Secure Bridge to the Cloud
|
|
|
- Winfred McCarthy
- 10 years ago
- Views:
Transcription
1 Secure Bridge to the Cloud Jaushin Lee, Ph.D. September
2 Table of Contents The promise for enterprise hybrid cloud computing... 3 Reality facing enterprise today... 3 Connecting the dots... 6 Secure and elastic bridge to the cloud... 8 Who owns the cloud bridge? CSP or enterprise IT?
3 The promise for enterprise hybrid cloud computing Cloud computing technology has been rising in recent years at full speed, carrying with it many promises to innovate how people access their applications and data in their daily life. This technology trend is also pushing enterprises to next level on how to approach customers and run internal operations. According to IDC s forecast on cloud IT spending, worldwide spending on public IT cloud services is expected to approach $100 billion in From , public IT cloud services will enjoy a compound annual growth rate of 26.4%, five times that of the IT industry overall, as companies accelerate their shift to the cloud services model for IT consumption. Cloud computing has been delivering its promise to simplify the digital life for consumers and enterprise. By using a tablet device as an example a user can have an application up and running from a remote location all operating in a virtual environment in minutes and the compute requirements are immediately satisfied. This user no longer needs any computer technology background or knowledge of how to install the app on his/her device though an operating system or even where to save and backup the data. This is only one key benefit out of many using cloud infrastructure. Another example would be the ease of a grade school student helping a senior installing an app on an ipad using the cloud versus doing anything on a PC. In an ideal world, this simplicity of cloud functionality for consumer applications would also apply to the enterprise world. Optimally when an enterprise wants to roll out a new business application worldwide, they should be able to upload the application to remote virtual cloud and just release to the world. When an enterprise runs short on the internal computing resources, they should be able to burst their extra workloads anywhere from their internal locations worldwide to any cloud datacenters and proceed without interruption. When enterprise adopts a new software application offered via a SaaS model, they should be able to easily add it to their application work flow in the cloud and roll out to their worldwide workforce. It would be really ideal if those actions can be executed by enterprise as easily as tapping a tablet or clicking a mouse. Reality facing enterprise today Today enterprise has not achieved a cloud utopia. Unfortunately, today s enterprise has not achieved a cloud utopia. While the cloud 3
4 datacenter is becoming virtualized, connecting to it with a secure and elastic infrastructure is still a challenge. Porting enterprise applications over such an infrastructure as if it is a converged and transparent fabric has major hurdles to resolve, which aren t well understood, but are in fact difficult to handle. The outsourcing model has been part of standard enterprise business operations for more than a decade. Enterprise naturally considers IaaS cloud service as computing resource and management outsourcing. However, a new factor to consider with a cloud computing model is the multi-tenancy environment. Historically none of the managed service companies would ever mix customer s resources and data with others. Also, enterprise has always felt it to be very important not to give away the control to service providers. Today to properly mitigate the risk and take advantage of the public cloud infrastructure in a multi-tenancy environment, enterprise has to maintain or even enhance their security control, while outsourcing compute resources to the public cloud. To achieve this goal, enterprises will have to allocate significant amount of IT resources to safeguard their application and data in the public cloud and to re-engineer part of their internal legacy infrastructure to connect and work with the public cloud. Security concerns and business liability can limit IaaS cloud vendor opening direct access to the control of their cloud datacenter for customer configuration. To enterprise, the public cloud datacenter operates like an island. On the horizontal landscape of a hybrid cloud infrastructure, enterprise has to design a new infrastructure that spans and connects multiple of such islands worldwide with their internal resources so that the enterprise applications can run on the top of such a hybrid infrastructure. Conceptually this action may be viewed simply as extending enterprise datacenters to a remote site. However, in reality this task is never the same as the conventional practices adopted inside enterprise. The major difference arises because the control of the public cloud datacenter is owned by a different network authority the IaaS Cloud Service Provider (CSP). From the IaaS CSP s perspective, allowing thousands of enterprises to have direct access control of their datacenters for infrastructure configuration may not be acceptable due to security concerns and business liability. Today most modern cloud datacenters operate with full automation. It may not lead to the CSP s benefit by providing more transparency or customization capabilities of their datacenter to 4
