Migrating Your Applications to the Cloud

Similar documents
An Introduction to Toad Extension for Visual Studio. Written By Thomas Klughardt Systems Consultant Quest Software, Inc.

10.2. Auditing Cisco PIX Firewall with Quest InTrust

Secure and Efficient Log Management with Quest OnDemand

Direct Migration from SharePoint 2003 to SharePoint 2010

Go Beyond Basic Up/Down Monitoring

Eight Best Practices for Identity and Access Management

Taking Unix Identity and Access Management to the Next Level

Using Stat with Custom Applications

Toad for Oracle Compatibility with Windows 7 Revealed

Key Methods for Managing Complex Database Environments

Quest Management Agent for Forefront Identity Manager

Quest ChangeAuditor 5.0. For Windows File Servers. Events Reference

Foglight for SQL Server

Six Steps to Achieving Data Access Governance. Written By Quest Software

Proactive Performance Management for Enterprise Databases

Desktop to Cloud. Browser Migration in the Enterprise. Written By Quest Software, Inc.

How Password Lifecycle Management Can Save Money and Improve Security

An Innovative Approach to SOAP Monitoring. Written By Quest Software

Quest One Privileged Account Appliance

The Case for Quest One Identity Manager

6.0. Planning for Capacity in Virtual Environments Reference Guide

2007 Quest Software, Inc. ALL RIGHTS RESERVED. TRADEMARKS. Disclaimer

The Active Directory Management and Security You ve Always Dreamed Of

Five Tips for Effective Backup and Recovery in Virtual Environments

How to Use Custom Site Templates and Definitions supporting Corporate look-and-feel

Top Seven Tips and Tricks for Group Policy in Windows 7

Enterprise Single Sign-On 8.0.3

Quest Application Performance Monitoring Implementation Methodology

Image-Based Data Protection: Simply Better Data Protection

SharePoint Nine Key Features

How to Use Custom Site Templates and Definitions supporting Corporate look-and-feel

Enterprise Single Sign-On Installation and Configuration Guide

The Active Directory Recycle Bin: The End of Third-Party Recovery Tools?

The Quest Cloud Automation Platform

8.0. Quick Start Guide

Quest Site Administrator 4.4

A Governance Guide for Hybrid SharePoint Migrations. Written By Chris Beckett Information Systems Architect and SharePoint Solutions Specialist

Are You Spending More than You Realize on Active Directory Management?

SHAREPOINT Best Practices for Preparing for SharePoint Migrations. Colin Spence IN FOUR EASY STEPS. Written by

Achieving ISO/IEC Compliance with Quest One Solutions for Privileged Access. Written By Quest Software, Inc.

Quest Support: vworkspace Troubleshooting Guide. Version 1.0

Top Five Reasons to Choose Toad Over SQL Developer

Moving to the Cloud : Best Practices for Migrating from Novell GroupWise to Microsoft Exchange Online Standard

IT Consolidation in the Public Sector: How to Achieve IT Optimization

6.5. Web Interface. User Guide

Protecting and Auditing Active Directory with Quest Solutions

Enterprise Single Sign-On. The Holy Grail of Computing

Best Practices for SharePoint Development and Customization

Exchange 2010 and Your Audit Strategy

2010 Quest Software, Inc. ALL RIGHTS RESERVED. Trademarks. Third Party Contributions

2009 Quest Software, Inc. ALL RIGHTS RESERVED. Trademarks. Disclaimer

Desktop Virtualization: Best Bet for a Dwindling IT Budget?

Best Practices Guide for IT Governance & Compliance

Foglight. Managing Java EE Systems Supported Platforms and Servers Guide

Foglight Foglight Experience Viewer (FxV) Upgrade Field Guide

Controlling & Managing Super User Access

Migrating Lotus Notes Applications to Microsoft Office 365 and SharePoint Online

8.6 Migrating to Exchange 2010

formerly Help Desk Authority Quest Free Network Tools User Manual

System Requirements and Platform Support Guide

Data Center Consolidation Strategies for the Federal CIO

Data center and cloud management. Enabling data center modernization and IT transformation while simplifying IT management

Quest SQL Optimizer 6.5. for SQL Server. Installation Guide

Benchmark Factory for Databases 6.5. User Guide

How to Use Custom Site Templates and Definitions supporting Corporate look-and-feel

