Security Considerations for Cloud Deployment
|
|
|
- Norman Marsh
- 10 years ago
- Views:
Transcription
1 Security Considerations for Cloud Deployment Jeff Uehling, IBM i Network & Security Development [email protected] IBM - Rochester, MN
2 What is Cloud Computing? Is Cloud Computing really a new concept?
3 What is Cloud Computing? An IT consumption and delivery model Cloud computing is a consumption and delivery model inspired by consumer Internet service and is optimized for IT / Business Services Cloud enables: User self-service Outsourcing options Dynamic scalability Multiple types of clouds will coexist: Private Deployed Inside a customer s firewall Public Provided and managed by a 3 rd party via subscription Hybrid a mix of Public and Private models based on Workload An effective cloud deployment is built on a dynamic Infrastructure and should be part of an overall Data Center transformation plan
4 Clouds enable a broad spectrum of deployment options IBM Corporation IBM Corporation
5 Cloud Differentiators There are Many! Time to Deploy a Server Weeks or Months Seconds to Minutes Commitment to use Service Negotiate & Commit Year-long Contract Select from Catalog & Pay As You Go Necessary Upfront Investment $ $K-$M in Infrastructure $$ per IT hour No or Low Upfront per IT hour
6 IT Benefits from Cloud Computing are Real Results from IBM cloud computing engagements Increasing speed and flexibility Test provisioning Weeks Minutes Change management Months Days/hours Release management Weeks Minutes Service access Administered Self-service Standardization Complex Reuse/share Metering/billing Fixed cost Variable cost Reducing costs Server/storage utilization 10 20% 70 90% Payback period Years Months Source: Based on IBM and client experience.
7 Cloud technologies can offer operational expense reductions and improved service at all layers People Services Agents End Users Support Community Crowdsourcing Retail Banking Trade & SC Finance Payments Mobile Banking Front Office Optimization Business Services Customer Care Payments Int. Risk Mgmt. Application Services Platform Services Experience Management. Industry Frameworks & Information Foundation End User Interaces Fulfillment Assurance Billing Service Cloud Business & Operations Support Dynamic Provisioning Mashup Server Service/Software Catalogs Open Foundation (WS Framework, Service Bus) Process & Policy Mgmt. Problem & Change Mgmt. B2B Partnerships Infrastructure Services Distributed Cloud Computing Services Data Mgmt. Virtualization Workload Mgmt SLA & Capacity Provisioning Security Monitoring
8 Cloud: because the majority of IT cost is in people, Cloud Computing is becoming popular at the higher layers People Services MBPS (ehr, LBPS, etc.) Live Mesh Service Cloud Layers Business Services Application Services Platform Services ISSC/SO BCRS Live ISS Infrastructure Services Static, dedicated, outsourced Network-delivered, off-premises Shared, automated, dynamic
9 What Cloud Services are available today? Hundreds Thousands growing by the day!
10 Market Examples Cloud Delivery Examples IBM Examples Collaboration CRM/ERP/HR Business Processes Industry Applications Software-as-a-Service Middleware Web 2.0 Application Runtime Java Runtime Database Development Tooling Platform-as-a-Service Developer Cloud Data Center Servers Networking Storage Fabric Shared virtualized, dynamic provisioning Infrastructure-as-a-Service Computing on Demand
11 Top public workloads Audio/video/Web conferencing Service help desk Infrastructure for training and demonstration WAN capacity and VoIP infrastructure Desktop Test environment infrastructure Storage Data center network capacity Server Infrastructure and collaboration workloads emerge as most appropriate for a Public offering Top private workloads Data mining, text mining, or other analytics Data warehouses or data marts Business continuity and disaster recovery Test environment infrastructure Long-term data archiving/preservation Transactional databases Industry-specific applications ERP applications Database, application and infrastructure workloads emerge as most appropriate for a Private offering
12 Cloud Usage Models 1. End User to Cloud - Application running on the cloud with access for end-users 2. Enterprise to Cloud to End-user (Interoperability) - Applications running in the public cloud access from employees and customers 3. Enterprise to Cloud (Integration) - Cloud application integrated with internal IT capabilities 4. Enterprise to Cloud to Enterprise (Interoperability) - Cloud application running in the public cloud and interoperates with partner applications (supply chain) 5. Enterprise to Cloud (Portability) - Cloud application running in the cloud flexibility to move to a different cloud provider in the future or in-house 6. Private (intra) Clouds - Interoperability / integration within elements of a private cloud and between a private cloud and a traditional environment
13 Model 1: End User to Cloud What is it? Application running in the cloud with access for end-users Scenarios : Get new Web app provisioned worldwide quickly (e.g., the next facebook, linkedin, gmail, etc ) Don t need IT infrastructure, flexible acquisition Public Cloud Application
14 Model 2: Enterprise to Cloud to End-user What is it: Deploy cloud based application specifically for the cloud access for employees and for customers Scenarios: Online sales through catalog, needs to link back into enterprise systems for fulfillment web app and shopping cart in cloud, fulfillment inside existing enterprise systems Two sub-models End User is employee in the Enterprise (e.g., Travel Expense Account application) End User is Web customer outside the Enterprise (e.g., online sales) Public Cloud Application External Internal Enterprise IT (Traditional, Private Cloud or Hybrid)
15 Model 3: Enterprise to Cloud (Integration) What is it? Cloud application integrated with internal IT capabilities Scenarios : Typical approach of integrate with existing on premises and offpremises capabilities or other cloud application (customer list, access control, data) Integrate with existing on premise capabilities Public Cloud B Application / Data External Internal Enterprise IT (Traditional, Private Cloud or Hybrid)
