SlideShare ist ein Scribd-Unternehmen logo
1 von 30
Interested in learning more cloud?

  Learn about the cloud sessions offered at the upcoming Fall 2012 Data
  Center World Conference at:

  www.datacenterworld.com.




This presentation was given during the Spring, 2012 Data Center World Conference and Expo.
Contents contained are owned by AFCOM and Data Center World and can only be reused with the
express permission of ACOM. Questions or for permission contact: jater@afcom.com.
Turbulence in the Cloud




Richard L. Sawyer
Strategist, HP Critical Facilities Services
AFCOM Spring 2012
 Demand drives the market
 What is the cloud?
 Impact of the cloud
 Storm clouds on the horizon
 What is the risk, really?
 How do you manage the cloud?
 Storm cloud checklist
Service demand drives cloud formation
2+ Trillion Users!
• On-line, real time services
• Self-service
• Automated response
• Automated payment
• Automated qualification
• Digital direct marketing (is
your insurance due to
renew?)
• Digital mass marketing (who
needs and actor?)
• Digital claims processing
Instantaneous Consumption:
10 Billion iPhone Application
downloads WW from Apple alone

Nielsen:
98% of iPhone owners use data
services

88% use iPhone for internet
 A pool of highly scalable, abstracted
  infrastructure, capable of hosting end-customer
  applications, that is billed by consumption.
 Implications:
    ◦   “Pool”                         = shared things
    ◦   “Abstracted infrastructure”    = virtualization
    ◦   “Highly scalable”              = load sensitive
    ◦   “Hosting”               = servicing
    ◦   “Billed”                       = metered service
Data
        USER        Network        Center


• DedicatedData Center, owned, leased, rented
• Business specific applications on silo systems
• Data and user closely linked
• Data Center anywhere
• User anywhere
• Shared platforms
• Virtual servers
• Rented service
• User/data link weak
Hybrid delivery mix and cloud

                                                Public




                                                               HYBRID DELIVERY
                                                               • Fully automated self-
                                                                 service delivery
                                                               • Orchestrated, managed &
                                                Private          secured hybrid service
                                                                 delivery
 TRADITIONAL IT                 PRIVATE AND                    • Brokered services based
 •Minimal automation            PUBLIC CLOUD                     on business requirements
 •Traditional methods of        •Partial automation
 service delivery – internal,
11HP Confidential
                                •New disparate public    and
 outsourcing, hosting           private cloud services
Flavors:
Internal

Hosted

Private

Public

Hybrid
   Data center as a utility
    ◦ PODs
    ◦ Modular construction
    ◦ Redundancy as needed
   Utilization (cost) driven metrics
    ◦ Server images: from 1 to 8+
    ◦ Metered usage
   Access is dependent
    ◦ Network and Internet availability
    ◦ Security and operational stability
   More data centers!
Christian Belady, MS Global Foundation Services, Mar
2011 “How big is the data center market?”
 Fraud
 Identity theft
 Financial immobility
 Lack of access (911, heath, safety services)
 Whacking: WAP networking invasions
 Hacking: Incursion for information
 Cracking: Incursion for malice (destruction,
  financial gain, denial of service, etc.)
 Government monitoring and control
 BYOD!
•Federal Budget for Internet
              Security: $13.3 Billion by
              2015

              •9.1% growth Y-O-Y

              •445% increase in reported
              attacks between 2006 -
GAO-10-834T   2010
                    Sources: GAO, Security Week
Item       Activity                                         No   Ye
                                                                 s
People     Right employees, right knowledge, right roles
Policies   Policies and procedures for service continuity
Process Models for secure transfer of data between users
        and providers
Product Defense-in-Depth technology to manage and
        mitigate risk
Proof   Validation methods, metrics and KPI’s to track
        security controls