Authentication Services 4.1. Authentication Services Single Sign-on for SAP Integration Guide

Choosing the Right Active Directory Bridge Solution

Quest One Password Manager

Foglight for Oracle. Managing Oracle Database Systems Getting Started Guide

for Oracle User Guide

2010 Quest Software, Inc. ALL RIGHTS RESERVED. Trademarks. Third Party Contributions

Quest ActiveRoles Server

SharePoint User Adoption

Quest Site Administrator 4.4

Quest Solutions for PCI Compliance

Foglight Managing SQL Server Database Systems Getting Started Guide. for SQL Server

Unified and Intelligent Identity and Access Management

Foglight Managing SQL Server Database Systems Getting Started Guide. for SQL Server

Foglight. Foglight for Virtualization, Enterprise Edition 7.2. Virtual Appliance Installation and Setup Guide

FOR WINDOWS FILE SERVERS

Meeting the Challenge of Log Management for Unix and Linux Systems

4.0. Offline Folder Wizard. User Guide

Quest vworkspace Virtual Desktop Extensions for Linux

8.0. Forest Edition. Deployment Guide

Spotlight on SQL Server 7.0. Reporting and Trending Guide

Foglight. Dashboard Support Guide

Quest Migration Manager 3.2

Extending Native Active Directory Capabilities to Unix and Linux

Quest ChangeAuditor 4.8

Dell One Identity Cloud Access Manager How to Configure vworkspace Integration

ChangeAuditor 5.6. For Windows File Servers Event Reference Guide

Top 10 Tips for Optimizing SQL Server Performance

Defender Delegated Administration. User Guide

ChangeAuditor 6.0 For Windows File Servers. Event Reference Guide

2.0. Quick Start Guide

How to Use Custom Site Templates and Definitions supporting Corporate look-and-feel

2011 Quest Software, Inc. ALL RIGHTS RESERVED. Trademarks. Third Party Contributions

Gain Control of Space with Quest Capacity Manager for SQL Server. written by Thomas LaRock

Foglight. Foglight for Virtualization, Free Edition Installation and Configuration Guide

Dell Spotlight on Active Directory Server Health Wizard Configuration Guide

Transcription:

Migrating Your Applications to the Cloud How to Overcome the Challenges and Reduce the Costs Written By Quest Software, Inc.

Contents Abstract... 2 Introduction... 3 What is the Cloud?... 3 Current and Emerging Cloud Technologies... 3 Historic Migration Solutions... 5 Microsoft s Business Desktop Deployment (BDD) Paradigm... 5 The Rise of Application Compatibility Issues... 5 Migration Today... 6 A Hybrid Approach... 6 Key Questions... 6 Available Virtualization Technologies... 6 New Challenges for the Cloud... 7 Manual Methods Are No Longer Viable... 7 The Advent of Automated Application Compatibility Testing and Remediation... 7 Weighing the Risks and Benefits of Moving to the Cloud... 7 Conclusion... 9 For More Information... 10 Cloud Computing... 10 Virtualisation Technologies... 10 Quest ChangeBASE... 10 1

Abstract Many organizations want to realize the benefits of accessing and using their applications in the cloud. This paper discusses several challenges to achieving this goal, including: The limitations of historic solutions to date The new challenges unique to a cloud migration The current landscape of virtual technology. Also included is rationale for organizations to consider automated approach to application compatibility testing, fixing and packaging. 2

Introduction What is the Cloud? There are many definitions of the cloud. Here is one from the American National Institute of Standards and Technology (NIST): "Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. 1 In layman s terms, the cloud combines two important aspects of how we use computers today; storage (computer power) and accessibility (security and management). The cloud couples these two functions together, providing an accessible web front end for the user with flexible or elastic resource capability behind it. Cloud-based solutions offer many benefits, including mitigation of risk and reduction in resources required. Figure Figure 1: The Benefits of the Cloud 1 illustrates additional benefits: Current and Emerging Cloud Technologies Technologies are now available for both desktop virtualization and application virtualization. Many applications are already available in the cloud, including Salesforce, Google Docs and Microsoft s Office 365. These cloudbased applications employ a web front end, with all the processing completed on databases hosted on public or private cloud storage. The true dawn of cloud applications, however, will arrive when business and everyday 1 American National Institute of Standards and Technology, The NIST Definition of Cloud Computing (draft). http://csrc.nist.gov/publications/nistpubs/800-145/sp800-145.pdf. 3

desktop applications like 3D image rendering and editing solutions can run from a cloud environment. This is starting to be seen with HTML5, which is able to hook together mobile devices, web rendering, advanced applications and graphics. 4

