Government Cloud Computing: Planning for Innovation and Value

Size: px
Start display at page:

Download "Government Cloud Computing: Planning for Innovation and Value"

Transcription

1 White Paper Cloud Computing Government / Public Sector Government Cloud Computing: Planning for Innovation and Value G Executive Summary Keywords: Cloud Computing, Government, Public Sector, Innovation, Cloud Technology Capability Maturity Framework (CT CMF), Value Jim Kenneally Intel Labs Kieran Mulqueen Intel Labs Jimmy Wai Intel Sales & Marketing Cloud computing marks an evolution in the deployment and management of information technology (IT). Cloud computing will reduce total cost of ownership (TCO) while increasing business agility, flexibility and service innovation. However, realizing the benefits of cloud computing involves dealing with age-old concerns, including security, compliance, privacy, data location, interoperability, service level monitoring, and potential vendor lock-in. To help government IT leaders navigate through the complexity of adopting cloud computing platforms and to maximize the potential benefits, Intel Corporation, in collaboration with the Innovation Value Institute (IVI), presents a Cloud Technology Capability Maturity Framework* (CT CMF*). The CT CMF s objectives are to offer a standardized approach for government IT leaders, to identify the current status of their cloud computing capabilities, and to provide a systemic path to improvement. As we talked to government IT leaders around the world to understand their views and experiences with cloud computing, Intel also developed a six-point quick-start checklist for government cloud computing programs. The criteria checklist will help promote successful adoption by designing cloud systems that are secure, agile, dependable, open, transparent, and aware. We expect governments to benefit by using the CT CMF and the criteria checklist in their cloud computing journey to rapidly realize benefits from government cloud computing investments. *Other names and brands may be claimed as the property of others. 1

2 Table of Contents Executive Summary Introduction...2 Cloud Computing...2 Cloud Service Models Cloud Deployment Models International Government Cloud Trends Six Key Criteria For Effective Government Cloud Adoption Secure...4 Agile Dependable...4 Open...5 Transparent...5 Aware...6 Cloud Technology Capability Maturity Framework (CT-CMF) Compute Network and Storage Cloud Security...11 Cloud Orchestration...12 Cloud Applications...14 Cloud Governance and Supplier Management Cloud Value and Innovation...16 Planning for Innovation and Value...16 Introduction According to CIO.gov, Cheaper processors, faster networks, and the rise of mobile devices are driving innovation faster than ever before. Cloud computing is a manifestation and core enabler of this transformation. Just as the Internet has led to the creation of new business models unfathomable 20 years ago, cloud computing will disrupt and reshape entire industries in unforeseen ways. i Technology deployment is increasingly becoming a key component of delivering better public services. The arrival of cloud computing comes at a time when many governments are stipulating that departments and agencies optimize their IT service delivery costs and, at the same time, improve flexibility and responsiveness in essence, do more with less. The cloud computing model can significantly help organizations and agencies in the public sector grapple with the need to provide highly reliable, innovative IT services quickly despite resource constraints. Many government departments and agencies are banking on the economics promised by cloud computing to consolidate procurement, optimize expenditures, increase agility, and improve public services. Government departments are increasingly mandated to consider cloud systems first whenever a secure, reliable, cost-effective cloud option exists. To this end, many governments and public-sector bodies are surveying their path toward adopting cloud computing. Cloud Computing Cloud computing is an evolution in which IT consumption and delivery are made available in a self-service way via the Internet or internal network with a flexible, pay-as-you-go business model that runs on a highly efficient and scalable architecture. In a cloud computing architecture, services and data reside in shared, dynamically scalable resource pools, often virtualized. Those services and data are accessed by any authenticated device over the Internet or an internal network. ii The U.S. National Institute of Standards and Technology (NIST) defines cloud computing this way: Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. Furthermore, NIST iii has identified five essential characteristics of cloud computing as: 1. On-demand self-service 2. Resource pooling 3. Measured service 4. Broad network access 5. Rapid elasticity 2

3 Cloud Service Models Cloud computing architectures are divided into three service models, infrastructure as a service, platform as a service, and software as a service. Each model shares similarities but has its own distinct differences. Choosing a service model typically depends on trade-offs between cost, complexity, and security. Very often, multiple service models are utilized, each suited to satisfying differing needs. Cloud Deployment Models Cloud computing architectures are deployed in different ways depending on the organizational structure and the provisioning location. The three basic deployment models are public, private, and community. In addition, these models can be melded to form hybrid models. International Government Cloud Trends Until recently, many government cloud deployments were primarily addressing data center consolidation and more efficient provisioning of commodity IT services. However, as the pursuit of greater efficiencies and better public services intensifies, government departments and agencies are becoming increasingly interdependent. This intensification is forcing a shift toward a matrix of shared IT services spanning multiple government departments and agencies. Consequently, governments are seeking to understand how cloud deployment can best support various services that are provided either across government agencies or directly to the general public. From the process of examining national and international trends, distinct patterns and themes are emerging regarding government cloud adoption trends. Six Key Criteria For Effective Government Cloud Adoption The six key criteria define the key characteristics resulting from the examination of numerous successful government cloud initiatives. Table 1 provides a quick summary and each criterion is then discussed in length. Cloud Service Models Infrastructure as a Service (IaaS) In this cloud service model, the customer is provided with processing, storage, and network capacity (e.g., virtual machines, storage services, backup services) to build a customized computing environment. The customer manages elements of the cloud operating system plus any customer-created applications deployed on top of it. Platform as a Service (PaaS) Customer-created applications are deployed to a managed cloud platform. The customer is responsible for the support, maintenance, and security of deployed applications. PaaS typically differs from IaaS because PaaS includes operating system, programming language execution environment, database, and Web server systems. Software as a Service (SaaS) Customer uses a provider s software applications over a network (e.g., , collaboration tools, customer relationship management systems), thus eliminating the need to directly manage the cloud platform and any software applications running on it. TABLE 1: SIX KEY CRITERIA FOR EFFECTIVE GOVERNMENT CLOUD ADOPTION SECURE AGILE DEPENDABLE OPEN TRANSPARENT AWARE Cloud-based services are trustworthy and secure from threats, applying defense in depth to prevent data disclosure (i.e., ensure confidentiality) as well as to prevent data tampering (i.e., ensure integrity). Cloud-based services apply dynamic orchestration to rapidly deploy and scale services up or down, dramatically reducing deployment and management time. Cloud-based services offer performance that is reliable, with assured compliance and service levels. Cloud-based services implement open standards to promote interoperability and portability across heterogeneous environments. Cloud-based services offered in the marketplace are easily compared, monitored, and audited. Cloud-based services capitalize on the capabilities embedded in the cloud infrastructure hosting them and the end-user computing devices accessing them. 3

4 Cloud Deployment Models iv Private Cloud The cloud infrastructure is operated solely for an organization. It may be managed by the organization or a third party and may exist on premise or off premise. Public Cloud The cloud infrastructure is made available to the general public or a large industry group and owned by an organization selling cloud services. v Community Cloud The cloud infrastructure is shared by several organizations and supports a specific community that has shared concerns (e.g., shared mission, security requirements, policy, or compliance considerations). It may be managed by the organizations or a third party and may exist on premise or off premise. Hybrid Cloud The cloud infrastructure composed of two or three cloud models (private, community, or public) that remain unique entities but are bound together by standardized or proprietary technology that enables data and application portability (e.g., cloud bursting for load balancing among clouds). Secure Security is often the top concern for government departments and agencies considering the move to cloud-based services. Government departments and agencies need to reassess the traditional IT network firewall protection principle in recognition that the movement of data increasingly crosses the IT network firewall. This means building security into data, applications, infrastructure, and hardware layers (i.e., adopting end-to-end layered security) rather than relying on the assumption that the IT network firewall is the first and last line of defense. Security models and assumptions need to evolve as governments adopt cloud computing. To address such security needs in the move to cloud computing, proactive government departments and agencies are working with industry to define security standards and implementation approaches (e.g., encryption, authentication, authorization, and geo-location capabilities). Initiatives such as the European Union Agency for Network and Information Security (ENISA) vi aim to improve the public sector s understanding of the security of cloud services and the potential indicators and methods that can be used during service delivery. Agile Cloud computing continues to capture the attention of both the public and private sectors with the promise of improved agility, scalability, and self-service provisioning of IT services. Cloud computing promotes scalability through adoption of common processes within and across government agencies and departments. Furthermore, the cloud computing delivery model offers easier access to the latest technology innovations. Compared to government IT services running on non-cloud infrastructure, government cloud systems can often dramatically reduce setup times for new applications and offer better scalability, resiliency, and service levels when systems are in use. For example, the U.S. Federal Labor Relation Authority (FLRA) moved its case management system to a cloud-based SaaS solution and reduced total cost of ownership by 88 percent over five years. vii Additionally, moving to a cloudbased platform provides the FLRA with secure access to case information from any location in the world, supporting rapid decision-making and organizational agility. The U.S. Social Security Administration s (SSA) Online Answers Knowledge Base uses a highly scalable cloud-based system to meet peak traffic loads without needing additional infrastructure. Nearly 99 percent of its 25 million Web self-service sessions are handled without agent intervention. viii Dependable Dependability is another highly advertised advantage of cloud computing. The highly configurable, virtualized, and managed cloud infrastructure creates an opportunity to enable higher levels of redundancy and resilience when compared to some of the more traditional infrastructure approaches. On the other hand, the shared nature of cloud infrastructure creates more 4

