 Source can be ADS, LDAP or custom third-party authentication

 Users and groups are created on-the-fly

STEP 3: Define security at data layer for new client/users

Tenancy Approach 3 | Many : 1
 Isolation at the data layer is logical

and managed with SwiftKnowledge Component-Level Security
 Unique branding and globalization  Application and data management

can be delegated to client
 Granularity of data security

to specific clients and users
 Data volume growth

requirements are a factor of all tenants

Tenancy Approach 3

Steps to Onboard a New Client
STEP 1: Load new client data into existing database STEP 2: Create new virtual directory for new client STEP 3: Import users for new client
 Source can be ADS, LDAP or custom third-party authentication  Users and groups are created on-the-fly

STEP 4: Define security at data layer for new client/users

Tenancy Approach 4 | Many : Many
 Isolation is physical for all layers

 Granularity of data security

to specific clients and users
 Flexibility to manage growth

and administration
 Branding and

globalization unique
 Client data volumes

and growth handled independently
Ideal for clients who require physical segregation of data; flexible growth path

Tenancy Approach 4

Steps to Onboard a New Client
STEP 1: Instantiate new hardware STEP 2: Populate database with client-specific data STEP 3: Instantiate new web server STEP 4: Create new virtual directory for new client STEP 5: Import users for new client
 Source can be ADS, LDAP or custom third-party authentication
 Users and groups are created on-the-fly

STEP 6: Define security at data layer for new client/users

Steps for Client Onboarding
Approach Web Application Layer Instantiate new web server* Configure client-specific virtual directory Create application database Import users for new client Define security at data layer for new clients Secure application functionality, including administration Client Data Layer
1 2 3 4

1/1

1 / Many

Many / 1

Many / Many

Instantiate new database server**
Populate database with client-specific data Load new client data into existing database
* This can mean adding a virtual directory to an existing web server ** This can mean adding a new database to an existing database server

The Benefits of Each Approach
Approach Web App Layer/Data Layer Granularity of data security to specific clients and users Branding Globalization Client data volumes and growth handled independently Application/data management can be delegated to client Efficient cross-client comparisons
1 2 3 4

1/1

1 / Many

Many / 1

Many / Many

Considering a Multi-Tenancy Solution?
 Ask yourself
 What is my business strategy, and is it limited by my

current technologies?
strategy

 The technology needs to support – not drive – the business

 Ask potential solution providers
 Does the solution support both cloud computing

deployments and appliance installations? security?

 Who will host the data? Are they certified for data

 Reference sites
 Microsoft
 http://msdn.microsoft.com/en-us/library/aa479086.aspx#mlttntda_topic2

 Wikipedia
 http://en.wikipedia.org/wiki/Multitenancy
 http://en.wikipedia.org/wiki/Multitenancy#Competitive_Differentiation

Unique Combination of Innovations
For ISVs and SaaS

 Built specifically for ISVs

and their end users Interactive Data Streaming™ ComponentLevel Security™
 Uniquely satisfying

end user experience
 Ultra-fast BI performance

Breakthrough User Experience

in “Web time”
 Linear scalability means

lower data center costs
 Flexible security and

multi-tenancy Zero-Footprint Web Deployment
 No plug-ins, client

downloads, license keys
 Completely re-brandable  Flexible licensing

to fit any profit model

What would you like to do next?
View recorded webinar Visit www.swiftknowledge.com
Allie Gentry – argentry@swiftknowledge.com

Scott deVillers – scott.devillers@swiftknowledge.com