Historic Migration Solutions Microsoft s Business Desktop Deployment (BDD) Paradigm How do we get our business-critical desktop applications ready for a cloud environment? The most common approaches to application migration used by large and medium sized organizations are generally based on Microsoft s Business Desktop Deployment (BDD) paradigm, 2 illustrated in Figure 2. In this model, the transition from a single platform occurs in the following basic stages: Discovery and source code Repository Application compatibility (assuming assessment and remediation) Infrastructure remediation and computer imaging (desktop or server) Application management and deployment User state migration and security profiles Deployment process Operational readiness Figure 2: Microsoft Business Desktop Deployment Diagram The Rise of Application Compatibility Issues For migrations to versions of Windows prior to XP SP2, application compatibility issues were comparatively minor. Automated compatibility assessment and remediation tools were not generally required, and the risk and effort were generally low in proportion to the size of the application portfolio. Application compatibility first started causing significant challenges when enterprises started moving to XP SP2. The problem was especially acute because no tools existed at that time. Of course, the application compatibility challenge becomes increasingly complex with each new technology version, with Windows 7 being the greatest challenge to date. Fortunately, various application compatibility technologies have been created to help organizations migrate successfully. 2 Daniel Lai, Business Desktop Deployment Solution Accelerator 2007 Standard Edition Training Guide. http://www.microsoft.com/hk/community/article/article_060704.aspx. 5

Migration Today A Hybrid Approach Today, moving applications to the cloud is more complex. Not all applications are suitable for deployment to cloud-based solutions, and some applications may be better suited for one vendor s cloud solution than another s. Therefore, today s migrations will not follow the historic approach advocated by the Microsoft BDD program, but will involve a mix of environments, including the following: Desktop application deployments Server-based hosting solutions Multiple virtualization environments Multiple cloud solutions In fact, many companies are already opting for a hybrid model in the virtualization area. As the top four virtual technology vendors (Microsoft, Citrix, VMware and Symantec) compete to provide the best offering, releasing new product features each quarter in response to customer demand, many organizations will use two or more virtualization products to best address their user need and storage requirements. Often a hybrid approach to virtualization is chosen out of necessity: some applications simply are not compatible with App-V, for example, while others cannot be virtualized with Symantec. This often prevents an organization from choosing a single virtual platform for use across their entire application estate, since the risk of not being able to remediate compatibility issues could leave them without critical business functionality. In addition, organizations choose not to virtualize some applications at all; for instance, if an application is used rarely or only by a few people, the ROI of putting it into the cloud may be deemed too low. Therefore, organizations may choose to use some applications in a native format (EXE & MSI) alongside their virtualized applications. In general, application administrators should expect a minimum of two deployment and target platforms, and therefore prepare for an explosion of complexity in managing their application portfolio. Key Questions To determine the best approach, application owners will need to address the following questions: Which applications are suitable for server, virtual and cloud deployments? What effort is required to update or remediate each application to ensure future compatibility? What tools are required to convert each application so that it is compatible with the target platform(s)? Available Virtualization Technologies Here is a non-exhaustive list of vendors offering application virtualization. Their products offer different benefits and may generate unique compatibility issues: Microsoft App-V VMware ThinApp Citrix XenApp Symantec SWV 6