5 security, compliance, and service-level variables to be managed. Using cloud technologies and services (either inside or outside government firewalls) increases the need for government departments and agencies to verify that the underlying cloud infrastructure is secure and that compliance policies are enforced. Governments are increasingly using the power of the purse to demand improved quality, dependability, and accountability from their cloud service and component providers. Initiatives such as the U.S General Services Administration s Federal Risk and Authorization Management Program (FedRAMP) standardize cloud security procedures and provide centralized certification of third-party providers of cloud services to government departments and agencies. Six Key Criteria for Effective Government Cloud Adoption 1. Secure 2. Agile 3. Dependable 4. Open 5. Transparent 6. Aware Open Government departments and agencies increasingly mandate that their cloud deployments be based on accepted Internet protocols and use open and interoperable standards. ix The objective is to guard against technology lock-in and avoid individual vendors securing a disproportionately high share of government business. Furthermore, open and interoperable standards provide a platform for collaboration across government departments, where information can be managed as a single shared asset (where it is allowed by law and policies), improving its consistency and integrity for providing better public services. Governments that actively promote adoption of open and interoperable standards can facilitate a widespread adoption of cloud computing beyond government sectors (i.e., spill-over effects on to the wider economy). One such approach is the European Union s Cloud Computing Strategy, x which has as one of its objectives cutting through the jungle of technical standards so that cloud users can enjoy interoperability, data portability, and reversibility. Transparent As government departments and agencies consume cloud services, it is important for them to understand and monitor: The quantity of services being consumed How the services are being delivered Whether the services match pre-defined service level agreements (SLAs) Cloud service providers, whether internal or external, should provide clear and easy ways for government departments and agencies to monitor, manage, and audit the services being provided or purchased. Such transparency will ease the adoption path for cloud computing solutions by governments. National and regional governments are increasingly engaging various representative groups to simplify the adoption of cloud services for government agencies. This makes it easier to find, review, commission, decommission, and switch cloud services, thus encouraging marketplace competition. Digital Marketplace is a UK government initiative to encourage the adoption of cloud-based services across the entire UK public sector (e.g., Web hosting, 5

6 site analytics or document collaboration tools). Its objective is to simplify how the public sector buys and delivers digital services by promoting a common marketplace. Furthermore, to stimulate new entrants into the cloud marketplace, the UK government actively tracks the proportion of its cloud business secured by small and medium-sized enterprises (SMEs). Government initiatives are also focused on cultivating the necessary legal and regulatory frameworks (including data protection, privacy and portability regulations, electronic signature laws, security audit requirements, computer crime legislation, intellectual property protection, performance and quality of service) to expand the cloud computing marketplace and boost national productivity, growth, jobs, and citizen digital savviness. The European Union believes initiatives like these can deliver a net gain of 2.5 million new European jobs and an annual boost of 160 billion to the European Union GDP (i.e., around 1 percent) by xi Aware Applications designed for legacy IT infrastructures (i.e., non-cloud) are based on the assumption that the legacy applications are typically tied to specific (i.e., physical) hardware and, when the hardware fails, that the application running upon it fails. Cloud-architected applications and services are designed to be flexible and agile across a cloud infrastructure (i.e., they are cloud aware). Cloud-aware applications can seamlessly scale up or down to match unpredictable demand patterns or leap-frog onto new infrastructure resources if existing resources falter. This ability can be especially appealing for government services that have seasonal or cyclical demand patterns, thereby optimizing computing and storage capacity along with cost. The U.S. Administration for Children and Families (a division of the Department of Health and Human Services) migrated its GrantSolutions.gov Web site to a cloud-based infrastructure to support periods of high-volume processing more cost effectively. xii With APIs provided by GrantSolutions.gov, third-party developers can build upon government cloud-aware applications to provide citizens with rapid access to innovative services. xiii This is especially useful where government agencies have seasonal workloads and limited resources. Government departments and agencies must deliver cloud-based services that maintain or increase existing levels of security, performance, and manageability. Traditionally, non-cloud-based applications and services were designed for a known type of end-user computing client that accessed services inside government firewalls (e.g., standardized desktops or notebooks). Today, a more flexible service delivery approach is needed to support a continuum of compute devices, from desktops to smart phones, accessing government cloud-based services inside and outside government firewalls. Cloud-architected applications and services are increasingly using capabilities embedded in end-users computing clients to deliver on these expectations. This client awareness helps to provide a more consistent user experience and flexibility to realize the potential of cloud-based government services. 6

7 Cloud Technology Capability Maturity Framework (CT CMF) To support implementation of the six key criteria for effective government cloud deployments, Intel Corporation and the Innovation Value Institute (IVI) have co-researched and created the CT CMF. While the six key criteria define the characteristics of successful deployments for government cloud systems, the CT CMF identifies underlying key capabilities necessary to achieve those characteristics. The CT CMF reflects the understanding that while organizational structures, technologies, and projects will change, management capabilities are more enduring. CT CMF s seven key capabilities are shown in Figure 1. These capabilities are designed to be universally applicable regardless of the combination chosen across cloud service models and cloud deployment models. The principles of CT CMF can be readily applied internally or stipulated for cloud service providers (CSPs). Cloud Computing Deployment Models Public, Private, Community, Hybrid Cloud Computing Service Models IaaS, PaaS, SaaS Cloud Orchestration Cloud Security Compute Cloud Applications Storage Networking Cloud Governance & Supplier Management Cloud Value & Innovation Figure 1: CT CMF Capabilities 7

8 Figure 2: Generic Levels of Maturity 5. OPTIMIZING (Transformational) 4. ADVANCED (Progressive) 3. INTERMEDIATE (Deliberate) 2. BASIC (Evolving) 1. AD HOC (Informal) The bedrock of every cloud computing platform is management of its compute, storage, and networking capabilities. In addition, cloud computing requires complementary management capabilities in cloud application, security, and orchestration. Finally, capabilities are defined for crossorganization governance, supplier management, value, and innovation management. Table 2 defines each CT CMF capability. CT CMF s objective is to deliver government cloud services that are secure, agile, dependable, open, transparent, and aware (i.e., cloud services that meet the six key criteria mentioned earlier). The CT CMF is designed to provide a stable reference point across the public sector on the cloud computing adoption journey. To accelerate that journey, the CT CMF provides step-wise levels of maturity for each capability. Figure 2 illustrates the generic maturity concept. The five levels of maturity (Figure 2) apply to each of the seven capabilities (Table 2) to define the CT CMF shown in Table 3. Assessing the maturity of each capability provides a baseline for planning systematic improvements that support successful government cloud deployments. TABLE 2: SEVEN CAPABILITIES OF CT CMF DEFINED (1) COMPUTE Manage compute workloads to optimize performance, cost and innovation (2) STORAGE AND NETWORKING Use improvements in compute performance to manage the growth of storage and network demands (3) CLOUD APPLICATIONS Enable applications to be cloud-aware and client-aware, taking full advantage of capabilities present in the cloud and end-user computing clients (4) CLOUD ORCHESTRATION Operate with elasticity, scale, and efficiency by deploying automated provisioning and assurance models (5) CLOUD SECURITY Evolve the security model from security of the physical infrastructure to full end-to-end security (6) CLOUD GOVERNANCE AND SUPPLIER MANAGEMENT (7) CLOUD VALUE AND INNOVATION Use interoperable standards and open innovation Set clear business objectives, communicate and realize the value proposition for government cloud services 8

9 TABLE 3: CLOUD TECHNOLOGY CAPABILITY MATURITY FRAMEWORK* (CT CMF*) MATURITY LEVELS CLOUD COMPUTE CLOUD STORAGE AND NETWORK CLOUD SECURITY CLOUD ORCHESTRATION 5. Optimizing (Transformational) Intelligent Run Anywhere Execution Optimization of workload execution across environments Autonomic Dynamics Self-regulating configurations for agile workload placement and storage Integrated Endto-End Security Full end-to-end security integration for data in production, in motion, and at rest IT-as-a-Service Capabilities Zero user-perceived downtime or delays with fully automated service and workload orchestration 4. Advanced (Progressive) Context-Aware Workload Placement Differing workload profiles dynamically run on tailored infrastructure environments Continuous Availability Near-continuous availability; automated lifecycle management Micro-Perimeter Defenses Extension from perimeter defense of the network to micro-perimeters at application and data levels Automated Elasticity Automatic cloud scaling and brokerage, with trustworthy performance auditing 3. Intermediate (Deliberate) Flexible Cost / Performance Flexible performance / cost / watt management emerging Controlled Management Virtualized, efficient, dynamic storage and network infrastructure is emerging Normalized Security Usage Models Security models and solutions address risks based on accepted cloud computing usage models Policy-Based Execution Policy-based provisioning, management and troubleshooting performed down the wire with high level of automation 2. Basic (Evolving) Virtualization First Policy Virtualized environment is standard for new compute capacity deployments Defined Standards New standard emerging to enable virtualized compute environment Defined Protocols Security standard expanded to cover emerging virtualized infrastructure Standardization Emerging Standardized selfservice provisioning, infrastructure, and SLA management emerging 1. Ad Hoc (Informal) Virtualization Pockets Pockets of virtualization with no organization-wide standard Mostly Traditional Storage and network is mostly optimized to a traditional compute model Legacy Security Security policies and processes are considered inadequate to protect virtualized infrastructure Rudimentary Management Virtualized infrastructure typically managed with traditional tools and processes CLOUD APPLICATIONS Performance Portability Agile and seamless data and application mobility across cloud environments and end-user computing clients Streamlined On-Boarding Majority of data services exposed as APIs; everything becomes a consumable service Adaptive Services Elastic features allow applications to grow and shrink on demand, and adapt to the capabilities of end-user computing clients Loosely Coupled Application development and data management standards for cloud deployment emerge Platform Dependent Data and applications largely follow traditional development and management practices CLOUD GOVERNANCE AND SUPPLIER MANAGEMENT Win-Win Relationships Synergetic partnerships; the IT function is considered a cloud service integrator / broker Strategic Amplification Cloud platform accelerates agility across organizational domains Coordinated Actions Organizationwide governance established targeting cloud-based services Awareness and Transparency Centrally managed cloud computing and virtualization initiatives emerging Lack of Control Cloud initiatives typically exist outside any governance or defined practices CLOUD VALUE AND INNOVATION Model Transformation Cloud computing enables new ecosystems, business and operating models Process Transformation Cloud computing is transforming entire business processes across the organization Business Process Experimentation Cloud computing is enhancing business processes outside of the IT function IT Utility Focus Cloud computing is primarily targeted at cost optimization within the IT function Opaque Value Unknown expenditure and value due to uncoordinated cloud initiatives 9