5 customers. As a result only limited access is frequently offered by the CSP s. The access is executed through a carefully crafted set of APIs offered via the cloud management layer, instead of directly applying to the underlying hardware devices and infrastructure. This is yet another new practice for enterprise IT as the network engineering was conventionally executed by directly accessing and setting the low-level components. Each of these points implies a steep learning curve, development efforts in creating new operation scripts, and potentially lack of accessibility for performance trouble shooting, and therefore, decreasing efficiency. Many of the cloud infrastructure technology are not yet virtualized nor converged, leading to an unavoidable requirement of a deep touch to the lower layer physical infrastructure. To successfully build a hybrid cloud federation infrastructure connecting the enterprise inside and the public cloud outside, enterprise has to consider various technical issues such as network, infrastructure security (e.g. peripheral firewall), data encryption, data transport and data storage and access infrastructure, etc. If we take a deep vertical look into the cloud solution stack on either side of the federation system, many of the technologies are not yet virtualized nor converged to support the enterprise s requirement of building a hybrid cloud infrastructure directly connecting to the public cloud datacenter. The lack of infrastructure virtualization technology leads to an unfortunate requirement of a deep touch to the lower layer physical infrastructure on both ends of the federation system, which results in a big hurdle for enterprise to validate new business models using cloud. Let s use an example. To federate multiple cloud datacenters with a few enterprise remote sites worldwide, a multiple-link VPN structure may be appropriate. This means that the VPN deployment on the enterprise side touches the physical layer of the network shielded by a corporate firewall. Enterprise IT has to work with the cloud vendor to set up the links to their worldwide locations and make sure the VPN drop on the edge of the enterprise network is extended to the internal computing farm. This build can be intensive and security sensitive (since it is going from outside of the enterprise into their sensitive computing environment). Also the enterprise s existing security infrastructure, e.g. corporate firewall and IDS/IPS, needs to be re-configured to cope with the change, meaning opening firewalls. 5
6 Once a VPN tunnel is established between the public cloud and internal computing regions, both forward firewall and reverse firewall are required to prevent external network attacks as well as internal IP leak through the tunnel. Once all these new infrastructure components are carefully designed in, the enterprise IT then needs to consider how to transport the applications and data through this secure tunnel to the cloud, on demand, with full automation. Throughout this task, many actions are coupled with the low level physical infrastructure intertwined with various corporate compliance and policy; therefore it is taking significant efforts for enterprise IT to proceed smoothly. The end-to-end cloud connection infrastructure is never elastic as a cloud it s a permanent build structure just like the good old days. Putting all these multiple dimensions together, enterprise IT requires efforts to make the Cloud Bridge happen. The biggest challenge for the IT team is that this is a brand new experience: innovating virtualization technology that is rapidly evolving. Since the implementation involves multiple authorization parties in control with potential conflict of business interests, it is even more complicated. Enterprise IT has to assure appropriate staff with necessary knowledge and training to cope with the challenge. Given all the efforts required to complete a successful build of the connections to public cloud datacenters worldwide, it is very likely that the enterprise will become permanently locked to one cloud vendor for a significant period of time. We may parenthetically note that if one zooms out and observes the overall approach from a high level, it will be found that the end-to-end cloud connection infrastructure is never as elastic as a cloud it s more a permanent build, just like the good old days. Connecting the dots Today the worldwide IT spending on public cloud is still less than 5%. All IaaS cloud service providers (CSP) recognize the premium opportunity is coming from the enterprise market, and the enterprise adoption of IaaS cloud is still at its infancy. Therefore, the capability to successfully support enterprise s adoption of the IaaS cloud becomes the most important business strategy for IaaS CSP for two immediate business reasons: To win market share and increase ARPU (Average Revenue Per Unit) To break away from commodity competitions 6
