Long Distance Workload Migration



Similar documents
EMC VPLEX FAMILY. Continuous Availability and data Mobility Within and Across Data Centers

EMC VPLEX FAMILY. Continuous Availability and Data Mobility Within and Across Data Centers

Trusted Geolocation in the Cloud. Based on NIST Interagency Report Trusted Geolocation in the Cloud: Proof of Concept Implementation

Trusted Geolocation in The Cloud Technical Demonstration

Control your corner of the cloud.

How RSA has helped EMC to secure its Virtual Infrastructure

Building Trust and Compliance in the Cloud with Intel Trusted Execution Technology

EMC VPLEX FAMILY. Transparent information mobility within, across, and between data centers ESSENTIALS A STORAGE PLATFORM FOR THE PRIVATE CLOUD

THE VIRTUAL DATA CENTER OF THE FUTURE

Continuous Data Protection for any Point-in-Time Recovery: Product Options for Protecting Virtual Machines or Storage Array LUNs

HyTrust Logging Solution Brief: Gain Virtualization Compliance by Filling Log Data Gaps

HIGHLY AVAILABLE MULTI-DATA CENTER WINDOWS SERVER SOLUTIONS USING EMC VPLEX METRO AND SANBOLIC MELIO 2010

RSA Solution Brief. The RSA Solution for Cloud Security and Compliance

QTS Leverages HyTrust to Build a FedRAMP Compliant Cloud

Can You be HIPAA/HITECH Compliant in the Cloud?

The RSA Solution for. infrastructure security and compliance. A GRC foundation for VMware. Solution Brief

RSA Security Solutions for Virtualization

How To Protect Your Virtual Infrastructure From Attack From A Cyber Threat

Getting the Most Out of Virtualization of Your Progress OpenEdge Environment. Libor Laubacher Principal Technical Support Engineer 8.10.

Integration and Automation with Lenovo XClarity Administrator

Drawbacks to Traditional Approaches When Securing Cloud Environments

VMware Integrated Partner Solutions for Networking and Security

How To Protect Virtualized Data From Security Threats

H Y T RUST: S OLUTION B RIEF. Solve the Nosy Neighbor Problem in Multi-Tenant Environments

Protect Root Abuse privilege on Hypervisor (Cloud Security)

Enterprise Storage Solution for Hyper-V Private Cloud and VDI Deployments using Sanbolic s Melio Cloud Software Suite April 2011

REDEFINE SIMPLICITY TOP REASONS: EMC VSPEX BLUE FOR VIRTUALIZED ENVIRONMENTS

Hypervisor Competitive Differences: Beyond the Data Sheet. Chris Wolf Senior Analyst, Burton Group

Index. BIOS rootkit, 119 Broad network access, 107

DISASTER RECOVERY BUSINESS CONTINUITY DISASTER AVOIDANCE STRATEGIES

MaxDeploy Hyper- Converged Reference Architecture Solution Brief

HyTrust Addendum to the VMware Product Applicability Guide. For. Federal Risk and Authorization Management Program (FedRAMP) version 1.

Availability for your modern datacenter

Accelerate OpenStack* Together. * OpenStack is a registered trademark of the OpenStack Foundation

Journey to the Private Cloud. Key Enabling Technologies

Optimized Storage Solution for Enterprise Scale Hyper-V Deployments

SUSE Cloud 2.0. Pete Chadwick. Douglas Jarvis. Senior Product Manager Product Marketing Manager

Protecting Virtual Endpoints with McAfee Server Security Suite Essentials

How to Achieve Operational Assurance in Your Private Cloud

Intel Cloud Builders Guide: Cloud Design and Deployment on Intel Platforms

Intel IT Cloud 2013 and Beyond. Name Title Month, Day 2013

SOLUTIONS PRODUCTS INDUSTRIES RESOURCES SUPPORT ABOUT US ClearCube Technology, Inc. All rights reserved. Contact Support

Session 1: Managing Software Licenses in Virtual Environments. Paul Baguley, Principal, Advisory Services KPMG

Instant Recovery for VMware

Stretching VMware clusters across distances with EMC's Vplex - the ultimate in High Availability.