16 Model 4: Enterprise to Cloud to Enterprise What is it? Cloud application running in the public cloud interoperate with partner applications (supply chain) Scenarios : Brokers, common function providers (e.g., supply chain, broadcast recall to multiple customers, broadcast RFP to suppliers, classic B2B) Large manufacturer A Public Cloud Application External Internal Large manufacturer B
17 Model 5: Enterprise to Cloud (Portability) What is it? Cloud application and/or data running in the cloud flexibility to move to a different cloud provider in the future or in-house Scenarios: Flexibility and choice to change application platform suppliers Write once, run anywhere Public Cloud A Application / Data Move to another cloud Public Cloud B Application / Data External Move inhouse Internal Application / Data Enterprise IT (Traditional, Private Cloud or Hybrid)
18 IBM Power Systems Model 6: Private (intranet) Cloud What is it? A private cloud-based service, offers many of the benefits of a public cloud computing environment. The difference is that data and processes are managed within the organization. Scenarios: The enterprise would leverage a private cloud to provide Self-service capabilities, real-time infrastructure. Interoperability / integration within elements of a private cloud and between a private cloud and a traditional environment On-Premise or Off Premise Private Cloud OS Images (Virtual / Physical) External Internal Database Schema /Instances Storage (SAN/NAS)
19 If this is so logical Why isn t everyone doing it?
20 So what type of business and security challenges does cloud computing introduce? Today s Data Center Tomorrow s Public Cloud We Have Control It s located at X. It s stored in server s Y, Z. We have backups in place. Our admins control access. Our uptime is sufficient. The auditors are happy. Our security team is engaged. Who Has Control? Where is it located? Where is it stored? Who backs it up? Who has access? How resilient is it? How do auditors observe? How does our security team engage?
21 Security is a top concern with cloud computing The Tale of two studies shows that Security is the number one inhibitor to customers adopting cloud technologies. What, if anything, do you perceive as actual or potential barriers to acquiring public cloud services? Security/privacy of company data 69% Service quality Doubts about true cost savings Performance / Insufficient responsiveness over network Difficulty integrating with in-house IT 54% 53% 52% 47% Source: IBM Market Insights, Cloud Computing Research Source: Oliver Wyman Interviews
22 Gartner s security risks of cloud computing Privileged User Access Data Segregation Data Recovery Investigative Support Regulatory Compliance Data Location Disaster Recovery Gartner: Assessing the Security Risks of Cloud Computing, June 2008
23 Risks introduced by cloud computing Restrictions imposed by industry regulations over the use of clouds for some application Challenges with an increase in potential unauthorized exposure when migrating workloads to a shared network and compute infrastructure Data Security Over where the information is located and stored, who has access and backups, how is it monitored & managed including resiliency Less Control Control needed to manage firewall and security settings for applications and runtime environments in the cloud Security Management Concerns with high availability and loss of service should outages occur Compliance Reliability
24 Top 10 factors for a secure Cloud Infrastructure Data Protection Access and Identity Application Provisioning & Deprovisioning Application & Environment Testing Service Level Agreement Vulnerability Management Business Resiliency Audit & Governance Cross Border Protection Intellectual Property & Export Laws
25 What are the Risks Policy and Organizational Risk - Things that may directly degrade the ability of the consumer organization to conduct business in efficient manner Legal Risk - Things that may put the consumer organization in breach of the law or that may prevent compliance with specific legal mandates Technical Risk - Things that may disrupt normal operations of the consumer organization or cause loss of value over intangible assets (data, reputation, etc.) Transitional Risk - Things that may temporarily put the consumer organization s traditional infrastructure and operations under increased risk
26 Policy and Organizational Risk 5 INTRINSIC RISKs 1. Resource sharing and pooling - Data (intangible assets) can not be tied to physical assets (tangible HW resources), assets must be referenced by their content not their supporting media or storage location 2. Network accesses - Porous perimeter, authorization & authentication become more important issues 3. Service elasticity and scalability - Grow-on-demand and pay-as-you-go can backfire. Seemingly infinite capacity may not be so under attack. 4. On-demand self-service - Hijacking of the consumer s control plane (user interface. 5. Measured service - Economic denial of service, depletion of service quota
27 Legal Risks E-discovery and Subpoena - Where is the evidence that I need to hand out? Intangible assets cannot be mapped to physical assets or geographical locations. Service provider may not be cooperative. Resources are pooled and shared so they can t be taken without affecting co-tenants and/or service provider operations. Change of jurisdiction - Which privacy (Data protection ) and security laws are applicable when intangible assets and processes are outsourced to service providers with distributed data centers across several continents? Do national laws local to the service provider s data center supersede those local to consumer s organization? Data protection - It can be difficult for the cloud customer (in its role of data controller) to effectively check the data processing that the cloud provider carries out, and thus be sure that the data is handled in a lawful way. Conflicting data encryption standard requirements, lack of notification of data breaches by the service provider, storage of data collected unlawfully by co-tenants.