7 The market has made observations on enterprise s requirements for using a public cloud or building a hybrid cloud, and they are actually simple: Enterprise are in control (while outsourcing computing resources and infrastructure to the cloud service provider) Enterprise wants to protect their data (and no one else including the cloud service provider can compromise their security key) Ease of deployment, internal and in the cloud (where the whole process is easy as clicking a mouse) Avoid lock-in with any CSP (where a permanent bridge is never a good idea) The enterprise requirements for hybrid cloud are simple to describe, but may not be easy to realize. The enterprise requirements for hybrid cloud are simple to describe, but may not be easy to realize in a multi-tenancy cloud environment. We have multiple observations here for the challenge. First, a CSP datacenter that hosts many enterprise tenants is not new; opening infrastructure control under the cloud to the tenants is new. The datacenter virtualization technology and products in the market have been designed as an enterprise product that serves one IT authority who controls the datacenter implementation (i.e. under the cloud), not yet optimized for the purpose of supporting a large amount of enterprise customers (i.e. like a service provider product ) for direct access (over the cloud). For the security consideration in a multi-tenancy cloud environment, it is a challenge for CSP to balance its act in meeting customer s requirements and reducing its own risk for business liability. To properly address this challenge, the CSP may require deep technology and infrastructure touch in the already invested cloud datacenter, which may raise serious financial concerns. CSP has been implementing a two-level control concept in their IaaS cloud business offering. The high level control is defined as customer s responsibility (over the cloud). However, the tools provided by CSP have been very much limited for enterprise to meet their security requirements in the cloud. Second, it is difficult and beyond the scope for CSP to overcome or even to address the infrastructure build efforts happening inside enterprise. It is an infrastructure implemented and owned by each enterprise, and it can be different from customer to customer. Touching 7
8 enterprise legacy infrastructure is not an option for CSP. To help enterprise building hybrid cloud secure bridge, CSP has to offer some kind of virtual infrastructure so that enterprise can adopt without disrupting the underlying legacy implementation. This innovative virtualization technology is completely lacking in today s market. Secure and elastic bridge to the cloud For a cloud bridge connecting enterprise and a public cloud, the entire infrastructure is virtual and elastic, just like cloud. To meet the enterprise requirements in a hybrid cloud federation environment, the image we want to convey is a bridge with two pillars, one on each end of the bridge, just like the renowned San Francisco Golden Gate Bridge. For a cloud bridge in this concept connecting enterprise and a public cloud, the entire infrastructure is virtual and elastic, just like the cloud. This virtual infrastructure for the hybrid cloud is decoupled from the underlying network and cloud hypervisor (i.e. over the cloud) on both sides of the cloud bridge. With this virtual infrastructure, enterprise can easily implement the connection to the cloud and meet their requirements without disrupting the pre-existing investments. With this kind of virtual infrastructure technology supporting the build of the cloud bridge, the CSP and enterprise can easily execute and meet the following business requirements: 1) CSP will implement a two-level control in their cloud datacenter; enterprise will control the security related virtual infrastructure that protects and isolates their application and data over the cloud, and then CSP controls the datacenter and physical security and management under the cloud. In this model, the enterprise achieves their security and compliance requirements without having their security and virtual infrastructure coupled with the low level implementation of a cloud datacenter. With this capability, the CSP preserves their datacenter investment, reduces their liability risk, and yet successfully serves the enterprise as part of their critical business target. 2) Enterprise is offered with this secure virtual infrastructure solution to build the necessary pillar for the hybrid cloud inside their internal legacy infrastructure as well as to connect to the public cloud datacenter. Since this virtual infrastructure is 8
9 decoupled from the underlying infrastructure, it becomes much easier and efficient for IT to proceed with their cloud projects. Because of the elastic and virtualization technology for such an infrastructure, full end-to-end automation for a hybrid cloud will become a reality. Who owns the cloud bridge? CSP or enterprise IT? We are not certain how the business model will evolve. But, we are very sure that the virtual bridge will become a reality. If you would build a new Golden Gate Bridge connecting two states, which state is going to own the bridge and collect the toll? Both CSP and enterprise will enjoy critical business benefits when building such a secure cloud bridge for the hybrid cloud. If enterprise owns the technology, it will enjoy all benefits we have discussed above for the enterprise, plus one additional item capability to build the secure bridge to any CSP independently, with no lock-in. If CSP owns the technology and offers a cloud bridge service, the CSP will enjoy a critical set of business benefits, plus an additional item providing an infrastructure hook with other cloud federation applications into the enterprise backend as a potential cloud extension. The cloud computing virtualization and infrastructure technology is rapidly evolving, likewise for the business model that is taking advantage of it. We are not certain how the business model will evolve. But, we are very sure that the virtual bridge will become a reality in the very near future. Disclaimer Jaushin is the founder and CEO of Zentera Systems. Zentera is a Silicon Valley based cloud computing company that offers hybrid cloud federation solutions to both enterprise and cloud service providers. Please visit for additional information. 9