10 The remainder of this section explores in more detail each of the seven CT CMF capabilities presented in Table 3. Compute: Manage Compute Workloads to Optimize Performance, Cost and Innovation Moore s Law xiv continues to deliver CPU and server performance for scalable cloud services, enabling innovations in silicon design. Intel Xeon processor-based servers help power and protect the cloud infrastructure stack from the ground up, with capabilities that make a difference when processing, moving and safeguarding data. When using cloud service providers (CSPs), look for the Powered by Intel Cloud Technology badge to guarantee your workloads run on genuine Intel processors to increase performance, reduce completion time, and enhance security. Intel Cloud Finder simplifies the path to cloud services, making it easier to match cloud requirements with cloud service provider capabilities. Virtualization, the bedrock of cloud computing, improves asset utilization from historically low levels by pooling physical computing resources and sharing those resources efficiently across applications. In addition to maximizing utilization, virtualization helps minimize energy consumption, reduces server footprints within data centers, and provides scalable resources. The capital expenditure (CapEx) savings and the follow-on operating expenditure (OpEx) savings from virtualization create a business case for increasing the scale of virtualization deployments to the point where a virtual server becomes the default build, with special exceptions required for a physical build. Extending virtualization to the most demanding Tier 1 applications becomes the next goal, using powerful server hardware built from the chip level and up for hardware-assisted virtualization. Furthermore, platform innovations, such as cost-saving power management technologies, increase server utilization and lower energy consumption further. As the compute capability matures in an organization, the ability to support dynamic placement of workloads within and across heterogeneous cloud environments can optimize efficiency, availability, and security. This entails dynamic routing of compute workloads to cloud infrastructures best suited for the job (e.g., different infrastructures for office productivity, mission-critical, highly secure, or location-restricted applications). At the highest levels of maturity, compute workload placement and execution in the cloud can seamlessly move within and off premises while respecting defined policies such as compute workload priorities or security protocols. That is, cloud architectures provide intelligent run-anywhere execution based on the automated execution of defined policies, instead of stationary-location execution. Individual workloads move in and among private and public clouds across the world based on demand. This provides the ability to optimize performance, cost, location, risk, and benefit (i.e., by taking advantage of arbitrage that may exist between two or more marketplaces or computing environments). Network and Storage: Use Improvements in Compute Performance to Manage the Growth of Storage and Network Demands 10 As compute capability grows for both client devices and backend infrastructure, corresponding data and storage requirements grow rapidly. As a consequence, there is the increased demand for the network to move that data to where it is needed. Traditional storage solutions often lack the performance and flexibility to handle the growing storage requirements cloud environments demand, while legacy networks can be ill-equipped to accommodate the bandwidth and configurability requirements generated by scalable cloud services, virtual machine (VM) density, and VM migrations, among other factors. xv

11 By summoning the cloud s ability to pool resources and generate efficiencies of scale, government CIOs can reduce costs, floor space, and energy requirements in the data center while gaining the speed, flexibility, and scalability of cloud platforms. However, storage and network modernization require new virtualization policies. Policies around the use of tiered storage architectures, thin provisioning, and storage reduction techniques such as data compression and data deduplication make it feasible to scale capacity on demand and help reduce storage management costs. Due to cloud architectures increasing network bandwidth demands, there is growing recognition that traditional network infrastructures are being challenged to keep up. Network strategies for cloud migrations start with upgrading and consolidating LAN ports with high-speed networking technologies such as 10 Gigabit Ethernet (10GbE) and beyond. Converged data and storage networks can then be unified with these high-speed networks. Simplified network infrastructure reduces cable management challenges in the cloud data center, improves airflow and cooling, and drives up data center efficiency. Software-defined infrastructure (SDI) is an additional layer of abstraction that treats network, storage, and compute capabilities as abstracted resource pools. Software-defined storage (SDS) xvi and software-defined networking (SDN) xvii allow orchestration of storage and network resources similar to virtualized compute resources. These technologies enhance the provisioning, allocation, and management capability of the cloud infrastructure. Moreover, SDI enables policy-based intelligent storage and network resource management that provides automated service assurance for cloud services, further reducing costs and increasing agility for cloud services. The OpenStack Foundation s OpenStack software is one such open-source cloud operating system providing a framework for enabling unified self-service provisioning across compute, storage, and network resources. Storage and compute systems can be improved by deploying advanced network adapters, controllers, and switches such as Intel s Ethernet product portfolio, providing cost-effective, flexible, and efficient solutions. Network storage solutions designed with Intel architecture help manage cloud data growth by applying intelligent storage virtualization and optimization solutions. Storage with Intel Solid-State Drives (Intel SSD) delivers lower total cost of ownership, security, and manageability features for responsive storage performance, whatever the application. At the highest level of maturity, cloud infrastructure will always be available with autonomous self-regulating configurations, allowing the compute workload and cloud services to run continuously without interruption of storage and network services. Cloud Security: Evolve the Security Model from Security of the Physical Infrastructure to Full End-to-End Security The traditional philosophy of security derived from the network firewall won t work effectively for cloud computing, which requires elastic boundaries that can push the perimeter of the enterprise beyond the location of traditional firewalls. xviii Cloud computing makes the network firewall permeable when devices accessing cloud-based services are both inside and outside the firewall. Furthermore, these devices can range from powerful servers and high-performance computing clients to less capable mobile devices, each with independently defined security features and capabilities. 11

12 Intel technologies enable advanced hardware-assisted data and infrastructure security solutions, including safeguarding data with faster encryption (Intel Advanced Encryption Standard New Instructions [Intel AES-NI]), better identity protection (Intel Identity Protection Technology [Intel IPT]), reduction in attack risks (Intel Mashery ), secure virtualization (Intel Virtualization Technology [Intel VT]), and hardwarebased trustworthiness to make platforms more resistant to attacks (Intel Trusted Execution Technology [Intel TXT]). The Intel Cloud Builders program provides proven cloud security reference architectures based on real-world requirements. Intel Cloud Finder is a registry of service providers that use Intel technology to meet key criteria for high-performance cloud solutions in security and other technology categories. The Cloud Security Alliance (CSA) promotes the use of best practices for providing security assurance in cloud computing. The Trusted Computing Group (TCG) develops open, vendor-neutral, global industry standards, supportive of a hardware-based root of trust, for interoperable trusted computing platforms. With new usage models, new security models and controls are needed to enforce the protection of virtualized infrastructure, workloads and associated data, and various end-user client devices that access cloudbased applications, as well as protection for data at rest and in motion. A holistic approach is required to evolve the security model beyond traditional assumptions of securing physical infrastructure, standardized devices, and physical insolation in favor of adaptable, end-to-end, multi-layered, and multi-tenant architectures. Security policies, technologies, and controls should encompass data, applications, services, end-point devices, and all aspects of infrastructure. In the case of hybrid or public cloud deployment models, the security model and controls will need to include services and data residing in the public cloud platform. In some cases, it may be sufficient to have a cloud provider vouch for the security of the underlying infrastructure (e.g., hosting external websites and wikis for non-critical services). However, for mission-critical processes and sensitive data, third-party attestations may not be enough. That is, it may not be sufficient to rely on cloud providers logs, reports, and attestations in proving compliance. For example, Intel is collaborating with cloud providers and the IT community on applications of Intel Trusted Execution Technology (Intel TXT) in conjunction with other components to provide interoperable, highly secure, tamper-proof measurements of policy compliance and the end-to-end security attestations needed to handle even the most demanding security. xix Governments are looking at the centralized certification and accreditation of cloud service providers (CSPs). Certification acts like a security passport that validates a CSP s credentials. By validating credentials once and to a consistent level, each government department and agency can accept that security passport when a CSP tenders for government contracts. For example, U.S. federal government entities can now utilize Amazon Web Services* (AWS*) infrastructure services after AWS was awarded Federal Information Security Management Act (FISMA) Moderate Authorization and Accreditation. Activities like these can generate wider options for deploying government cloud, speed up government procurement cycles, and help ensure CSPs are evaluated using consistent and rigorous security protocols that prioritize security needs to counter the most serious threats. At the highest levels of maturity, governments evolve their security models to protect not only the physical infrastructure but also the data and applications (i.e., end-to-end layered security) by striving to provide robust security services that ensure the integrity, confidentiality, and availability of data in a cloud computing environment. Cloud Orchestration: Operate with Elasticity, Scale, and Efficiency by Deploying Automated Provisioning and Assurance Models Easier provisioning of services is one of the key value propositions for the cloud architecture, where resources and services can be subscribed to and managed by an automated self-serviced portal. Historically, deploying a 12

13 new service or application on traditional (i.e., non-cloud) IT infrastructure involves procuring hardware, scheduling the installation in the data center, and configuring and testing the hardware and software a process often taking weeks or even months. Use of virtualization and standardization in a cloud environment obliterates the traditional project-by-project hardware procurement and infrastructure installation processes, significantly decreasing the time needed to deploy new applications. Fully realizing the business agility and efficiency enabled by cloud computing requires automated services provisioning. With a self-service portal supported by automated provisioning on the back end, government departments and agencies can cut the provisioning time for applications, development environments, or compute infrastructure capacity down to minutes. Cloud orchestration is not limited to the provisioning of services. Cloud infrastructure - both physical and virtualized requires solutions for service assurance so that workloads can run efficiently. At advanced levels of maturity, there are likely to be situations when workloads may need to migrate within or across cloud environments (e.g., to maximize data center efficiency or comply with SLA-defined policies such as ensuring that data for workloads running in a secure cloud is not moved to a less secure area). Manual management of such complex and large-scale operations can be prone to human errors or slow reactions to changing demands. To maintain optimized quality of service (e.g., avoiding situations like cloud resource overcrowding), advanced telemetry solutions can help by identifying how variables in a cloud environment change over time and dynamically making decisions on appropriate infrastructure resourcing allocations. Using advanced automated, policy-based workload placement, the orchestration layer can make real-time decisions about where a workload should be optimally placed or relocated if current resources become overcrowded. Cloud infrastructure is enhanced with service provisioning and service assurance software tools to run enterprise workloads efficiently. Intel Datacenter Manager: Service Assurance Administrator (Intel DCM: SAA) generates deep platform capacity, capability, and consumption data necessary for high levels of service assurance, security, and automation. Automation is essential for the management of a cloud environment to improve agility and OpEx. However, one key challenge to driving better automation within and across cloud-based infrastructures is successfully breaking down the organizational silos and complex implementation processes across the management of traditional compute, storage, and network platforms. For example, even if capacity is available for provisioning in minutes, agility can be eroded by bureaucratic request-approval processes. Also, data center facilities are often managed independently from cloud infrastructure, potentially impacting automation and efficiency. To resolve bureaucratic challenges, IT organizations should consider integrating heterogeneous technology platforms, workflows, and management processes as well as security models that govern such processes. This is also an opportunity to redefine existing service provisioning processes by referencing international best practice models. Adapting open standards in cloud infrastructure, software interfaces (e.g., APIs), and service management practices will help turn cloud computing s automation potential into a reality (i.e., rendering all cloud aspects available to the user without creating IT service requests). 13