New Challenges for the Cloud Manual Methods Are No Longer Viable Early virtual application capture technology (referred to as sequencing or profiling ) experienced a number of technological limitations that impaired application installations or runtime functionality. The virtualization technology industry has improved over the past five years, but there are still limitations and rules that have to be adhered to for each technology. This can result in compatibility issues for application installs and runtime, update and un-install processes, leading to the following problems: Application compatibility assessments are now essential, requiring time and skill. Additional skills and resource are required to convert applications from native to virtual formats. Different technologies may suit specific applications. Some distribution technologies may not support every virtual solution. Organizations often try to address these challenges by adding staff to the project team to manually assess, fix and convert desktop applications for the target virtual platform. Of course, this can entail huge cost, whether the company chooses outsourcing, off-shoring or hiring internally. Moreover, managing these large teams can become a challenge, with the consistency of volume and technical output left at risk. Moreover, now that we have many choices of virtualization technology, it is quite possible that enterprises will have to double, treble or even quadruple the amount of time and resource they allocate for manual application compatibility testing and remediation, since they will need to take into account not only the OS but also each virtualization technology. The Advent of Automated Application Compatibility Testing and Remediation With multiple target platforms, multiple technologies and multiple vendors, the historic, manual approach to migrating desktops and application portfolios is no longer suitable. Instead, organizations are opting for automated application compatibility testing and fixing, since the time needed for testing and remediation remains the same no matter how many virtual platforms are selected. Weighing the Risks and Benefits of Moving to the Cloud While moving to a cloud-based solution reduces or eliminates some historic migration components, it can bring new IT management challenges, such as: OS platform assessment and remediation Virtualization platform assessment Application conversion to target platform Middleware and dependency management User state and profile management Figure 3 illustrates some of the common concerns that IT administrators and application owners must manage in the effort to migrate their applications from a standard desktop environment to virtual and server-based systems and then to the cloud. 7

As this diagram indicates, the magnitude of the risks increases as more applications are migrated to the cloud. Furthermore, the hybrid model that many organizations will be obliged to adopt also increases risk in proportion to the number of solutions included in the hybrid model. Accordingly, decision makers must weigh the benefits of an optimal hybrid solution against the resulting complexity of the cloud enablement process. Again, the potential to apply automated application compatibility testing and remediation will become a key factor in this decision, as it will allow enterprises to reduce much of the risk. Figure 3: Risk areas for migrating to the cloud 8

Conclusion This paper has highlighted many of the key challenges in moving to the cloud. Organizations should expect to adopt a hybrid migration model, with several virtual and hosting solutions and some applications remaining in the native deployment. Application administrators should prepare for multiple deployment and target platforms and expect an explosion of complexity in managing their application portfolio. Decision makers must weigh the benefits of an optimal hybrid solution against the resulting complexity of the cloud enablement process. Key questions to ask include: Which of my applications will be best suited to a hosted, virtual or cloud deployment? What tools are required to test, remediate and convert my applications for new the target system(s)? Which challenges will cause particular pain for me? In addition, given the challenges of a hybrid migration, with multiple target platforms, multiple technologies and multiple vendors, the historic, manual approach to migrating desktops and application portfolios is no longer suitable. Organizations should investigate taking an automated approach to application compatibility testing, fixing and packaging. This automation will greatly reduce both the complexity of the process and the time and cost required to complete this aspect of the migration. 9

For More Information Cloud Computing For more information about the cloud, please see the following: http://www.microsoft.com/en-gb/cloud/default.aspx?cr_cc=200016287&wt.srch=1&cr_scc=200016287 http://www.infoworld.com/d/cloud-computing/what-cloud-computing-really-means-031 http://www.gartner.com/it/page.jsp?id=707508 http://technology.timesonline.co.uk/tol/news/tech_and_web/article3874599.ece Virtualisation Technologies For more information about specific virtualization technologies, please see the following: Microsoft Application Virtualisation (App-V) http://www.microsoft.com/windows/enterprise/solutions/virtualisation/products/app-v.aspx VMware ThinApp: http://www.vmware.com/products/thinapp/overview.html Citrix XenApp: http://www.citrix.com/english/ps2/products/product.asp?contentid=186 Symantec SWV: http://www.symantec.com/en/uk/business/solutions Quest ChangeBASE For more information about Quest ChangeBASE solutions, please see: http://www.quest.com/changebase/ 10