私 有 雲 再 進 化 EMC Hybrid Cloud 解 決 方 案. 徐 師 亮 Sydney Hsu / EMC 系 統 工 程 協 理

VBLOCK DATA PROTECTION: BEST PRACTICES FOR EMC VPLEX WITH VBLOCK SYSTEMS

IMPROVING VMWARE DISASTER RECOVERY WITH EMC RECOVERPOINT Applied Technology

End to end application delivery & Citrix XenServer 5. John Glendenning Vice President Server Virtualization, EMEA

RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS: COMPETITIVE FEATURES

Private Cloud Migration

Hard Partitioning and Virtualization with Oracle Virtual Machine. An approach toward cost saving with Oracle Database licenses

CloudControl Support for PCI DSS 3.0

How To Manage A Database Server 2012

RightScale mycloud with Eucalyptus

Closing the cloud and virtualization gap

Introduction to Virtualization. Paul A. Strassmann George Mason University October 29, 2008, 7:20 to 10:00 PM

Zerto Virtual Manager Administration Guide

Preparing an RFI for. This RFI has been updated to reflect the new requirements in Version 3.0 of the PCI DSS, which took effect January 2015.

THE VIRTUAL DATA CENTER OF THE FUTURE

CA ControlMinder for Virtual Environments May 2012

9/26/2011. What is Virtualization? What are the different types of virtualization.

A virtual SAN for distributed multi-site environments

Deployment Options for Microsoft Hyper-V Server

Virtualization Essentials

Data Center Manager (DCM)

Cloud Under Control: How to Virtualize More by Virtualizing More Securely

Consolidated Monitoring, Analysis, and Automated Remediation For Hybrid IT Infrastructures

SUSE Cloud 5 Private Cloud based on OpenStack

ADVANCEMENTS IN CONVERGED INFRASTRUCTURE

Alliance Key Manager Solution Brief

Using SUSE Cloud to Orchestrate Multiple Hypervisors and Storage at ADP

Availability for the modern datacentre

RSA, The Security Division of EMC. Zamanta Anguiano Sales Manager RSA

Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. kluck@vmware.com

VMware vsphere: [V5.5] Admin Training

Whitepaper. NexentaConnect for VMware Virtual SAN. Full Featured File services for Virtual SAN

CA ARCserve Replication and High Availability Deployment Options for Hyper-V

Citrix XenServer 7 Feature Matrix

Learn the essentials of virtualization security

Intel Service Assurance Administrator. Product Overview

Security. Environments. Dave Shackleford. John Wiley &. Sons, Inc. s j}! '**»* t i j. l:i. in: i««;

Grade Disaster Recovery with Azure Site

What s New with VMware Virtual Infrastructure

Tenable Webcast Summary Managing Vulnerabilities in Virtualized and Cloud-based Deployments

Business Process Desktop: Acronis backup & Recovery 11.5 Deployment Guide

Securing the Journey to the Private Cloud. Dominique Dessy RSA, the Security Division of EMC

NIST Interagency Report 7904 (Draft) Trusted Geolocation in the Cloud: Proof of Concept Implementation (Draft)

Microsoft SharePoint 2010 on VMware Availability and Recovery Options. Microsoft SharePoint 2010 on VMware Availability and Recovery Options

VBLOCK GRC SOLUTION WITH RSA (GOVERNANCE, RISK, AND COMPLIANCE)

INCORPORATING CLOUDLINK SECUREVSA OFFERINGS IN EMC VSPEX DESIGNS

HP Virtualization Performance Viewer

EXTENDED ORACLE RAC with EMC VPLEX Metro

Virtualization Technologies and Blackboard: The Future of Blackboard Software on Multi-Core Technologies

Cisco Intelligent Automation for Cloud

High Availability for Virtualized Environment. NEC Corporation

Healthcare: La sicurezza nel Cloud October 18, IBM Corporation

Red Hat enterprise virtualization 3.0 feature comparison

vcloud Suite Architecture Overview and Use Cases

Becoming a Cloud Services Broker. Neelam Chakrabarty Sr. Product Marketing Manager, HP SW Cloud Products, HP April 17, 2013