14 To achieve such a level of maturity, the public sector must continue to build skills and knowledge of cloud technologies and cloud service management and use early wins to demonstrate potential and justify further budget allocations. A centralized management console can monitor cloud resources, capacity utilization, performance, and charge-back for services used. Improved orchestration will allow the IT function to progress toward becoming a broker and integrator of cloud-based services whether internally or externally sourced. To optimize resource utilization and improve service quality, development of new applications and renewal of legacy applications should be cloud-aware and client-aware by default. Intel Mashery API Management, API gateways and API services can help get new products and services to market faster, with greater security and a more consistent end-user experience (EUE) and higher quality of service (QoS). At the highest level of maturity, cloud services provisioning and infrastructure management are fully automated across the cloud environment, providing an always-on experience to users while optimizing the efficiency across cloud environments. Cloud Applications: Enable Applications to be Cloud-Aware and Client-Aware, Taking Full Advantage of Capabilities Present in the Cloud and End-User Computing Clients Many organizations adopted virtualization to consolidate workloads previously hosted on dedicated physical servers. This transition involved little or no change to the applications themselves, which have traditional expectations and dependencies. Non-cloud-architected applications are tied to the physical hardware infrastructure that hosts them. That is, if the physical hardware fails, the application fails. By contrast, cloud-architected applications are designed with failure in mind. Such applications are cloud-aware when they can migrate across virtualized hardware resources enabling elasticity and protection against hardware failures. That is, their design focus is on minimizing mean time to recovery (MTTR) rather than traditional approaches of maximizing mean time to failure (MTTF). To deliver cloud-aware applications, government departments and agencies should comprehend the characteristics of legacy applications and make plans for migrating them to appropriate cloud platforms. To optimize for agility, new development guidelines are required for developing new cloud-based applications and for legacy applications migrating to cloud services. At greater levels of maturity, the API becomes a standard way to expose services and applications running on cloud platforms, thus allowing easier creation of services and optimizing resource provisioning across applications. APIs offer discrete services but also can be rapidly coupled with other services to create more complex applications - accelerating service development by minimizing rework and maximizing reuse. As APIs are exposed as interfaces to the cloud, managing (e.g., policy enforcement, monitoring, and auditing) and securing them will become increasingly important. Widely accessible cloud API management platforms are becoming de facto resources when building new cloud applications and migrating legacy applications to cloud environments. Such platforms take advantage of third-party economies of scale, support agile delivery of cloud-based services, and help handle complexity as the need grows to access more data and generate more services. 14

15 Delivering a consistent end-user experience (EUE) and richer quality of service (QoS) from cloud-based applications could be challenging due to variances among end-user computing clients accessing the cloud (e.g., operating systems, form factors, input methods). Rather than sacrificing end-user experiences for the sake of designing to a lowest common denominator, cloud-based applications can be tailored to take advantage of the capabilities present in the end user s computing client accessing it (i.e., be client-aware). Varying end-user computing client capabilities include operating systems, processors, security patches, network connections, battery capacities, screen size, and input types. Once the relevant capabilities of an end-user s computing client are made known, a cloud-based application can dynamically optimize the EUE and QoS accordingly, thus maximizing productivity along with safeguarding government department and agency data. As departments and agencies plan their migration to cloud-based services, development guidelines for creating client-aware applications should be part of the core cloud development principles. At the highest levels of maturity, cloud-architected applications are aware of and utilize the capabilities present in the cloud environment (i.e., are cloud-aware) and end-user computing client (i.e., are client-aware) for agile and optimal services delivery. Cloud Governance and Supplier Management: Use Interoperable Standards and Open Innovation Multiple laws, regulations, and standards call for a complex weaving together of security and privacy mandates, making compliance a potentially complicated issue for government cloud computing. To avoid such potential issues, common governance and procurement principles should be applied across government departments and agencies. These principles should address technical and business risks associated with different cloud services, including data portability and reclamation, service-level reporting, and security protocols. Demanding trustworthy and tamper-proof compliance assurance capabilities will help ensure desired government policies, operation procedures, security, and service levels are maintained. For example, certain privacy laws may require restricting the geographic location for the storage of certain types of data in the cloud. Trusted Geo-location in the Cloud: Proof of Concept Implementation (Draft), xx a U.S. National Institute of Standards and Technology (NIST) publication, demonstrates how Intel TXT can aid organizations in monitoring and enforcing geo-location restrictions and policies, thus ensuring their workloads based on cloud services are deployed on trusted hardware in known geographies or locations. Public sector organizations can take deliberate steps to operate with open (i.e., public) standards for improved cloud governance, security, interoperability and protect against vendor lock-in. Engaging with cross-industry initiatives such as the Open Data Center Alliance (ODCA) will accelerate reaching these objectives. ODCA is focused on common cloud computing procurement requirements (i.e., open, interoperable solutions for secure cloud, automation of cloud infrastructure, common management, and transparency of cloud service delivery). Government departments and agencies that actively contribute to open, standards-based approaches ensure that public sector views are considered in the drafting of such standards. Consolidating demand for cloud services across public sectors, together with development of specific procurement vehicles, will help streamline governance, maximize purchasing power, and optimize sourcing decisions. Government departments and agencies can become cloud service brokers by removing internal obstacles and using cloud computing s economies of scale and capability to innovate rapidly. 15

16 At the highest levels of maturity, responsive governance and innovative supplier management will lead to services that are higher performing, more secure, and more affordable. Cloud Value and Innovation: Set Clear Business Objectives, Communicate and Realize the Value Proposition for Government Cloud Services For leading approaches and case studies demonstrating the benefits of cloud computing, visit Also, the Innovation Value Institute ( cofounded by Intel, researches, advises, and disseminates proven approaches for managing IT for value and innovation. Take the CT CMF evaluation at and access additional material on planning your government cloud for innovation and value. Public sector investments in cloud-based services typically begin with small but crucial projects that can deliver compelling return on investment, build internal expertise, and establish the credibility of cloud computing s potential for delivering public services. However, to capture the transformative potential of government cloud computing, public sector organizations should define a ubiquitous vision across public services for government cloud adoption along with corresponding deployment roadmaps. The deployment roadmaps require clear government objectives and transparent value propositions for where cloud computing can improve the delivery of better public services. This will help maximize the value of investments and set budget priorities across the public sector regarding expenditure on cloud versus non-cloud infrastructures. To evaluate the benefits of cloud computing, public sector organizations will benefit from applying consistent methods for measuring and expressing the value of using cloud-based technologies and services. Evaluation of cloud investments should blend tangible and intangible benefits to establish a transparent line-of-sight relationship between investments and forecasted benefits of better government services. Additionally, the ability to trade saved surpluses across public sector budgets and time periods can be a key enabler to funding the next wave of public sector innovation using cloud computing. At the highest levels of maturity, the adoption of government cloud is transforming delivery of citizen services. Planning for Innovation and Value Much of the early attention regarding government cloud computing has focused on infrastructure consolidation and reducing time to provision infrastructure from weeks (or months) to hours (or even minutes). Increasingly, attention is now turning to higher-order opportunities for innovation using cloud computing. xxi This includes massive business intelligence analyses, intermittent or seasonal processing requirements, and new delivery models for public services. The public sector can deliver on cloud computing s innovation potential by promoting progressive policies regarding government cloud adoption. Table 4 serves as a useful checklist for proofing government policies and individual programs against the six key criteria for effective government cloud adoption. Because of the public sector s collective buying power estimated to be up to 20 percent of all IT spending in some geographies governments are 16

17 TABLE 4: SIX KEY CRITERIA CHECKLIST FOR EFFECTIVE GOVERNMENT CLOUD ADOPTION SECURE AGILE DEPENDABLE OPEN TRANSPARENT AWARE Cloud-based services are trustworthy and secure from threats, applying defense in depth to prevent data disclosure (i.e., ensure confidentiality) as well as to prevent data tampering (i.e., ensure integrity). Cloud-based services apply dynamic orchestration to rapidly deploy and scale services up or down, dramatically reducing deployment and management time. Cloud-based computing performance is reliable, with assured compliance and service levels. Cloud-based services implement open standards to promote interoperability and portability across heterogeneous environments. Cloud-based services offered in the marketplace are easily compared, monitored, and audited. Cloud-based services capitalize on the capabilities embedded in the cloud infrastructure hosting them and the end-user computing devices accessing them. Are there sufficient end-to-end layered cloud security controls (i.e., defense in depth via secure infrastructure in the data center, secure network connections, secure devices, secure applications, and secure data)? Do current security models and policies align with new cloud computing deployment and usage models? Does the cloud-based service include orchestration abilities (e.g., self-serviceability, automation, integration) to dynamically allocate resources, manage service levels, and optimize efficiencies? Does the cloud-based service use or offer a reusable and modular API architecture and management platform? Can failure detection, recovery, and reporting occur with minimal or no manual intervention? Is service, regulatory, and policy compliance assurance possible using trusted and tamper-proof performance monitoring? Are open (i.e., vendor-neutral) standards applied to the cloud-based solution? Are interoperability, portability, and reversibility available for data and services hosted on the cloud computing platform? Is the cloud-based service transparently defined regarding comparing, commissioning, decommissioning, and switching cloud providers? Is tracking of cloud service delivery, consumption, and billing readily available? Can cloud-based services capitalize upon both the generic and unique capabilities of virtualized infrastructure resources (i.e., cloud-aware)? Can the cloud-based service offer secure access and optimal user experience across a continuum of compute devices (i.e., client-aware)? uniquely positioned to affect the marketplace for cloud computing. Applying the six key criteria checklist (Table 4) together with the CT CMF (Table 3) will help maximize public sector benefits from government cloud adoption by establishing a common language for goal setting among diverse stakeholders. Acknowledgements The authors wish to acknowledge valuable contributions from colleagues across Intel Corporation including Enrique Castro-Leon, Mark Valcich, John Kennedy, Cristian Oliveira and Dawn Olsen. 17