28 Technical Risks Isolation failure - Break out of the VM, storage compartment, virtual network, VPN, etc. Compromise of the management interface - Hijack of the consumer organization s cloud computing infrastructure, loss of control plane (user interface). Data leakage Data Leakage to co-tenants (Intra-cloud ) or from the cloud Insecure data lifecycle management - Insecure or ineffective deletion of data, loss of consistency, data duplication Economic denial of service - Depletion of quota vs. runaway service costs vs loss of efficiency Coarse access control - Insufficient granularity to implement authentication, authorization or auditing controls Conflicting Provider- Consumer security standards - Provider can t meet the consumer organization s security requirements
29 Transitional Risks Disruption of endpoint security - Cloud applications that require installation of client-side components or use of specific desktop applications may weaken the consumer s security posture Credential Leakage - Improper lifecycle management of credentials needed to access cloud applications. Shared access for testing purposes, open access to cloud user interface Punctured perimeter - Punching temporary holes in network filtering rules. Network IDS with lost visibility, tunneling. Transitive trust - Internal/ legacy applications suddenly made to transitively trust the cloud. Reuse of credentials, hard-coded passwords, certificates, etc.
30 Security complexities raised by virtualization New complexities: Dynamic relocation of VMs Increased infrastructure layers to manage and protect Multiple operating systems and applications per server Elimination of physical boundaries between systems Manually tracking software and configurations of VMs Risk depends on cloud type Public cloud riskiest (mixed tenants) Private cloud least risky (BAU) but places higher demands on the company Hybrid (private + public) provides a balanced solution sensitive data stays private public cloud used for non-sensitive data. Can be always or just for demand spikes 1:1 ratio of OSs and applications per server 1:Many ratio of OSs and applications per server Additional layer to manage and secure
31 Different cloud workloads have different risk profiles One-size does not fit-all High Mission-critical workloads, personal information Tomorrow s high value / high risk workloads need: Need for Security Assurance Analysis & simulation with public data Quality of protection adapted to risk Direct visibility and control Significant level of assurance Today s clouds are primarily here: Low Training, testing with non-sensitive data Low-risk Mid-risk High-risk Business Risk Lower risk workloads One-size-fits-all approach to data protection No significant assurance Price is key
32 IBM Cloud Offerings
33 IBM s Cloud Portfolio Consulting Services in support of Cloud Computing Infrastructure Strategy & Planning Strategy & Change Services for Cloud Adoption Strategy & Change Services for Cloud Providers Testing Services for Cloud Networking Strategy & Optimization Smart Business Offerings: comprehensive cloud solutions for infrastructure workloads Development and Test Desktop Infrastructure Storage Analytics Collaboration Workloads available on multiple delivery models... with embedded service management Infrastructure services & technologies enabling cloud computing Services Security Resiliency optimization (BCRS) Data Center Tivoli Live Monitoring Maintenance Technologies Tivoli Service Automation Manager WebSphere Hypervisor Edition
34 IBM Cloud Services Portfolio Analytics Collaboration Development and test Desktop and devices Infrastructure compute Infrastructure storage Business services Smart business on the IBM cloud Standardized services on the IBM cloud IBM Lotus Live IBM Lotus inotes Smart Business Development and Test on the IBM Cloud (beta) IBM Smart Business Desktop Cloud Smart Business End User Support IBM Computing on Demand IBM Information Protection Services BPM BlueWorks (design tools) Smart business expense reporting on the IBM cloud IBM Smart Business Services Private cloud services, behind your firewall, built and/or managed by IBM IBM Smart Analytics Cloud IBM Smart Business Test Cloud IBM Smart Business Desktop Cloud IBM Smart Business Storage Cloud IBM Smart Business Systems Preintegrated, workloadoptimized systems IBM Smart Analytics System IBM CloudBurst family IBM Information Archive Smart Business for Small or Midsize Business (backed by the IBM Cloud) Global Technology Services
35 Cloud Solutions for Power Systems Tivoli Service Automation Manager (TSAM) Tivoli Provisioning Manager (TPM) IBM Systems Director and VMControl Cloud services definition and provisioning Software full lifecycle management Policy creation and enforcement Power System Pools simplicity Policy-based workload resilience Best-practices image management Automated SAN provisioning Tivoli Storage Productivity Center (TPC) SAN Volume Controller (SVC) Simplified SAN management Integration with VMControl for automated disk provisioning Best-of-breed Power Systems Virtualization Sharing and dynamic allocation of resources across environments Multi-OS support: AIX, i, Linux IBM DS5000, DS8000, XIV; EMC; HDS Heterogeneous storage management Decoupling of physical and virtual storage Pooling for increased virtualization