Transcription:

Long Distance Workload Migration Secure Data Access and Movement Between Clouds Mark Lesher Sr. Director EMC 2 Cloud Infrastructure Solutions September 10 1

Drivers for Long Distance Workload Migration Business Continuity Resource Locality Follow the Sun Dynamic Scaling Data Center Migration Motivated by ODCA usage model 2

Enabler for Long Distance Workload Migration Business Continuity Resource Locality Collaboration Follow the Sun Dynamic Scaling Data Center Migration Mobility Availability 3

Federated Data Access With EMC VPLEX Site A - Active Site B - Active Active-Active Data Access Federated AccessAnywhere Utilize resources at both sites Move and share data nondisruptively Have the exact same information In two separate locations Accessible at the same time

VPLEX Enablers AVAILABILITY MOBILITY COLLABORATION Cluster A Cluster B Federated AccessAnywhere Maintain availability and non-stop access by mirroring across locations Zero RPO/RTO Eliminate storage operations from failover Federated AccessAnywhere Move and relocate VMs, applications, and data over distance Active-active data centers Disaster avoidance Data center migration Workload rebalancing Federated AccessAnywhere Enable concurrent read/write access to data across locations Instant and simultaneous data access over distance Streamline workflows

Secure, Long Distance Workload Migration with EMC, RSA, Intel, and HyTrust EMC ODCA Booth #110 6

Demonstration 1. Non-disruptive and secure workload migration between two data centers that represent a service provider IaaS cloud environment using EMC VPLEX and stretched clusters 2. Secure Boot of VMware ESXi 5.1 hosts and verification by Intel Trusted Execution in bios against known good whitelist 3. Active enforcement of security policy compliance related by HyTrust * security appliance. 4. Enhanced auditing capabilities with RSA s * Solution for Cloud Security and Compliance

A EMC * VPLEX * Virtualization LIVE MIGRATION POSSIBLE IF USING VSPHERE *, OVM*, XEN*, IBM LPAR*, OR HYPER-V * Cluster or Virtual Host Layer NATIVE CLUSTER or VIRTUALIZATION NATIVE CLUSTER OR VIRTUALIZATION Physical Host Layer SITE A Virtual Storage Layer AccessAnywhere * SITE B LINK A Physical Storage Layer

Policy Enforcement HyTrust Appliance Verifies platform integrity, ensuring the hypervisor is hardened and the virtual infrastructure is trusted Enforces consistent access and authorization policies covering all access methods Provides granular, userspecific, audit-quality logs Enables strong, multi-factor authentication Provides complete visibility into and control over who accesses the infrastructure, defends the integrity of the infrastructure, and validates all changes requested.

RSA Solution for Cloud Security and Compliance Guided Remediation Automated Measurement Agent Device Discovery + Configuration Measurement RSA Archer egrc VMware-specific Controls alerts RSA envision Intel Trusted Execution Technology (Intel TXT) 10

Events Brought into Compliance Dashboard Intel Trusted Execution Technology (Intel TXT) 11

Bringing It All Together Site 1 Site 2 1 Non-disruptive workload migration across distance using EMC * VPLEX * EMC AccessAnywhere 2 3 4 5 Trusted Launch Secure boot of host and verification of launch time components Trusted Pools Enable Intel TXT trusted hosts to be grouped into clusters of trusted resources True security policy enforcement across cloud environments using HyTrust * Appliance Overall compliance reporting with RSA * Archer egrc Intel Trusted Execution Technology (Intel TXT) 12

Where to see more - Wednesday 3:30PM RM 2008 Take Control of your Cloud: Solutions to Meet Security and Compliance Needs Raghu Yeluri, Principal Engineer, Intel Corporation Hemma Prafullchandra, CTO/SVP Products, HyTrust, Inc. John McAuley, Principal Solutions Consultant, EMC Corporation SECS005

Thank You 14