CoIP (Cloud over IP): The Future of Hybrid Networking
CoIP (Cloud over IP): The Future of Hybrid Networking An overlay virtual network that connects, protects and shields enterprise applications deployed across cloud ecosystems The Cloud is Now a Critical
Zentera Cloud Federation Network for Hybrid Computing
Zentera Cloud Federation Network for Hybrid Computing The New Era of Hybrid Computing Cloud computing technology, the next computing paradigm after client-server, will shift enterprise IT to a new era
CLOUD COMPUTING OVERVIEW
CLOUD COMPUTING OVERVIEW http://www.tutorialspoint.com/cloud_computing/cloud_computing_overview.htm Copyright tutorialspoint.com Cloud Computing provides us a means by which we can access the applications
LOW RISK ADOPTION OF CLOUD INFRA- STRUCTURE FOR ENTERPRISES
LOW RISK ADOPTION OF CLOUD INFRA- STRUCTURE FOR ENTERPRISES Business leaders are recognising that with the emergence of enterprise grade cloud computing, there is no good reason to continue to invest in
The High Availability and Resiliency of the Pertino Cloud Network Engine
The High Availability and Resiliency of the Pertino Cloud Network Engine Executive summary The emergence of cloud network architectures can be directly attributed to the evolution of business IT. As the
VMware vcloud Powered Services
SOLUTION OVERVIEW VMware vcloud Powered Services VMware-Compatible Clouds for a Broad Array of Business Needs Caught between shrinking resources and growing business needs, organizations are looking to
SOLUTION BRIEF Citrix Cloud Solutions Citrix Cloud Solution for On-boarding
SOLUTION BRIEF Citrix Cloud Solutions Citrix Cloud Solution for On-boarding www.citrix.com Contents Introduction... 3 The On- boarding Problem Defined... 3 Considerations for Application On- boarding...
How To Compare The Two Cloud Computing Models
WHITE PAPER Elastic Cloud Infrastructure: Agile, Efficient and Under Your Control - 1 - INTRODUCTION Most businesses want to spend less time and money building and managing infrastructure to focus resources
SOFTWARE DEFINED NETWORKING
SOFTWARE DEFINED NETWORKING Bringing Networks to the Cloud Brendan Hayes DIRECTOR, SDN MARKETING AGENDA Market trends and Juniper s SDN strategy Network virtualization evolution Juniper s SDN technology
Delivering Managed Services Using Next Generation Branch Architectures
Delivering Managed Services Using Next Generation Branch Architectures By: Lee Doyle, Principal Analyst at Doyle Research Sponsored by Versa Networks Executive Summary Network architectures for the WAN
Cisco and Citrix: Building Application Centric, ADC-enabled Data Centers
Solutions Brief : Building Application Centric, ADC-enabled Data Centers Cisco Application Centric Infrastructure (ACI) integrates Citrix NetScaler Application Delivery Controller (ADC) appliances to reduce
Cloud Computing Security: Public vs. Private Cloud Computing
Cloud Computing Security: Public vs. Private Cloud Computing White paper Parallels Cloud Computing Security Overview Over the last few years, cloud computing has become a buzzword on the Internet. In simple
VMware Hybrid Cloud. Accelerate Your Time to Value
VMware Hybrid Cloud Accelerate Your Time to Value Fulfilling the Promise of Hybrid Cloud Computing Through 2020, the most common use of cloud services will be a hybrid model combining on-premises and external
VMware vcloud Networking and Security
VMware vcloud Networking and Security Efficient, Agile and Extensible Software-Defined Networks and Security BROCHURE Overview Organizations worldwide have gained significant efficiency and flexibility
Securing the Cloud with IBM Security Systems. IBM Security Systems. 2012 IBM Corporation. 2012 2012 IBM IBM Corporation Corporation
Securing the Cloud with IBM Security Systems 1 2012 2012 IBM IBM Corporation Corporation IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns
5 Key Reasons to Migrate from Cisco ACE to F5 BIG-IP
5 Key Reasons to Migrate from Cisco ACE to F5 BIG-IP With support for Cisco ACE load balancer ending, organizations need to find an alternative. Contents Introduction 3 Advanced Architecture 3 Ease of
WHITE PAPER. www.fusionstorm.com. Building Blocks of the Modern Data Center
WHITE PAPER: Easing the Way to the Cloud: 1 WHITE PAPER Building Blocks of the Modern Data Center How Integrated Infrastructure Solutions Help to Accelerate Application Deployments and Simplify Management
SOLUTION BRIEF Citrix Cloud Solutions Citrix Cloud Solution for Disaster Recovery
SOLUTION BRIEF Citrix Cloud Solutions Citrix Cloud Solution for Disaster Recovery www.citrix.com Contents Introduction... 3 Fitting Disaster Recovery to the Cloud... 3 Considerations for Disaster Recovery
Developing SAP Enterprise Cloud Computing Strategy
White Paper WFT Cloud Technology SAP Cloud Integration Service Provider Developing SAP Enterprise Cloud Computing Strategy SAP Cloud Computing is a significant IT paradigm change with the potential to
Horizontal Integration - Unlocking the Cloud Stack. A Technical White Paper by FusionLayer, Inc.