2012 Quest Software, Inc. ALL RIGHTS RESERVED. This document contains proprietary information protected by copyright. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording, for any purpose without the written permission of Quest Software, Inc. ( Quest ). The information in this document is provided in connection with Quest products. No license, express or implied, by estoppel or otherwise, to any intellectual property right is granted by this document or in connection with the sale of Quest products. EXCEPT AS SET FORTH IN QUEST'S TERMS AND CONDITIONS AS SPECIFIED IN THE LICENSE AGREEMENT FOR THIS PRODUCT, QUEST ASSUMES NO LIABILITY WHATSOEVER AND DISCLAIMS ANY EXPRESS, IMPLIED OR STATUTORY WARRANTY RELATING TO ITS PRODUCTS INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT. IN NO EVENT SHALL QUEST BE LIABLE FOR ANY DIRECT, INDIRECT, CONSEQUENTIAL, PUNITIVE, SPECIAL OR INCIDENTAL DAMAGES (INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF PROFITS, BUSINESS INTERRUPTION OR LOSS OF INFORMATION) ARISING OUT OF THE USE OR INABILITY TO USE THIS DOCUMENT, EVEN IF QUEST HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Quest makes no representations or warranties with respect to the accuracy or completeness of the contents of this document and reserves the right to make changes to specifications and product descriptions at any time without notice. Quest does not make any commitment to update the information contained in this document. If you have any questions regarding your potential use of this material, contact: Quest Software World Headquarters LEGAL Dept 5 Polaris Way Aliso Viejo, CA 92656 www.quest.com email: legal@quest.com Refer to our Web site for regional and international office information. 11

Trademarks Quest, Quest Software, the Quest Software logo, AccessManager, ActiveRoles, Aelita, Akonix, AppAssure, Benchmark Factory, Big Brother, BridgeAccess, BridgeAutoEscalate, BridgeSearch, BridgeTrak, BusinessInsight, ChangeAuditor, ChangeBASE, ChangeManager, Defender, DeployDirector, Desktop Authority, DirectoryAnalyzer, DirectoryTroubleshooter, DS Analyzer, DS Expert, Foglight, GPOADmin, Help Desk Authority, Imceda, IntelliProfile, InTrust, Invirtus, itoken, I/Watch, JClass, Jint, JProbe, LeccoTech, LiteSpeed, LiveReorg, LogADmin, MessageStats, Monosphere, MultSess, NBSpool, NetBase, NetControl, Npulse, NetPro, PassGo, PerformaSure, Point,Click,Done!, PowerGUI, Quest Central, Quest vtoolkit, Quest vworkspace, ReportADmin, RestoreADmin, ScriptLogic, Security Lifecycle Map, SelfServiceADmin, SharePlex, Sitraka, SmartAlarm, Spotlight, SQL Navigator, SQL Watch, SQLab, Stat, StealthCollect, Storage Horizon, Tag and Follow, Toad, T.O.A.D., Toad World, vautomator, vcontrol, vconverter, vfoglight, voptimizer, vranger, Vintela, Virtual DBA, VizionCore, Vizioncore vautomation Suite, Vizioncore vbackup, Vizioncore vessentials, Vizioncore vmigrator, Vizioncore vreplicator, WebDefender, Webthority, Xaffire, and XRT are trademarks and registered trademarks of Quest Software, Inc in the United States of America and other countries. Other trademarks and registered trademarks used in this guide are property of their respective owners. Updated January 2012 12

About Quest Software, Inc. Quest Software (Nasdaq: QSFT) simplifies and reduces the cost of managing IT for more than 100,000 customers worldwide. Our innovative solutions make solving the toughest IT management problems easier, enabling customers to save time and money across physical, virtual and cloud environments. For more information about Quest solutions for administration and automation, data protection, development and optimization, identity and access management, migration and consolidation, and performance monitoring, go to www.quest.com. Contacting Quest Software PHONE 800.306.9329 (United States and Canada) If you are located outside North America, you can find your local office information on our Web site. EMAIL sales@quest.com MAIL Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA 92656 USA Contacting Quest Support Quest Support is available to customers who have a trial version of a Quest product or who have purchased a commercial version and have a valid maintenance contract. Quest Support provides around-the-clock coverage with SupportLink, our Web self-service. Visit SupportLink at https://support.quest.com. SupportLink gives users of Quest Software products the ability to: Search Quest s online Knowledgebase Download the latest releases, documentation and patches for Quest products Log support cases Manage existing support cases View the Global Support Guide for a detailed explanation of support programs, online services, contact information and policies and procedures. WPW-ChangeBASE-Virtualisation-A4-SW-01132012 13