36 IBM i as a Cloud Server
37 Current IBM i strengths Strengths - stands out in multi-tenant Good Isolation Object-based architecture IBM i enforced Security and encryption Database schema and IASP isolation System Director WebSphere separate enterprise applications role-based security Memory Pools Subsystems Processor Pools Group Profiles Active Memory Sharing In short, a multi-user, multi-app OS from day 1
38 IBM i Hosting Environment One server stack for each tenant One OS stack for each tenant One AP Stack for each tenant One application Stack per tenant Single app. servicing multi tenants Tenant Tenant Tenant Tenant Tenant Tenant Tenant Tenant Tenant Tenant Enabling Technology App App App App App App App App Application Apache web servers WebSphere Application Servers IBM i subsystems AP AP AP AP AP AP AP AP DB2 for i Independent Storage Pools Schema isolation DP DP DP DP Data Platform Data Platform Data Platform Subsystems, Memory Pools Threads, Users/Groups Validation lists OS OS OS OS Operating System Operating System Operating System PowerVM PowerHA Systems Director Infrastr. Infrastr. Infrastructure Infrastructure Infrastructure Infrastructure Data center floor Data center floor Data center floor Data center floor Data center floor Legend: Dedicated Shared I Physical-level or isolated multitenancy II Shared Hardware multi-tenancy III Operating System-level multi-tenancy IV Platform-level multi-tenancy V Application-level multi-tenancy IBM i performs well here IBM i performs very well here
39 IBM i Vision toward Cloud Enablement Physical systems Internal storage Static resource partitions Manual setup Physical media install Licensing per core Backups Past Virtual resources External storage w/ VIOS and SAN Dynamic resources for partitions Network install and backups Scripted partition creation Licensing per core HA Present Partition mobility Partition hibernation Image (partition) provisioning/cloning Virtualized everything Workflow automation More granular licensing Flash copy checkpoints and snapshots HA Potential Future enhancements
40 IBM CloudBurst
41 What is IBM CloudBurst? A complete, pre-packaged cloud environment. Includes both hardware and software CloudBurst on Power is slated for 4Q 2010 delivery (v2.1) Market splash: The IBM CloudBurst solution on Power is planned to provide everything you need for a private cloud environment including Tivoli service management software, storage, network and the most efficient platform for cloud computing with Power Systems, enabling customers to rapidly realize the benefits of cloud computing
42 IBM Cloudburst an Integrated Cloud solution Usage and Accounting Provide metering and accounting for cloud services Enable integration to billing systems if needed IBM Cloudburst Built for Purpose Cloud Solution Monitoring Monitor both physical and virtual server environments High Availability Make management system DB highly available Virtualized HW Management Enhanced management of the virtual environment Energy Management Energy management of the hardware infrastructure Tivoli Service Automation Manager (TSAM) Orchestration of Cloud operations Integration point for service mgmt capabilities Service catalog and templates Automated provisioning of virtual systems Server, Storage, Network HW Preinstalled and configured on IBM hardware
43 IBM CloudBurst Roadmap 2010 Optimized for Development & Test Workloads 2009 Optimized for Production Workloads IBM CloudBurst 1.2 Delivered! New! IBM CloudBurst Future New Enhancements Energy metrics integrated with IT service management system Accounting, usage and metering High availability configuration Enhanced security options Integrated with WebSphere CloudBurst Key Enhancements Expand HW Platform to Power Systems, idataplex, and System Z Cloud Analytics and Dashboard capabilities Cloud capacity Planning Enhanced security & resiliency options Compliance reporting options Integration with public cloud offerings IBM CloudBurst 1.1 IBM WebSphere CloudBurst Appliance Capabilities System X BladeCenter HW; scalable and modular GTS CloudBurst QuickStart Services Request, Deploy and Manage VMWare virtual environments Energy Utilization metrics Backup and Recovery
44 Thank you! For more information, please visit: ibm.com/cloud Or, contact me: Jeff Uehling
Cloud Security: The Grand Challenge
Dr. Paul Ashley IBM Software Group [email protected] Cloud Security: The Grand Challenge Outline Cloud computing: the pros, the cons, the blind spots Security in the cloud - what are the risks now and
Cloud computing: the IBM point of view
Building an Smarter Planet with Dynamic Infrastructure Cloud computing: the IBM point of view Ciro Puglisi, Infrastructure Offering Leader, CEEMEA [email protected], +41 58 333 4157 Cloud Computing can go
Cloud Computing Landscape: The Importance Of Standards
Cloud Computing Landscape: The Importance Of Standards Ndu Emuchay, Chief Architect, Cloud Computing Client Engagements IBM Corporation July 22, 2009 Abstract Customers expect the Cloud Services they use