Horizontal Integration - Unlocking the Cloud Stack A Technical White Paper by FusionLayer, Inc. August 2013 Copyright 2015 FusionLayer, Inc. All rights reserved. No part of this publication may be reproduced,
Competitive Comparison Between Microsoft and VMware Cloud Computing Solutions
Competitive Comparison Between Microsoft and VMware Cloud Computing Solutions Introduction As organizations evaluate how cloud computing can help them improve business agility, reduce management complexity
The Advantages of Cloud Services
Cloud-Based Services: Assure Performance, Availability, and Security What You Will Learn Services available from the cloud offer cost and efficiency benefits to businesses, but until now many customers
Elastic Private Clouds
White Paper Elastic Private Clouds Agile, Efficient and Under Your Control 1 Introduction Most businesses want to spend less time and money building and managing IT infrastructure to focus resources on
Cisco and Citrix Solution
Cisco and Citrix Solution Build Application-Centric Data Centers with Application Delivery Controllers 2014 Cisco Citrix. All rights reserved. Page 1 What You Will Learn Cisco Application Centric Infrastructure
Enterprise Cloud Solutions
IT(O) IT Outsourcing Options Enterprise Cloud Solutions CloudAgile Select Partner PDF v2.2 9/11/12 Cloud Computing with Latisys With the Latisys Cloud, your Enterprise can: Achieve unprecedented control,
Front cover IBM SmartCloud: Becoming a Cloud Service Provider
Front cover IBM SmartCloud: Becoming a Cloud Service Provider Redguides for Business Leaders Joe McIntyre Learn about the IBM CCRA Cloud Service Provider adoption pattern Understand the key cloud service
The Production Cloud
The Production Cloud The cloud is not just for backup storage, development projects and other low-risk applications. In this document, we look at the characteristics of a public cloud environment that
Cisco Unified Data Center
Solution Overview Cisco Unified Data Center Simplified, Efficient, and Agile Infrastructure for the Data Center What You Will Learn The data center is critical to the way that IT generates and delivers
How To Protect Your Cloud From Attack
A Trend Micro White Paper August 2015 Trend Micro Cloud Protection Security for Your Unique Cloud Infrastructure Contents Introduction...3 Private Cloud...4 VM-Level Security...4 Agentless Security to
Cloud Computing; What is it, How long has it been here, and Where is it going?
Cloud Computing; What is it, How long has it been here, and Where is it going? David Losacco, CPA, CIA, CISA Principal January 10, 2013 Agenda The Cloud WHAT IS THE CLOUD? How long has it been here? Where
Migration and Disaster Recovery Underground in the NEC / Iron Mountain National Data Center with the RackWare Management Module
Migration and Disaster Recovery Underground in the NEC / Iron Mountain National Data Center with the RackWare Management Module WHITE PAPER May 2015 Contents Advantages of NEC / Iron Mountain National
T-SYSTEMS Cloud STORY
Michael Moritz Lead Enterprise Architect Cloud Computing Cloud & Partner Sales - CTO Office T-Systems International GmbH Agenda Cloud Challenges T-Systems Cloud Strategy 2 Agenda Cloud Challenges T-Systems
Fujitsu Dynamic Cloud Bridging today and tomorrow
Fujitsu Dynamic Cloud Bridging today and tomorrow Contents Cloud Computing with Fujitsu 3 Fujitsu Dynamic Cloud: Higher Dynamics for Enterprises 4 Fujitsu Dynamic Cloud: Our Offering 6 High Security Standards
Deliver Desktops as a Service! With VDI 2.0!