18 About Innovation Value Institute The Innovation Value Institute (IVI) is a not-for-profit entity that aims to transform how public and private sector organizations manage IT for value and innovation. Co-founded by Intel Corporation and Maynooth University, IVI hosts an international consortium of private and public sector organizations that, along with international academic organizations, collaborate on defining management best-practices. About Information Technology-Capability Maturity Framework* (IT CMF*) The Information Technology Capability Maturity Framework* (IT CMF*) improves an organization s capability to deploy and run information services for greater value and innovation. The IT CMF can be traced back to research originally conducted by Intel Corporation. xxii, xxiii Since then, IVI and its international consortium have built upon Intel s original IT CMF work, enabling public and private sector organizations around the world to systemically improve how they manage IT for value and innovation. xxiv Utilizing IT CMF as part of a continuous IT improvement program is associated with improved IT performance, including optimizing IT costs and higher business value contributions. Find more at About Cloud Technology Capability Maturity Framework (CT CMF) The CT CMF is co-developed by Intel Corporation and IVI as an add-on extension to the core functionality of IVI s Information Technology Capability Maturity Framework (IT CMF). While IT CMF encompasses an array of organizational strategies and practices for managing IT for value and innovation, CT CMF enhances IT-CMF s core functionality with cloud computing strategies and practices for government organizations. Endnotes i. CIO.GOV, Cloud. (Accessed July, 2014). ii. Miao, K. X., & He, J. Cloud Computing and Open Data Centers. Intel Technology Journal, Vol. 16, Issue 4, pp iii. Mell, Peter and Grance, Timothy. The NIST Definition of Cloud Computing. NIST Special Publication (Accessed July, 2014). iv. Mell, Peter and Grance, Timothy. The NIST Definition of Cloud Computing. NIST Special Publication (Accessed July, 2014). v. In some government arenas, public clouds are referred to as private sector clouds (e.g., a cloud service such as Amazon Web Service (AWS). vi. European Union Agency for Network and Information Security. (Accessed on July, 2014). vii. Federal Labor Relation Authority (FLRA) Case Management System, (Accessed July, 2014). 18

19 viii. ix. McClure, D. Leveraging the Power of Cloud Computing in Government. GSA: Brookings. (Accessed July, 2014). Interoperability is the capability of systems to work together by exchanging information across heterogeneous system boundaries. x. McClure, D. European Cloud Computing Strategy. GSA: Brookings. (Accessed June 2014). xi. European Cloud Computing Strategy, (Accessed June 2014). xii. The Grants Center of Excellence. (Accessed July 2014). xiii. An API is an application programming interface that enables software components to talk to one another. APIs are libraries of specifications for objects, routines, and data structures. APIs improve the ability to accommodate changes in the environment rapidly. xiv. Moore, Gordon E. Cramming more components onto integrated circuits. Electronics, pp , April 19, xv. xvi. xvii. A virtual machine (VM) is a software-based emulation of a computer, running on a physical server or client hardware. With virtualization, a single hardware platform can host multiple VMs, increasing resource utilization and manageability. Software-defined storage abstracts storage from hardware and enables data to be deployed, provisioned, and managed through software controllers. Software-defined networks separate the control plane (the element of the network used to configure the network) from the data plane (where the actual packet flow and traffic traverse the network), enabling configuration from centralized software controllers. xviii. A firewall is a system (hardware or software) that prevents unauthorized access to or from a private network, forming a barrier between a trusted and an untrusted network. xix. xx. xxi. Yeluri, Raghuram, and Castro-Leon, Enrique. Building the Infrastructure for Cloud Security: A Solutions View, Publisher: Apress, March Trusted Geo-location in the Cloud: Proof of Concept Implementation (Draft). National Institute of Standards and Technology (NIST), NIST Interagency Report 7904, Castro-Leon, Enrique; Golden, Bernard; Gomez, Miguel; Yeluri, Raghu; and Sheridan, Charles G.. Creating the Infrastructure for Cloud Computing: An Essential Handbook for IT Professionals. Beaverton, OR: Intel Press xxii. Curley, Martin. Managing IT for Business Value. Beaverton, OR: Intel Press xxiii. Curley, Martin. Introducing an IT Capability Maturity Framework. Proceedings of the Ninth International Conference on Enterprise Information Systems. Cardos, J, Cordeiro, J and Filipe, J, (Editors). Springer xxiv. The IT Capability Maturity Framework, Innovation Value Institute, National University of Ireland, Maynooth

20 INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE, TO ANY INTELLECTUAL PROPERTY RIGHTS IS GRANTED BY THIS DOCUMENT. EXCEPT AS PROVIDED IN INTEL S TERMS AND CONDITIONS OF SALE FOR SUCH PRODUCTS, INTEL ASSUMES NO LIABILITY WHATSOEVER, AND INTEL DISCLAIMS ANY EXPRESS OR IMPLIED WARRANTY, RELATING TO SALE AND/OR USE OF INTEL PRODUCTS INCLUDING LIABILITY OR WARRANTIES RELATING TO FITNESS FOR A PARTICULAR PURPOSE, MERCHANTABILITY, OR INFRINGEMENT OF ANY PATENT, COPYRIGHT OR OTHER INTELLECTUAL PROPERTY RIGHT. UNLESS OTHERWISE AGREED IN WRITING BY INTEL, THE INTEL PRODUCTS ARE NOT DESIGNED NOR INTENDED FOR ANY APPLICATION IN WHICH THE FAILURE OF THE INTEL PRODUCT COULD CREATE A SITUATION WHERE PERSONAL INJURY OR DEATH MAY OCCUR. No computer system can be absolutely secure. Intel IPT requires an enabled system, including a processor, chipset, firmware, software, and (in some cases) integrated graphics, and participating website or service. Intel does not assume any liability for lost or stolen data or systems or any other damages. Check with your manufacturer or retailer for more information. Learn more at Intel Virtualization Technology requires a computer system with an enabled Intel processor, updated BIOS, and virtual machine monitor (VMM). Functionality, performance or other benefits will vary depending on hardware and software configurations. Software applications may not be compatible with all operating systems. Check with your system manufacturer. Learn more at No computer system can be absolutely secure. Intel Advanced Encryption Standard New Instructions (Intel AES-NI) requires an enabled Intel processor, system and software designed to use the technology. Check with your manufacturer or retailer. No computer system can provide absolute security. Intel Trusted Execution Technology requires an enabled Intel processor, enabled chipset, firmware, software and may require a subscription with a capable service provider (may not be available in all countries). Intel assumes no liability for lost or stolen data and/or systems or any other damages resulting thereof. Consult your system or service provider for availability and functionality. Copyright 2014 Intel Corporation. All rights reserved. Intel and the Intel logo are trademarks of Intel Corporation in the U.S. and/or other countries. *Other names and brands may be claimed as the property of others. Please Recycle 20

Concurrent Technologies Corporation (CTC) is an independent, nonprofit, applied scientific research and development professional services

Concurrent Technologies Corporation (CTC) is an independent, nonprofit, applied scientific research and development professional services Concurrent Technologies Corporation (CTC) is an independent, nonprofit, applied scientific research and development professional services organization providing innovative management and technology-based

More information

The Open Cloud Near-Term Infrastructure Trends in Cloud Computing

The Open Cloud Near-Term Infrastructure Trends in Cloud Computing The Open Cloud Near-Term Infrastructure Trends in Cloud Computing Markus Leberecht BELNET Networking Conference 25-Oct-2012 1 Growth & IT Challenges Drive Need for Cloud Computing IT Pros Growth IT Challenges

More information

A Strategic Approach to Meeting the Demand for Cloud

A Strategic Approach to Meeting the Demand for Cloud White Paper For Cloud Providers A Strategic Approach to Meeting the Demand for Cloud Introduction: New Customer Challenges Propel Cloud Adoption In a dynamic business environment, enterprise customers

More information

Cloud: What an Enterprise Must Know

Cloud: What an Enterprise Must Know Cloud: What an Enterprise Must Know What You Will Learn This document is addressed to business and technology leaders at enterprises worldwide, with the expectation that the reader has a basic understanding

More information

Building the Business Case for Cloud: Real Ways Private Cloud Can Benefit Your Organization

Building the Business Case for Cloud: Real Ways Private Cloud Can Benefit Your Organization : Real Ways Private Cloud Can Benefit Your Organization In This Paper Leveraging cloud technology can help drive down costs while enabling service-oriented IT. Private and hybrid cloud approaches improve

More information

Cisco Unified Data Center: The Foundation for Private Cloud Infrastructure

Cisco Unified Data Center: The Foundation for Private Cloud Infrastructure White Paper Cisco Unified Data Center: The Foundation for Private Cloud Infrastructure Providing Agile and Efficient Service Delivery for Sustainable Business Advantage What You Will Learn Enterprises

More information

Accelerate Your Enterprise Private Cloud Initiative

Accelerate Your Enterprise Private Cloud Initiative Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service

More information

EMC PERSPECTIVE. The Private Cloud for Healthcare Enables Coordinated Patient Care

EMC PERSPECTIVE. The Private Cloud for Healthcare Enables Coordinated Patient Care EMC PERSPECTIVE The Private Cloud for Healthcare Enables Coordinated Patient Care Table of Contents A paradigm shift for Healthcare IT...................................................... 3 Cloud computing

More information

VALUE PROPOSITION FOR SERVICE PROVIDERS. Helping Service Providers accelerate adoption of the cloud

VALUE PROPOSITION FOR SERVICE PROVIDERS. Helping Service Providers accelerate adoption of the cloud VALUE PROPOSITION FOR SERVICE PROVIDERS Helping Service Providers accelerate adoption of the cloud Partnership with Service Providers Enabling Your Cloud Services in Complex Environments Today s challenge

More information

ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS

ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS Shirley Radack, Editor Computer Security Division Information

More information

journey to a hybrid cloud

journey to a hybrid cloud journey to a hybrid cloud Virtualization and Automation VI015SN journey to a hybrid cloud Jim Sweeney, CTO GTSI about the speaker Jim Sweeney GTSI, Chief Technology Officer 35 years of engineering experience

More information

Cisco Unified Data Center

Cisco Unified Data Center Solution Overview Cisco Unified Data Center Simplified, Efficient, and Agile Infrastructure for the Data Center What You Will Learn The data center is critical to the way that IT generates and delivers

More information

Public Clouds. Krishnan Subramanian Analyst & Researcher Krishworld.com. A whitepaper sponsored by Trend Micro Inc.