What s Behind the Clouds? An IBM view of Cloud Computing & Montpellier Customer Center experience
Products and Solutions Support Center of Montpellier What s Behind the Clouds? An IBM view of & Montpellier Customer Center experience François Briant - Distinguished Engineer WW STG Customer Centers Chief
Cloud Computing. Jean-Claude DISPENSA IBM Distinguished Engineer
Cloud Computing Jean-Claude DISPENSA IBM Distinguished Engineer Best Student Recognition Event July 6-8, 2011 EMEA IBM Innovation Center La Gaude, France Business needs are growing - IT costs are increasing
How To Manage Cloud Computing
IBM Nederland B.V. Cloud Computing Why, what, how? Ronald Zoutendijk, [email protected] Johan Arts, [email protected] 1 Why Cloud Computing? Complexiteit Agenda 1 Why Cloud Computing? 2 What is Cloud
IBM Cloud Computing for SAP
IBM Cloud Computing for SAP Bernd Schoener Alliance Technology Manager IBM SAP Competence Center Walldorf Agenda Cloud Computing Introduction IBM Strategy and Offering for Cloud Computing SAP Product Strategy
IBM Security in the Cloud
Cesare Radaelli Security Tiger Team Leader, Italy IBM Security Solutions IBM Security in the Cloud What is cloud computing? Cloud is an emerging consumption and delivery model for many IT-based services,
Introduction to Cloud Computing
Frans Baas IBM Innovation Center Benelux January 2011 V1.2 Introduction to Cloud Computing Content Why Cloud and why now? What is Cloud Computing? Customer Cloud case Developing Cloud workflows Developing
IBM 000-281 EXAM QUESTIONS & ANSWERS
IBM 000-281 EXAM QUESTIONS & ANSWERS Number: 000-281 Passing Score: 800 Time Limit: 120 min File Version: 58.8 http://www.gratisexam.com/ IBM 000-281 EXAM QUESTIONS & ANSWERS Exam Name: Foundations of
IBM Cloud Computing for SAP. 2010 IBM Corporation
IBM Cloud Computing for SAP Agenda IBM Strategy and Offering for Cloud Computing SAP Product Strategy Cloud Computing for SAP Customers IBM Cloud Solutions for SAP Customers 2 IBM Strategy and Offerings
IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation
IBM Cloud Security Draft for Discussion September 12, 2011 IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns surrounding cloud computing
IBM & Cloud Computing. Smarter Planet. John Easton UK & Ireland Cloud Computing Technical Leader
Cloud Getting hold Computing of the cloud: for a & Cloud Computing Smarter Planet John Easton UK & Ireland Cloud Computing Technical Leader Copyright Corporation 2010 Cloud is important to Corporation
Hybrid Cloud Computing
Dr. Marcel Schlatter, IBM Distinguished Engineer, Delivery Technology & Engineering, GTS 10 November 2010 Hybrid Computing Why is it becoming popular, Patterns, Trends, Impact Hybrid Definition and Scope
CLOUD SECURITY: THE GRAND CHALLENGE
Government Ware: GovWare Singapore September 29, 2010 CLOUD SECURITY: THE GRAND CHALLENGE Glen Gooding Asia Pacific Security Leader IBM Corporation [email protected] Rest safe: Google saves the day
Marco Mantegazza WebSphere Client Technical Professional Team IBM Software Group. Virtualization and Cloud
Marco Mantegazza WebSphere Client Technical Professional Team IBM Software Group Virtualization and Cloud Agenda Cloud Computing: Introduction How to build private Cloud with WebSphere WebSphere Virtual
Security and Cloud Computing
Security and Cloud Computing Martin Borrett, Lead Security Architect NE Europe, WW Service Management Tiger Team IBM Software Optimising the World s Infrastructure 27th May - London Agenda Brief Introduction
Security Issues in Cloud Computing
Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources
journey to a hybrid cloud
journey to a hybrid cloud Virtualization and Automation VI015SN journey to a hybrid cloud Jim Sweeney, CTO GTSI about the speaker Jim Sweeney GTSI, Chief Technology Officer 35 years of engineering experience
Oracle Cloud Computing Strategy
Oracle Cloud Computing Strategy Han Wammes Public Sector Market Development Manager 1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Safe Harbor Statement The following is intended
Learn How to Leverage System z in Your Cloud
Learn How to Leverage System z in Your Cloud Mike Baskey IBM Thursday, February 7 th, 2013 Session 12790 Cloud implementations that include System z maximize Enterprise flexibility and increase cost savings
Clodoaldo Barrera Chief Technical Strategist IBM System Storage. Making a successful transition to Software Defined Storage
Clodoaldo Barrera Chief Technical Strategist IBM System Storage Making a successful transition to Software Defined Storage Open Server Summit Santa Clara Nov 2014 Data at the core of everything Data is
Kristin Donceel ([email protected]) June 2013. 2013 IBM Corporation
The Story of Cloud and IBM zenterprise - Accelerating Cloud with IBM zenterprise - A secure cloud for data enables enterprises to improve service to their customers Kristin Donceel ([email protected])
Integrated service management and cloud computing:
IBM Global Technology Services Thought Leadership White Paper September 2010 Integrated service management and cloud computing: More than just technology best friends 2 Integrated service management and