Deliver Desktops as a Service! With VDI 2.0! Me! About the Author! Two smart people I work with! Gartner does not endorse any vendor, product or service depicted in our research publications, and does
I D C T E C H N O L O G Y S P O T L I G H T
I D C T E C H N O L O G Y S P O T L I G H T S o f tw a re Ap p l i a nces Ease Cloud Ap p l i c a t i o n D e p l o ym e n t January 2012 Adapted from Worldwide Software Appliance 2010 2014 Forecast: Entering
Building success in the cloud
Building success in the cloud Citrix customers are recognized in the Gartner Magic Quadrant for Public Cloud Infrastructure-as-a-Service. 2 Cloud computing is the biggest technology disruption in decades
Consumption IT. Michael Shepherd Business Development Manager. Cisco Public Sector May 1 st 2014
Consumption IT Michael Shepherd Business Development Manager Cisco Public Sector May 1 st 2014 Short Bio Cloud BDM in Public Sector (SLED + FED) Cisco for 14 + years Focused on cloud for 4 + years Awareness,
Managing the Cloud as an Incremental Step Forward
WP Managing the Cloud as an Incremental Step Forward How brings cloud services into your IT infrastructure in a natural, manageable way white paper [email protected] Table of Contents Accepting the
Public Clouds. Krishnan Subramanian Analyst & Researcher Krishworld.com. A whitepaper sponsored by Trend Micro Inc.
Public Clouds Krishnan Subramanian Analyst & Researcher Krishworld.com A whitepaper sponsored by Trend Micro Inc. Introduction Public clouds are the latest evolution of computing, offering tremendous value
INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS
INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS CLOUD COMPUTING Cloud computing is a model for enabling convenient, ondemand network access to a shared pool of configurable computing
O p t i m i z i n g t h e N e t w o r k t o M e e t T o m o r r o w ' s I C T D e m a n d s
EXECUTIVE BRIEF O p t i m i z i n g t h e N e t w o r k t o M e e t T o m o r r o w ' s I C T D e m a n d s Adapted from IDC research by Eric Owen Click here to enter text. September 2014 INTRODUCTION
IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation
IBM Cloud Security Draft for Discussion September 12, 2011 IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns surrounding cloud computing
Second-Generation Cloud Computing IaaS Services
Second-Generation Cloud Computing IaaS Services What it means, and why we need it now Prepared for: White Paper 2012 Neovise, LLC. All Rights Reserved. Cloud Computing: Driving IT Forward Cloud computing,
Private Clouds. Krishnan Subramanian Analyst & Researcher Krishworld.com. A whitepaper sponsored by Trend Micro Inc.
Private Clouds Krishnan Subramanian Analyst & Researcher Krishworld.com A whitepaper sponsored by Trend Micro Inc. Introduction Cloud computing has completely transformed the way business organizations
Commercial Software Licensing
Commercial Software Licensing CHAPTER 12: Prepared by DoD ESI January 2013 Chapter Overview Most software licenses today are either perpetual or subscription. Perpetual licenses involve software possession
A COALFIRE PERSPECTIVE. Moving to the Cloud. NCHELP Spring Convention Panel May 2012
A COALFIRE PERSPECTIVE Moving to the Cloud A Summary of Considerations for Implementing Cloud Migration Plans into New Business Platforms NCHELP Spring Convention Panel May 2012 DALLAS DENVER LOS ANGELES
Cloud Computing. Andy Bechtolsheim Chairman & Co-founder, Arista Networks. November 12 th, 2008
Cloud Computing Andy Bechtolsheim Chairman & Co-founder, Arista Networks November 12 th, 2008 What is Cloud Computing? The Fifth Generation of Computing (after Mainframe, Personal Computer, Client-Server
UNIFYING THE HYBRID CLOUD
UNIFYING THE HYBRID CLOUD The Emergence of the Hybrid Cloud: A Challenge for Enterprise, an Opportunity for Managed Service Providers The growing adoption of cloud computing, driven by the promise of increased
Security Considerations for Public Mobile Cloud Computing
Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea [email protected] 2 Research Institute of
How To Monitor Hybrid It From A Hybrid Environment
IT Monitoring for the Hybrid Enterprise With a Look at ScienceLogic Perspective 2012 Neovise, LLC. All Rights Reserved. Report Published April, 2015 Hybrid IT Goes Mainstream Enterprises everywhere are
Building an AWS-Compatible Hybrid Cloud with OpenStack
Building an AWS-Compatible Hybrid Cloud with OpenStack AWS is Transforming IT Amazon Web Services (AWS) commands a significant lead in the public cloud services market, with revenue estimated to grow from
Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master
Securing The Cloud Foundational Best Practices For Securing Cloud Computing Scott Clark Agenda Introduction to Cloud Computing What is Different in the Cloud? CSA Guidance Additional Resources 2 What is
Cloud, SDN and the Evolution of
Cloud, SDN and the Evolution of Enterprise Networks Neil Rickard Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced or distributed in any form
Journey to SaaS: How You Can Grow Your Software Business by Moving to the Cloud
A FROST & SULLIVAN EXECUTIVE SUMMARY Journey to SaaS: How You Can Grow Your Software Business by Moving to the Cloud In Collaboration With: View the ondemand version of the ebroadcast: www.frost.com/isv
Cloud computing: Innovative solutions for test environments
IBM Global Services April 2009 Cloud computing: Innovative solutions for test environments Speed test cycles and reduce cost to gain a competitive edge Page No.2 Contents 2 Executive summary 3 Leading
vision realize your software-defined with the Digital Data Center from Atos Whitepaper
realize your software-defined vision with the Digital Data Center from Atos Whitepaper Revolutionize agility and flexibility. Accelerate time to market. Mitigate risk without inhibiting innovation. Reduce
A Study of Infrastructure Clouds
A Study of Infrastructure Clouds Pothamsetty Nagaraju 1, K.R.R.M.Rao 2 1 Pursuing M.Tech(CSE), Nalanda Institute of Engineering & Technology,Siddharth Nagar, Sattenapalli, Guntur., Affiliated to JNTUK,
cloud Development Strategies - Part 1
for a successful shift to the cloud May 2014 1 CONTENTS Introduction Challenge 1: Application security Challenge 2: Complexity Challenge 3: Applications not optimized for cloud Challenge 4: Cost Challenge
Cloud computing and SAP
Cloud computing and SAP Next Generation SAP Technologies Volume 1 of 2010 Table of contents Document history 1 Overview 2 SAP Landscape challenges 3 Infrastructure as a Service (IaaS) 4 Public, Private,
Accelerate the journey to your Cloud
Accelerate the journey to your Cloud Atos, EMC and VMware strategic alliance Presentation - February 15 th, 2012 Copyright 2011 EMC Corporation. All rights reserved. 1 Our clients are facing 3 new key
VIRTUALIZING THE EDGE
VIRTUALIZING THE EDGE NFV adoption to transform telecommunications infrastructure Karthik Kailasam Director, Integrated Modular Solutions September 2015 Key Messages The transformation of telecom networks
Intel IT Cloud 2013 and Beyond. Name Title Month, Day 2013
Intel IT Cloud 2013 and Beyond Name Title Month, Day 2013 Legal Notices This presentation is for informational purposes only. INTEL MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY. Intel and the
White Paper. Juniper Networks. Enabling Businesses to Deploy Virtualized Data Center Environments. Copyright 2013, Juniper Networks, Inc.
White Paper Juniper Networks Solutions for VMware NSX Enabling Businesses to Deploy Virtualized Data Center Environments Copyright 2013, Juniper Networks, Inc. 1 Table of Contents Executive Summary...3
I D C T E C H N O L O G Y S P O T L I G H T. S e r ve r S e c u rity: N o t W h a t It U s e d t o Be!
I D C T E C H N O L O G Y S P O T L I G H T S e r ve r S e c u rity: N o t W h a t It U s e d t o Be! December 2014 Adapted from Worldwide Endpoint Security 2013 2017 Forecast and 2012 Vendor Shares by
Ironside Group Rational Solutions
Ironside Group Rational Solutions IBM Cloud Orchestrator Accelerate the pace of your business innovation Richard Thomas IBM Cloud Management Platforms [email protected] IBM Cloud Orchestrator Business
Virtualization, SDN and NFV
Virtualization, SDN and NFV HOW DO THEY FIT TOGETHER? Traditional networks lack the flexibility to keep pace with dynamic computing and storage needs of today s data centers. In order to implement changes,
The business owner s guide for replacing accounting software
The business owner s guide for replacing accounting software Replacing your accounting software is easier and more affordable than you may think. Use this guide to learn about the benefits of a modern
I D C V E N D O R S P O T L I G H T. H yb r i d C l o u d Solutions for ERP
I D C V E N D O R S P O T L I G H T H yb r i d C l o u d Solutions for ERP November 2014 Adapted from Worldwide Enterprise Applications 2014 2018 Forecast and 2013 Vendor Shares by Christine Dover Sponsored
From Private to Hybrid Clouds through Consistency and Portability
Extending IT Governance From Private to Hybrid Clouds through Consistency and Portability Gordon Haff 2 Executive summary 3 beyond information security 3 from private to public and back again 4 consistency