Public Clouds. Krishnan Subramanian Analyst & Researcher Krishworld.com. A whitepaper sponsored by Trend Micro Inc. Public Clouds Krishnan Subramanian Analyst & Researcher Krishworld.com A whitepaper sponsored by Trend Micro Inc. Introduction Public clouds are the latest evolution of computing, offering tremendous value

More information

Unlock the Promise of Cloud: A Strategic Perspective

Unlock the Promise of Cloud: A Strategic Perspective White Paper Unlock the Promise of Cloud: A Strategic Perspective Introduction: Keeping Pace in a Changing World In today s fast-moving environment, change is the only constant. To stay ahead of your competition,

More information

Accenture Cloud Platform Unlocks Agility and Control

Accenture Cloud Platform Unlocks Agility and Control Accenture Cloud Platform Unlocks Agility and Control 2 Accenture Cloud Platform Unlocks Agility and Control The Accenture Cloud Platform is at the heart of today s leading-edge, enterprise cloud solutions.

More information

Who moved my cloud? Part I: Introduction to Private, Public and Hybrid clouds and smooth migration

Who moved my cloud? Part I: Introduction to Private, Public and Hybrid clouds and smooth migration Who moved my cloud? Part I: Introduction to Private, Public and Hybrid clouds and smooth migration Part I of an ebook series of cloud infrastructure and platform fundamentals not to be avoided when preparing

More information

Data Center Network Evolution: Increase the Value of IT in Your Organization

Data Center Network Evolution: Increase the Value of IT in Your Organization White Paper Data Center Network Evolution: Increase the Value of IT in Your Organization What You Will Learn New operating demands and technology trends are changing the role of IT and introducing new

More information

Cisco Cloud Enablement Services for Education

Cisco Cloud Enablement Services for Education Services Overview Cisco Cloud Enablement Services for Education Bringing the Cloud to the Campus In today s higher education environment, IT organizations must keep pace with a long list of competing demands:

More information

TBR. Open Standards Are Dissolving Cloud Silos. May 2012. Author: Elizabeth Hedstrom Henlin, Software Analyst elizabeth.hedstromhenlin@tbri.

TBR. Open Standards Are Dissolving Cloud Silos. May 2012. Author: Elizabeth Hedstrom Henlin, Software Analyst elizabeth.hedstromhenlin@tbri. Open Standards Are Dissolving Cloud Silos May 2012 Author: Elizabeth Hedstrom Henlin, Software Analyst elizabeth.hedstromhenlin@tbri.com TBR T EC H N O LO G Y B U S I N ES S R ES EAR C H, I N C. Contents

More information

INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS

INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS CLOUD COMPUTING Cloud computing is a model for enabling convenient, ondemand network access to a shared pool of configurable computing

More information

HP Cloud Services Enablement portfolio for communications service providers: Compute Services. Solution brief

HP Cloud Services Enablement portfolio for communications service providers: Compute Services. Solution brief SCALEnow. HP Cloud Services Enablement portfolio for communications service providers: Compute Services Solution brief HP Cloud Services Enablement (HP CSE) for infrastructure as a service (IaaS) enables

More information

View Point. Lifting the Fog on Cloud

View Point. Lifting the Fog on Cloud View Point Lifting the Fog on Cloud There s a massive Cloud build-up on the horizon and the forecast promises a rain of benefits for the enterprise. Cloud is no more a buzzword. The enabling power of the

More information

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com WHITE PAPER Monetizing the Cloud: XaaS Opportunities for Service Providers Sponsored by: EMC Brad Nisbet March 2011 Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015

More information

Kent State University s Cloud Strategy

Kent State University s Cloud Strategy Kent State University s Cloud Strategy Table of Contents Item Page 1. From the CIO 3 2. Strategic Direction for Cloud Computing at Kent State 4 3. Cloud Computing at Kent State University 5 4. Methodology

More information

The Cloud-Enabled Enterprise Developing a Blueprint and Addressing Key Challenges

The Cloud-Enabled Enterprise Developing a Blueprint and Addressing Key Challenges WHITE PAPER The Cloud-Enabled Enterprise Developing a Blueprint and Addressing Key Challenges Cloud computing offers a significant opportunity for improved business outcomes through the delivery of innovative

More information

The Need for Service Catalog Design in Cloud Services Development

The Need for Service Catalog Design in Cloud Services Development The Need for Service Catalog Design in Cloud Services Development The purpose of this document: Provide an overview of the cloud service catalog and show how the service catalog design is an fundamental

More information

WWT View Point. Journey to the Private Cloud: Take the First Steps with FlexPod

WWT View Point. Journey to the Private Cloud: Take the First Steps with FlexPod WWT View Point Journey to the Private Cloud: Take the First Steps with FlexPod TABLE OF CONTENTS 1...EXECUTIVE OVERVIEW 2...SECTION 1: THE ROAD TO PRIVATE CLOUDS 3...SECTION 2: START WITH A STABLE INTEGRATED

More information

Security Issues in Cloud Computing

Security Issues in Cloud Computing Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources

More information

Fujitsu Dynamic Cloud Bridging today and tomorrow

Fujitsu Dynamic Cloud Bridging today and tomorrow Fujitsu Dynamic Cloud Bridging today and tomorrow Contents Cloud Computing with Fujitsu 3 Fujitsu Dynamic Cloud: Higher Dynamics for Enterprises 4 Fujitsu Dynamic Cloud: Our Offering 6 High Security Standards

More information

I D C T E C H N O L O G Y S P O T L I G H T

I D C T E C H N O L O G Y S P O T L I G H T I D C T E C H N O L O G Y S P O T L I G H T U n i fied Cloud Management Increases IT- as- a - S e r vi c e Ag i l i t y November 2013 Adapted from VMware Unifies Cloud Management Portfolio with a Focus

More information

Transformation to a ITaaS Model & the Cloud

Transformation to a ITaaS Model & the Cloud Transformation to a ITaaS Model & the Cloud CIO Summit - Miami November, 2014 John Cullen Laddie Suk EMC Global Professional Services John.cullen@emc.com Laddie.suk@emc.com 1 Agenda Business Challenges

More information

Cloud Security Trust Cisco to Protect Your Data

Cloud Security Trust Cisco to Protect Your Data Trust Cisco to Protect Your Data As cloud adoption accelerates, organizations are increasingly placing their trust in third-party cloud service providers (CSPs). But can you fully trust your most sensitive

More information

Cloud Computing. Bringing the Cloud into Focus

Cloud Computing. Bringing the Cloud into Focus Cloud Computing Bringing the Cloud into Focus November 2011 Introduction Ken Cochrane CEO, IT/NET Partner, KPGM Performance and Technology National co-leader IT Advisory Services KPMG Andrew Brewin Vice

More information

IT AS A SERVICE BROKER

IT AS A SERVICE BROKER IT AS A SERVICE BROKER MIT Sloan CIO Symposium May 21, 2014 Thomas P. Roloff Senior Vice President EMC Global Services twitter: @TRoloff 1 Why Transformation? Business is Changing Faster Than IT Business

More information

Cloud: Where are we now? Gerald Gerry Seaman Cloud Marketing Manager Intel - Data Center Group Enterprise High Performance Group

Cloud: Where are we now? Gerald Gerry Seaman Cloud Marketing Manager Intel - Data Center Group Enterprise High Performance Group Cloud: Where are we now? Gerald Gerry Seaman Cloud Marketing Manager Intel - Data Center Group Enterprise High Performance Group Why is Intel Talking Cloud? Service and Policy Management Analytics Cloud

More information

OVERVIEW Cloud Deployment Services

OVERVIEW Cloud Deployment Services OVERVIEW Cloud Deployment Services Audience This document is intended for those involved in planning, defining, designing, and providing cloud services to consumers. The intended audience includes the

More information

Elastic Private Clouds

Elastic Private Clouds White Paper Elastic Private Clouds Agile, Efficient and Under Your Control 1 Introduction Most businesses want to spend less time and money building and managing IT infrastructure to focus resources on

More information

HP CLOUD SYSTEM. The most complete, integrated platform for building and managing clouds featuring Intel technologies.