The Journey to Cloud Computing: from experimentation to business reality
The Journey to Cloud Computing: from experimentation to business reality Judith Hurwitz, President Marcia Kaufman, COO Sponsored by IBM The Journey to Cloud Computing: from experimentation to business
C2030-280.Examcollection.Premium.Exam.34q
C2030-280.Examcollection.Premium.Exam.34q Number: C2030-280 Passing Score: 800 Time Limit: 120 min File Version: 32.2 http://www.gratisexam.com/ Exam Code: C2030-280 Exam Name: IBM Cloud Computing Infrastructure
What Cloud computing means in real life
ITU TRCSL Symposium on Cloud Computing Session 2: Cloud Computing Foundation and Requirements What Cloud computing means in real life Saman Perera Senior General Manager Information Systems Mobitel (Pvt)
Cloud Security 2011. Prof. Dr. Michael Waidner Fraunhofer SIT CASED. Fraunhofer SIT. Fraunhofer-Gesellschaft 2011
Fraunhofer-Gesellschaft 2011 Cloud Security 2011 Prof. Dr. Michael Waidner Fraunhofer SIT CASED 1 Fraunhofer SIT Security and Privacy»made in Darmstadt«Center for Advanced Security Research Darmstadt 170
VALUE PROPOSITION FOR SERVICE PROVIDERS. Helping Service Providers accelerate adoption of the cloud
VALUE PROPOSITION FOR SERVICE PROVIDERS Helping Service Providers accelerate adoption of the cloud Partnership with Service Providers Enabling Your Cloud Services in Complex Environments Today s challenge
Oracle Cloud Strategy. Sudip Datta Vice President of Product Management
Oracle Cloud Strategy Sudip Datta Vice President of Product Management The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated
Effective Storage Management for Cloud Computing
IBM Software April 2010 Effective Management for Cloud Computing April 2010 smarter storage management Page 1 Page 2 EFFECTIVE STORAGE MANAGEMENT FOR CLOUD COMPUTING Contents: Introduction 3 Cloud Configurations
The New Economics of Cloud Computing
The New Economics of Cloud Computing Doug Jones Agenda Overview of Cloud Computing Adoption Considerations Cloud Solution Examples 2 Cloud is disruptive... Learning from previous Disruptive Technology
Securing the Cloud with IBM Security Systems. IBM Security Systems. 2012 IBM Corporation. 2012 2012 IBM IBM Corporation Corporation
Securing the Cloud with IBM Security Systems 1 2012 2012 IBM IBM Corporation Corporation IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns
Security Officer s Checklist in a Sourcing Deal
Security Officer s Checklist in a Sourcing Deal Guide Share Europe Ostend, May 9th 2014 Johan Van Mengsel IBM Distinguished IT Specialist IBM Client Abstract Sourcing deals creates opportunities and challenges.
Private & Hybrid Cloud: Risk, Security and Audit. Scott Lowry, Hassan Javed VMware, Inc. March 2012
Private & Hybrid Cloud: Risk, Security and Audit Scott Lowry, Hassan Javed VMware, Inc. March 2012 Private and Hybrid Cloud - Risk, Security and Audit Objectives: Explain the technology and benefits behind
SOLUTION BRIEF Citrix Cloud Solutions Citrix Cloud Solution for On-boarding
SOLUTION BRIEF Citrix Cloud Solutions Citrix Cloud Solution for On-boarding www.citrix.com Contents Introduction... 3 The On- boarding Problem Defined... 3 Considerations for Application On- boarding...
Cloud computing in the Enterprise: An Overview
Systems & Technology Group Cloud computing in the Enterprise: An Overview v Andrea Greggo Cloud Computing Initiative Leader, System z Market Strategy What is cloud computing? A user experience and a business
Simplified Private Cloud Management
BUSINESS PARTNER ClouTor Simplified Private Cloud Management ClouTor ON VSPEX by LOCUZ INTRODUCTION ClouTor on VSPEX for Enterprises provides an integrated software solution for extending your existing
Defining a framework for cloud adoption
IBM Global Technology Thought Leadership White Paper Computing Defining a framework for cloud adoption How common ground can help enterprises drive success with cloud computing 2 Defining a framework for
Cloud Infrastructure Management - IBM VMControl
Cloud Infrastructure Management - IBM VMControl IBM Systems Director 6.3 VMControl 2.4 Thierry Huche IBM France - Montpellier [email protected] 2010 IBM Corporation Topics IBM Systems Director /
Data Center Technologies
Data Center Technologies Ing. Marcel Kuza [email protected] Agosto, 2010 XI Jornadas de Actualización Tecnológica: Networking, Punta del Este, Uruguay Agenda Introduction to Data Center Solutions (by IBM)
Cutting Through the Hype: Straight Talk About the Mainframe and Cloud Computing. Straight talk on cloud computing
Glenn Anderson, IBM Lab Services and Training Cutting Through the Hype: Straight Talk About the Mainframe and Cloud Computing Summer SHARE August 2014 Session 15593 Straight talk on cloud computing What
The Impact of PaaS on Business Transformation
The Impact of PaaS on Business Transformation September 2014 Chris McCarthy Sr. Vice President Information Technology 1 Legacy Technology Silos Opportunities Business units Infrastructure Provisioning
Microsoft Private Cloud
Microsoft Private Cloud Lorenz Wolf, Solution Specialist Datacenter, Microsoft SoftwareOne @ Au Premier Zürich - 22.03.2011 What is PRIVATE CLOUD Private Public Public Cloud Private Cloud shared resources.