1 Introduction. 2 What is Cloud Computing?
1 Introduction Table of Contents 1 Introduction 2 What is Cloud Computing? 3 Why is Cloud Computing important? 4 Why Cloud deployments fail? 5 Holistic Approach to cloud computing implementation 6 Conclusion
Always On Infrastructure for Software as a Ser vice
Solution Brief: Always On Infrastructure for Software as a Ser vice WITH EGENERA CLOUD SUITE SOFTWARE Egenera, Inc. 80 Central St. Boxborough, MA 01719 Phone: 978.206.6300 www.egenera.com Introduction
End-to-End Cloud Elasticity
End-to-End Cloud Elasticity Whitepaper, July 2011 Maximilian Ahrens Chris Janz Marten Schoenherr Zimory GmbH, Revaler Strasse 100, Warschauer Strasse, 10245 Berlin, Germany Ciena Corporation, 307 Leggett
See what cloud can do for you.
See what cloud can do for you. Uncomplicating cloud business Table of contents Introduction 3 Why cloud is relevant for your business? 4 What is changing? 4 Why organizations are moving to cloud 5 What
Modern Application Architecture for the Enterprise
Modern Application Architecture for the Enterprise Delivering agility, portability and control with Docker Containers as a Service (CaaS) Executive Summary Developers don t adopt locked down platforms.
Cloud Computing - Architecture, Applications and Advantages
Cloud Computing - Architecture, Applications and Advantages 1 Arun Mani Tripathi 2 Rizwan Beg NIELIT Ministry of C&I.T., Govt. of India 2 Prof. and Head, Department 1 of Computer science and Engineering,Integral
Covering my IaaS: Security and Extending the Datacenter. Brian Bourne Tadd Axon
Covering my IaaS: Security and Extending the Datacenter Brian Bourne Tadd Axon About Us Tadd Axon - Holds a Bachelor of Business Administration with a minor in Spanish from Wilfrid Laurier University.
Brochure. Update your Windows. HP Technology Services for Microsoft Windows 2003 End of Support (EOS) and Microsoft Migrations
Brochure Update your Windows HP Technology Services for Microsoft End of Support (EOS) and Microsoft Migrations Stabilize and secure your infrastructure Microsoft will end support for Windows Server 2003/R2
WHITE PAPER. A Practical Guide to Choosing the Right Clouds Option and Storage Service Levels. www.earthlink.com
WHITE PAPER A Practical Guide to Choosing the Right Clouds Option and Storage Service Levels www.earthlink.com 1 Our job in IT is to provide technology frameworks and an operating model to facilitate but
A Comprehensive Cloud Management Platform with Vblock Systems and Cisco Intelligent Automation for Cloud
WHITE PAPER A Comprehensive Cloud Management Platform with Vblock Systems and Cisco Intelligent Automation for Cloud Abstract Data center consolidation and virtualization have set the stage for cloud computing.
Migrating to a Managed Service Model through Automation
Migrating to a Managed Service Model through Automation The IT landscape is constantly changing, impacted by many factors from innovations by technology vendors, to a more disparate and global workforce
HP CLOUD SYSTEM. The most complete, integrated platform for building and managing clouds featuring Intel technologies.
HP CLOUD SYSTEM The most complete, integrated platform for building and managing clouds featuring Intel technologies Presenter Title 2010 2011 Hewlett-Packard Development Company, L.P. The information
Hybrid Cloud Architecture: How to Streamline Hybrid Cloud Migration
Hybrid Cloud Architecture: How to Streamline Hybrid Cloud Migration Introduction According to a Nucleus Research report cloud applications deliver 1.7 times more return on investment on average over on-