HP CLOUD SYSTEM. The most complete, integrated platform for building and managing clouds featuring Intel technologies. HP CLOUD SYSTEM The most complete, integrated platform for building and managing clouds featuring Intel technologies Presenter Title 2010 2011 Hewlett-Packard Development Company, L.P. The information

More information

Software-Defined Networks Powered by VellOS

Software-Defined Networks Powered by VellOS WHITE PAPER Software-Defined Networks Powered by VellOS Agile, Flexible Networking for Distributed Applications Vello s SDN enables a low-latency, programmable solution resulting in a faster and more flexible

More information

U s i n g S D N - and NFV-based Servi c e s to M a x i m iz e C SP Reve n u e s a n d I n c r e ase

U s i n g S D N - and NFV-based Servi c e s to M a x i m iz e C SP Reve n u e s a n d I n c r e ase I D C T E C H N O L O G Y S P O T L I G H T U s i n g S D N - and NFV-based Servi c e s to M a x i m iz e C SP Reve n u e s a n d I n c r e ase Operational Efficiency March 2013 Adapted from Will New SDN

More information

How To Compare The Two Cloud Computing Models

How To Compare The Two Cloud Computing Models WHITE PAPER Elastic Cloud Infrastructure: Agile, Efficient and Under Your Control - 1 - INTRODUCTION Most businesses want to spend less time and money building and managing infrastructure to focus resources

More information

VMware vcloud Powered Services

VMware vcloud Powered Services SOLUTION OVERVIEW VMware vcloud Powered Services VMware-Compatible Clouds for a Broad Array of Business Needs Caught between shrinking resources and growing business needs, organizations are looking to

More information

White Paper. Cloud Vademecum

White Paper. Cloud Vademecum White Paper Cloud Vademecum Cloud is the new IT paradigm this document offers a collection of thoughts, internal and external discussions and information. The goal is to inspire and stimulate the route

More information

Solution brief. HP CloudSystem. An integrated and open platform to build and manage cloud services

Solution brief. HP CloudSystem. An integrated and open platform to build and manage cloud services Solution brief An integrated and open platform to build and manage cloud services The industry s most complete cloud system for enterprises and service providers Approximately every decade, technology

More information

Realizing the Value Proposition of Cloud Computing

Realizing the Value Proposition of Cloud Computing Realizing the Value Proposition of Cloud Computing CIO s Enterprise IT Strategy for Cloud Jitendra Pal Thethi Abstract Cloud Computing is a model for provisioning and consuming IT capabilities on a need

More information

Intel, Cisco, and Red Hat deliver a proven solution that reduces risk. Advance Your Cloud Strategy with OpenStack

Intel, Cisco, and Red Hat deliver a proven solution that reduces risk. Advance Your Cloud Strategy with OpenStack Technology Overview Simplify OpenStack * Cloud Deployment Intel, Cisco, and Red Hat deliver a proven solution that reduces risk According to a global survey of 3,643 enterprise executives responsible for

More information

Networking Modernize. Open Your Network to Innovation

Networking Modernize. Open Your Network to Innovation Networking Modernize. Open Your Network to Innovation In a world where real-time information is critical, there s just no room for unnecessary complexity. Did you know? Dell Networking Active Fabric solutions

More information

Take Charge of the Cloud Platform for NFV to Maximize Success

Take Charge of the Cloud Platform for NFV to Maximize Success White Paper Take Charge of the Cloud Platform for NFV to Maximize Success Prepared by Caroline Chappell Principal Analyst, Cloud & NFV, Heavy Reading www.heavyreading.com on behalf of www.vmware.com February

More information

Private & Hybrid Cloud: Risk, Security and Audit. Scott Lowry, Hassan Javed VMware, Inc. March 2012

Private & Hybrid Cloud: Risk, Security and Audit. Scott Lowry, Hassan Javed VMware, Inc. March 2012 Private & Hybrid Cloud: Risk, Security and Audit Scott Lowry, Hassan Javed VMware, Inc. March 2012 Private and Hybrid Cloud - Risk, Security and Audit Objectives: Explain the technology and benefits behind

More information

The Hybrid Cloud: Bringing Cloud-Based IT Services to State Government

The Hybrid Cloud: Bringing Cloud-Based IT Services to State Government The Hybrid Cloud: Bringing Cloud-Based IT Services to State Government October 4, 2009 Prepared By: Robert Woolley and David Fletcher Introduction Provisioning Information Technology (IT) services to enterprises

More information

Improving the Microsoft enterprise. network for public cloud connectivity

Improving the Microsoft enterprise. network for public cloud connectivity Improving the Microsoft enterprise cloud network for public cloud connectivity Page 1 Improving network performance between Microsoft and the public Situation As Microsoft IT located more of its line-ofbusiness

More information

Advancing Towards the Future of Cloud Computing: Intel Open Cloud Vision

Advancing Towards the Future of Cloud Computing: Intel Open Cloud Vision Advancing Towards the Future of Cloud Computing: Intel Open Cloud Vision Nikos G. Panagiotidis Market Development Manager Cisco Connect Athens, 23/4/2013 Growth & IT Challenges Drive Need for Cloud Computing

More information

Taking the Open Path to Hybrid Cloud with Dell Networking and Private Cloud Solutions

Taking the Open Path to Hybrid Cloud with Dell Networking and Private Cloud Solutions Taking the Open Path to Hybrid Cloud with Dell Networking and Private Cloud Solutions In This Paper Frequently, the network is the stumbling point to cloud adoption SDN offers a more dynamic, virtualized

More information

A Comprehensive Cloud Management Platform with Vblock Systems and Cisco Intelligent Automation for Cloud

A Comprehensive Cloud Management Platform with Vblock Systems and Cisco Intelligent Automation for Cloud WHITE PAPER A Comprehensive Cloud Management Platform with Vblock Systems and Cisco Intelligent Automation for Cloud Abstract Data center consolidation and virtualization have set the stage for cloud computing.

More information

vision realize your software-defined with the Digital Data Center from Atos Whitepaper

vision realize your software-defined with the Digital Data Center from Atos Whitepaper realize your software-defined vision with the Digital Data Center from Atos Whitepaper Revolutionize agility and flexibility. Accelerate time to market. Mitigate risk without inhibiting innovation. Reduce

More information

OIT Cloud Strategy 2011 Enabling Technology Solutions Efficiently, Effectively, and Elegantly

OIT Cloud Strategy 2011 Enabling Technology Solutions Efficiently, Effectively, and Elegantly OIT Cloud Strategy 2011 Enabling Technology Solutions Efficiently, Effectively, and Elegantly 10/24/2011 Office of Information Technology Table of Contents Executive Summary... 3 The Colorado Cloud...

More information

Seeing Though the Clouds

Seeing Though the Clouds Seeing Though the Clouds A PM Primer on Cloud Computing and Security NIH Project Management Community Meeting Mark L Silverman Are You Smarter Than a 5 Year Old? 1 Cloud First Policy Cloud First When evaluating

More information

Smart Data Center Solutions

Smart Data Center Solutions Smart Data Center Solutions New Data Center Challenges Require New Solutions Data Center Architecture. Inside and Out. Data centers are mission-critical facilities. A silo-based approach to designing,

More information

The Advantages of Cloud Services

The Advantages of Cloud Services Cloud-Based Services: Assure Performance, Availability, and Security What You Will Learn Services available from the cloud offer cost and efficiency benefits to businesses, but until now many customers

More information

Why Cloud CompuTing ThreaTens midsized enterprises and WhaT To do about it

Why Cloud CompuTing ThreaTens midsized enterprises and WhaT To do about it The Cloud Threat Why Cloud CompuTing ThreaTens midsized enterprises and WhaT To do about it This white paper outlines the concerns that often prevent midsized enterprises from taking advantage of the Cloud.

More information

HP Converged Cloud Cloud Platform Overview. Shane Pearson Vice President, Portfolio & Product Management

HP Converged Cloud Cloud Platform Overview. Shane Pearson Vice President, Portfolio & Product Management HP Converged Cloud Cloud Platform Overview Shane Pearson Vice President, Portfolio & Product Management Cloud is the biggest disruption since the Internet 1970-80s Mainframe 1990s Client/Server 2000s The

More information

The Road to Convergence

The Road to Convergence A UBM TECHWEB WHITE PAPER SEPTEMBER 2012 The Road to Convergence Six keys to getting there with the most confidence and the least risk. Brought to you by The Road to Convergence Six keys to getting there

More information

Cloud Computing the Path to Increased Efficiencies and Cost Savings for Government Agencies

Cloud Computing the Path to Increased Efficiencies and Cost Savings for Government Agencies White Paper Cloud Computing the Path to Increased Efficiencies and Cost Savings for Government Agencies Davis Johnson, NetApp August 2013 WP-7189 Abstract Cloud computing is undergoing rapid adoption by

More information

Introduction to the Open Data Center Alliance SM

Introduction to the Open Data Center Alliance SM Introduction to the Open Data Center Alliance SM Legal Notice This Open Data Center AllianceSM Usage: Security Monitoring is proprietary to the Open Data Center Alliance, Inc. NOTICE TO USERS WHO ARE NOT

More information

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com W H I T E P A P E R O r a c l e V i r t u a l N e t w o r k i n g D e l i v e r i n g F a b r i c

More information

CLOUD TECH SOLUTION AT INTEL INFORMATION TECHNOLOGY ICApp Platform as a Service

CLOUD TECH SOLUTION AT INTEL INFORMATION TECHNOLOGY ICApp Platform as a Service CLOUD TECH SOLUTION AT INTEL INFORMATION TECHNOLOGY ICApp Platform as a Service Open Data Center Alliance, Inc. 3855 SW 153 rd Dr. Beaverton, OR 97003 USA Phone +1 503-619-2368 Fax: +1 503-644-6708 Email:

More information

Flying into the Cloud: Do You Need a Navigator? Services. Colin R. Chasler Vice President Solutions Architecture Dell Services Federal Government

Flying into the Cloud: Do You Need a Navigator? Services. Colin R. Chasler Vice President Solutions Architecture Dell Services Federal Government Services Flying into the Cloud: Do You Need a Navigator? Colin R. Chasler Vice President Solutions Architecture Dell Services Federal Government Table of Contents Executive Summary... 3 Current IT Challenges...

More information

Managing the Real Cost of On-Demand Enterprise Cloud Services with Chargeback Models

Managing the Real Cost of On-Demand Enterprise Cloud Services with Chargeback Models Managing the Real Cost of On-Demand Enterprise Cloud Services with Chargeback Models A Guide to Cloud Computing Costs, Server Costs, Pricing Plans, and Chargeback Implementation and Systems Introduction

More information

A Study on Service Oriented Network Virtualization convergence of Cloud Computing

A Study on Service Oriented Network Virtualization convergence of Cloud Computing A Study on Service Oriented Network Virtualization convergence of Cloud Computing 1 Kajjam Vinay Kumar, 2 SANTHOSH BODDUPALLI 1 Scholar(M.Tech),Department of Computer Science Engineering, Brilliant Institute

More information

maximum Control through 2 lines Cloud Service Brokering

maximum Control through 2 lines Cloud Service Brokering Infrastructure Services the way we see it Cover Next-Gen title Cloud: Helvetica Choice thin, and 30-33 maximum Control through 2 lines Cloud Service Brokering Cloud 2.0 is about more than cost savings.