Assessing Risks in the Cloud
Assessing Risks in the Cloud Jim Reavis Executive Director Cloud Security Alliance Agenda Definitions of Cloud & Cloud Usage Key Cloud Risks About CSA CSA Guidance approach to Addressing Risks Research
Cloud Computing. Bringing the Cloud into Focus
Cloud Computing Bringing the Cloud into Focus November 2011 Introduction Ken Cochrane CEO, IT/NET Partner, KPGM Performance and Technology National co-leader IT Advisory Services KPMG Andrew Brewin Vice
Establishing a Private Cloud
SPONSORED CONTENT Fireside Chat Solutions Brief Establishing a Private Cloud By Miklos Sandorfi, Vice President of Solutions & Cloud, Hitachi Data Systems Claude Lorenson, Senior Product Manager, Cloud
Cloud Service Metering, Accounting and Billing
Jürgen Schneider IBM Distinguished ngineer [email protected] Metering, Accounting and Universität Stuttgart, 10.03.2010 2009 IBM Corporation Computing, Metering, Report & Analytics Agenda 1. Introduction
Intel IT Cloud 2013 and Beyond. Name Title Month, Day 2013
Intel IT Cloud 2013 and Beyond Name Title Month, Day 2013 Legal Notices This presentation is for informational purposes only. INTEL MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY. Intel and the
OpenNebula Open Souce Solution for DC Virtualization. C12G Labs. Online Webinar
OpenNebula Open Souce Solution for DC Virtualization C12G Labs Online Webinar What is OpenNebula? Multi-tenancy, Elasticity and Automatic Provision on Virtualized Environments I m using virtualization/cloud,
Fundamental Concepts and Models
Chapter 4: Fundamental Concepts and Models Nora Almezeini MIS Department, CBA, KSU From Cloud Computing by Thomas Erl, Zaigham Mahmood, and Ricardo Puttini(ISBN: 0133387526) Copyright 2013 Arcitura Education,
Oracle Reference Architecture and Oracle Cloud
Oracle Reference Architecture and Oracle Cloud Anbu Krishnaswamy Anbarasu Enterprise Architect Social. Mobile. Complete. Global Enterprise Architecture Program Safe Harbor Statement The following is intended
WHITE PAPER: Egenera Cloud Suite for EMC VSPEX. The Proven Solution For Building Cloud Services
WHITE PAPER: Egenera Cloud Suite for EMC VSPEX The Proven Solution For Building Cloud Services Build, Manage and Protect Your Cloud with the VSPEX Certified Egenera Cloud Suite Today, organizations are
Public Cloud Service Definition
Public Version 1.5 TECHNICAL WHITE PAPER Table Of Contents Introduction... 3 Enterprise Hybrid Cloud... 3 Public Cloud.... 4 VMware vcloud Datacenter Services.... 4 Target Markets and Use Cases.... 4 Challenges
JOURNAL OF OBJECT TECHNOLOGY
JOURNAL OF OBJECT TECHNOLOGY Online at www.jot.fm. Published by ETH Zurich, Chair of Software Engineering JOT, 2010 Vol. 9, No. 2, March-April 2010 Architected Cloud Solutions Revealed Mahesh H. Dodani,
Who moved my cloud? Part I: Introduction to Private, Public and Hybrid clouds and smooth migration
Who moved my cloud? Part I: Introduction to Private, Public and Hybrid clouds and smooth migration Part I of an ebook series of cloud infrastructure and platform fundamentals not to be avoided when preparing
SaaS A Product Perspective
SaaS A Product Perspective Software-as-a-Service (SaaS) is quickly gaining credibility and market share against traditional packaged software. This presents new opportunities for product groups and also
Are You Prepared for the Cloud? Nick Kael Principal Security Strategist Symantec
Are You Prepared for the Cloud? Nick Kael Principal Security Strategist Symantec What is Cloud Computing? Cloud Computing refers to the delivery of software (SaaS), infrastructure (IaaS), and/or platform
Virtualization and IaaS management
CLOUDFORMS Virtualization and IaaS management Calvin Smith, Senior Solutions Architect [email protected] VIRTUALIZATION TO CLOUD CONTINUUM Virtual Infrastructure Management Drivers Server Virtualization
When millions need access: Identity management in an increasingly connected world
IBM Software Thought Leadership White Paper January 2011 When millions need access: Identity management in an increasingly connected world Best practice solutions that scale to meet today s huge numbers
System Center 2012 Suite SYSTEM CENTER 2012 SUITE. BSD BİLGİSAYAR Adana
2013 System Center 2012 Suite SYSTEM CENTER 2012 SUITE BSD BİLGİSAYAR Adana Configure and manage apps, services, computers, and VMs... 1 Operations Manager... 3 Configuration Manager... 4 Endpoint Protection...
VMware Solutions for Small and Midsize Business
SOLUTION BRIEF VMware Solutions for Small and Midsize Business Protect Your Business, Simplify and Save on IT, and Empower Your Employees AT A GLANCE VMware is a leader in virtualization and cloud infrastructure
Using WebSphere Application Server on Amazon EC2. Speaker(s): Ed McCabe, Arthur Meloy
Using WebSphere Application Server on Amazon EC2 Speaker(s): Ed McCabe, Arthur Meloy Cloud Computing for Developers Hosted by IBM and Amazon Web Services October 1, 2009 1 Agenda WebSphere Application
Cloud Computing: Risks and Auditing
IIA Chicago Chapter 53 rd Annual Seminar April 15, 2013, Donald E. Stephens Convention Center @IIAChicago #IIACHI Cloud Computing: Risks Auditing Phil Lageschulte/Partner/KPMG Sailesh Gadia/Director/KPMG
OpenNebula Open Souce Solution for DC Virtualization
13 th LSM 2012 7 th -12 th July, Geneva OpenNebula Open Souce Solution for DC Virtualization Constantino Vázquez Blanco OpenNebula.org What is OpenNebula? Multi-tenancy, Elasticity and Automatic Provision
Optimizing your IT infrastructure. 2012 IBM Corporation
Optimizing your IT infrastructure 2012 IBM Corporation Please Note: IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM s sole discretion.
Operationalize Policies. Take Action. Establish Policies. Opportunity to use same tools and practices from desktop management in server environment
Microsoft IT Systems Strategy DATACENTER APPLICATIONS Process-Led, Model-Driven Unified and Virtualized USER-CENTRICITY ServiceEnabled Basic Standardize d Rationalized Dynamic Cost center Efficient cost
APPLICATION-CENTRIC SOLUTIONS FOR A CLOUD-EMPOWERED ENTERPRISE
APPLICATION-CENTRIC IaaS SOLUTIONS FOR A CLOUD-EMPOWERED ENTERPRISE Changing fast, acting smart and innovating quickly are what enable organizations to get ahead and stay ahead of the competition. Today,
Provide access control with innovative solutions from IBM.
Security solutions To support your IT objectives Provide access control with innovative solutions from IBM. Highlights Help protect assets and information from unauthorized access and improve business
How cloud computing can transform your business landscape
How cloud computing can transform your business landscape Introduction It seems like everyone is talking about the cloud. Cloud computing and cloud services are the new buzz words for what s really a not
Strategies for assessing cloud security
IBM Global Technology Services Thought Leadership White Paper November 2010 Strategies for assessing cloud security 2 Securing the cloud: from strategy development to ongoing assessment Executive summary
SOLUTION BRIEF Citrix Cloud Solutions Citrix Cloud Solution for Disaster Recovery
SOLUTION BRIEF Citrix Cloud Solutions Citrix Cloud Solution for Disaster Recovery www.citrix.com Contents Introduction... 3 Fitting Disaster Recovery to the Cloud... 3 Considerations for Disaster Recovery
Cloud Security Who do you trust?
Thought Leadership White Paper Cloud Computing Cloud Security Who do you trust? Nick Coleman, IBM Cloud Security Leader Martin Borrett, IBM Lead Security Architect 2 Cloud Security Who do you trust? Cloud
Cloud Computing 101 Dissipating the Fog 2012/Dec/xx Grid-Interop 2012
Cloud Computing 101 Dissipating the Fog 2012/Dec/xx Why the interest in Clouds? A method to avoid/defer CAPEX/OPEX and possibly accelerating implementation 2 It all started here - Timeshare Computers and
OpenNebula Open Souce Solution for DC Virtualization
OSDC 2012 25 th April, Nürnberg OpenNebula Open Souce Solution for DC Virtualization Constantino Vázquez Blanco OpenNebula.org What is OpenNebula? Multi-tenancy, Elasticity and Automatic Provision on Virtualized
Overview. The Cloud. Characteristics and usage of the cloud Realities and risks of the cloud
Overview The purpose of this paper is to introduce the reader to the basics of cloud computing or the cloud with the aim of introducing the following aspects: Characteristics and usage of the cloud Realities
Datamation. Find the Right Cloud Computing Solution. Executive Brief. In This Paper
Find the Right Cloud Computing Solution In This Paper There are three main cloud computing deployment models: private, public, and hybrid The true value of the cloud is achieved when the services it delivers
SOLUTIONS. Secure Infrastructure as a Service for Production Workloads
IaaS SOLUTIONS Secure Infrastructure as a Service for Production Workloads THE CHALLENGE Now more than ever, business and government are facing the challenge of balancing conflicting demands. Market pressures
Software-Defined Networks Powered by VellOS
WHITE PAPER Software-Defined Networks Powered by VellOS Agile, Flexible Networking for Distributed Applications Vello s SDN enables a low-latency, programmable solution resulting in a faster and more flexible
White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0
White Paper Enterprise File Serving 2.0 Anywhere, Any Device File Access with IT in Control Like it or not, cloud- based file sharing services have opened up a new world of mobile file access and collaborative