More information

The Software-Defined Data Center is Key to IT-as-a-Service

The Software-Defined Data Center is Key to IT-as-a-Service The Software-Defined Data Center is Key to IT-as-a-Service August 2013 Prepared by: Zeus Kerravala The Software-Defined Data Center is Key to IT-as-a-Service by Zeus Kerravala August 2013 º º º º º º º

More information

SOFTWARE DEFINED NETWORKING

SOFTWARE DEFINED NETWORKING SOFTWARE DEFINED NETWORKING Bringing Networks to the Cloud Brendan Hayes DIRECTOR, SDN MARKETING AGENDA Market trends and Juniper s SDN strategy Network virtualization evolution Juniper s SDN technology

More information

White Paper on CLOUD COMPUTING

White Paper on CLOUD COMPUTING White Paper on CLOUD COMPUTING INDEX 1. Introduction 2. Features of Cloud Computing 3. Benefits of Cloud computing 4. Service models of Cloud Computing 5. Deployment models of Cloud Computing 6. Examples

More information

The Next Phase of Datacenter Network Resource Management and Automation March 2011

The Next Phase of Datacenter Network Resource Management and Automation March 2011 I D C T E C H N O L O G Y S P O T L I G H T The Next Phase of Datacenter Network Resource Management and Automation March 2011 Adapted from Worldwide Datacenter Network 2010 2015 Forecast and Analysis

More information

1. From the CIO 3. 2. Strategic Direction for Cloud Computing at Kent State 4. 3. Cloud Computing at Kent State University 5

1. From the CIO 3. 2. Strategic Direction for Cloud Computing at Kent State 4. 3. Cloud Computing at Kent State University 5 Kent State University ss Cloud Strategy Table of Contents Item Page 1. From the CIO 3 2. Strategic Direction for Cloud Computing at Kent State 4 3. Cloud Computing at Kent State University 5 4. Methodology

More information

White Paper: Optimizing the Cloud Infrastructure for Enterprise Applications

White Paper: Optimizing the Cloud Infrastructure for Enterprise Applications White Paper: Optimizing the Cloud Infrastructure for Enterprise Applications 2010 Ashton, Metzler, & Associates. All rights reserved. Executive Summary Given the technological and organizational risks

More information

Radware ADC-VX Solution. The Agility of Virtual; The Predictability of Physical

Radware ADC-VX Solution. The Agility of Virtual; The Predictability of Physical Radware ADC-VX Solution The Agility of Virtual; The Predictability of Physical Table of Contents General... 3 Virtualization and consolidation trends in the data centers... 3 How virtualization and consolidation

More information

WHY ALL CLOUDS ARE NOT CREATED EQUAL ENTERPRISE CLOUD, PUBLIC CLOUD, CARRIER CLOUD

WHY ALL CLOUDS ARE NOT CREATED EQUAL ENTERPRISE CLOUD, PUBLIC CLOUD, CARRIER CLOUD WHY ALL CLOUDS ARE NOT CREATED EQUAL ENTERPRISE CLOUD, PUBLIC CLOUD, CARRIER CLOUD STRATEGIC WHITE PAPER Cloud computing technology brings an unprecedented level of independence and liberation in deploying

More information

The NREN s core activities are in providing network and associated services to its user community that usually comprises:

The NREN s core activities are in providing network and associated services to its user community that usually comprises: 3 NREN and its Users The NREN s core activities are in providing network and associated services to its user community that usually comprises: Higher education institutions and possibly other levels of

More information

An Evaluation Framework for Selecting an Enterprise Cloud Provider

An Evaluation Framework for Selecting an Enterprise Cloud Provider An Evaluation Framework for Selecting an Enterprise Cloud Provider WHITE PAPER This White Paper is intended for senior IT leaders of global enterprises considering a new cloud solution or expanding an

More information

Virtualization, SDN and NFV

Virtualization, SDN and NFV Virtualization, SDN and NFV HOW DO THEY FIT TOGETHER? Traditional networks lack the flexibility to keep pace with dynamic computing and storage needs of today s data centers. In order to implement changes,

More information

Red Hat Cloud, HP Edition:

Red Hat Cloud, HP Edition: Red Hat Cloud, HP Edition: Private IaaS Clouds 2 Red Hat Cloud 2 Red Hat Enterprise Virtualization 3 Red Hat Enterprise Linux 3 Red Hat Network Satellite 3 HP CloudSystem Matrix and HP Converged Infrastructure

More information

The Cisco Powered Network Cloud: An Exciting Managed Services Opportunity

The Cisco Powered Network Cloud: An Exciting Managed Services Opportunity . White Paper The Cisco Powered Network Cloud: An Exciting Managed Services Opportunity The cloud computing phenomenon is generating a lot of interest worldwide because of its potential to offer services

More information

THE INS AND OUTS OF CLOUD COMPUTING

THE INS AND OUTS OF CLOUD COMPUTING THE INS AND OUTS OF CLOUD COMPUTING and Its Impact on the Network April 2010 Rev. A 04/10 SPIRENT 1325 Borregas Avenue Sunnyvale, CA 94089 USA Email: Web: sales@spirent.com http://www.spirent.com AMERICAS

More information

Alternatives to Legacy IT Systems: An Unbiased Look at the Current State of the Cloud Market

Alternatives to Legacy IT Systems: An Unbiased Look at the Current State of the Cloud Market Alternatives to Legacy IT Systems: An Unbiased Look at the Current State of the Cloud Market 2012 SAVVIS. All Rights Reserved. 1 Executive Summary There are a limited number of technologies which have

More information

EXTEND YOUR FEDERATION ENTERPRISE HYBRID CLOUD SOLUTION

EXTEND YOUR FEDERATION ENTERPRISE HYBRID CLOUD SOLUTION EXTEND YOUR FEDERATION ENTERPRISE HYBRID CLOUD SOLUTION Accelerate the transition to ITaaS The Federation Enterprise Hybrid Cloud solution establishes a sound foundation for delivering IT as a service

More information

IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation

IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation IBM Cloud Security Draft for Discussion September 12, 2011 IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns surrounding cloud computing

More information

VMware Solutions for Small and Midsize Business

VMware Solutions for Small and Midsize Business SOLUTION BRIEF VMware Solutions for Small and Midsize Business Protect Your Business, Simplify and Save on IT, and Empower Your Employees AT A GLANCE VMware is a leader in virtualization and cloud infrastructure

More information

Boosting Business Agility through Software-defined Networking

Boosting Business Agility through Software-defined Networking Executive Summary: Boosting Business Agility through Software-defined Networking Completing the last mile of virtualization Introduction Businesses have gained significant value from virtualizing server

More information

VMware Hybrid Cloud. Accelerate Your Time to Value

VMware Hybrid Cloud. Accelerate Your Time to Value VMware Hybrid Cloud Accelerate Your Time to Value Fulfilling the Promise of Hybrid Cloud Computing Through 2020, the most common use of cloud services will be a hybrid model combining on-premises and external

More information

A ROAD MAP FOR GEOSPATIAL INFORMATION SYSTEM APPLICATIONS ON VBLOCK INFRASTRUCTURE PLATFORMS

A ROAD MAP FOR GEOSPATIAL INFORMATION SYSTEM APPLICATIONS ON VBLOCK INFRASTRUCTURE PLATFORMS A ROAD MAP FOR GEOSPATIAL INFORMATION SYSTEM APPLICATIONS ON VBLOCK INFRASTRUCTURE PLATFORMS June 2011 WHITE PAPER 2011 VCE Company LLC, All rights reserved. 1 Table of Contents Executive Overview... 3

More information

OWASP Chapter Meeting June 2010. Presented by: Brayton Rider, SecureState Chief Architect

OWASP Chapter Meeting June 2010. Presented by: Brayton Rider, SecureState Chief Architect OWASP Chapter Meeting June 2010 Presented by: Brayton Rider, SecureState Chief Architect Agenda What is Cloud Computing? Cloud Service Models Cloud Deployment Models Cloud Computing Security Security Cloud

More information

Intel IT s Cloud Journey. Speaker: [speaker name], Intel IT

Intel IT s Cloud Journey. Speaker: [speaker name], Intel IT Intel IT s Cloud Journey Speaker: [speaker name], Intel IT Accelerating The Corporate IT Journey Cloud enables ubiquitous access to resources and applications, and workload flexibility Cloud IaaS Infrastructure

More information

Top five lessons learned from enterprise hybrid cloud projects

Top five lessons learned from enterprise hybrid cloud projects Top five lessons learned from enterprise hybrid cloud projects Top performer highlights More than half of top performers give users access to selfservice provisioning across both private and public cloud

More information

A Look into the Cloud

A Look into the Cloud A Look into the Cloud An Allstream White Paper 1 Table of contents Why is everybody talking about the cloud? 1 Trends driving the move to the cloud 1 What actually is the cloud? 2 Private and public clouds

More information

Data Center Solutions

Data Center Solutions Data Center Solutions New Data Center Challenges Require New Solutions Data Center Architecture. Inside and Out. Data centers are mission-critical facilities. A silo-based approach to designing, deploying

More information

IT Services. Capita Private Cloud. Cloud potential unleashed

IT Services. Capita Private Cloud. Cloud potential unleashed IT Services Capita Private Cloud Cloud potential unleashed Cloud computing at its best Cloud is fast becoming an integral part of every IT strategy. It reduces cost and complexity, whilst bringing freedom,

More information

Enterprise Cloud Solutions

Enterprise Cloud Solutions IT(O) IT Outsourcing Options Enterprise Cloud Solutions CloudAgile Select Partner PDF v2.2 9/11/12 Cloud Computing with Latisys With the Latisys Cloud, your Enterprise can: Achieve unprecedented control,

More information