                What is your capability maturity level?
 Everything depends on network connectivity.
 The data, whether business or personal, resides

  elsewhere.
 The ability to process with sufficient capacity,

  reliability and availability depends, ultimately, on
  the reliability of the data center.
   Three (3) types:     Strategy to Mitigate
    ◦ Loss of            risk:
                         1)Diversify access
      connectivity (no
                             -Modality
      data)
                             -Routing
    ◦ Bad connectivity   1)Monitor
      (bad data)             -Qualitative
    ◦ Redirection            -Quantitative
      (stolen data)          -Access/Output
                         1)Operate without
                         network
 Your data is your business
 Your data is your life
 You are your data
 Where is your data?
    ◦   Access controlled
    ◦   Resident copies (stored, electronically or paper)
    ◦   Dedicated data center
    ◦   Backup servers
    ◦   Multi-site storage
    ◦   Encrypted
 Unreliable data center = unreliable Cloud
 Reliable data centers have common engineering

  characteristics:
    ◦ Redundant capacity
    ◦ Concurrent maintainability
    ◦ Fault tolerance
   Scaling down reliability
    ◦   PODs, Hybrid, Modular data centers
    ◦   The “7-11” Solution
    ◦   “Laptop, Smartphone, HD” to Go
    ◦   “Data Centers on a Chip”
   The Cloud is a Service
    ◦ Get your Service Level Agreements right
    ◦ Train your suppliers, train your users
   The Cloud is the Data Center
    ◦ Locate, design, build and operate for reliability
    ◦ Leverage reliability methodology no matter what the
      scale
   Low tech business continuity options
    ◦ Don’t assume high tech is going to be the go-to solution
    ◦ Build your crash cart
RANSFORM legacy       MANAGE AN
frastructure,         SECURE acro
pplications, people   legacy applica
nd process            and cloud ass
on-premises                      CO
ervices                          of
                                 se
                                 se
 Are space, power and cooling sufficiently available?
 Are there differentiated reliability levels?
 Are personnel screened and trained?
 Are vendors and other clients managed effectively?
 What is the connectivity capacity and topography?
 What is the availability history of the site?
 Are SLA’s negotiable and meaningful?
 Do I trust my data to their management?
 Do I have more than two ways to communicate?
 How long can I operate with no internet?

 Can I recover data after the internet is restored?

 Is my recovery management dependent on the

  network?
 Are my human resources going to be available

  and productive?
 Am I sure my plan is going to work?
   Data demand is driving the cloud
   The data center is the cloud
   There will be a significant increase in data centers,
    worldwide to meet demand.
   The major risk is loss of access to data to run the
    business and service clients.
   Network, data and physical security need to be
    managed to mitigate real risks.
   Ask the right questions before committing.
   Have a valid, tested recovery plan.
Credits:

                 •Ian Jagger, HP Marketing
                 •US Government, office of GAO
                 •Security Weekly
                 •Christian Belady, MS Gobal Foundation
                 Services
                 •Gail Dutton, Contributor, Data Center
                 Management
                 •David Geer, Freelance writer



Richard L. Sawyer, Strategist, HP Critical Facility Services
rsawyer@hp.com
Interested in learning more cloud?

  Learn about the cloud sessions offered at the upcoming Fall 2012 Data
  Center World Conference at:

  www.datacenterworld.com.




This presentation was given during the Spring, 2012 Data Center World Conference and Expo.
Contents contained are owned by AFCOM and Data Center World and can only be reused with the
express permission of ACOM. Questions or for permission contact: jater@afcom.com.

Weitere ähnliche Inhalte

Was ist angesagt?

DT Company Overview January 2013
DT Company Overview January 2013DT Company Overview January 2013
DT Company Overview January 2013
DataTactics
 
Cloud Outlook & Implications for Communications Architecture
Cloud Outlook & Implications for Communications ArchitectureCloud Outlook & Implications for Communications Architecture
Cloud Outlook & Implications for Communications Architecture
vCom Solutions
 
Shubhi_Resume_Updated
Shubhi_Resume_UpdatedShubhi_Resume_Updated
Shubhi_Resume_Updated
Shubhi Jain
 
SN-Security Architecture for Mobile Computing and IoT
SN-Security Architecture for Mobile Computing and IoTSN-Security Architecture for Mobile Computing and IoT
SN-Security Architecture for Mobile Computing and IoT
Sukumar Nayak
 
I mpr client overview jan 14 2013
I mpr client overview   jan 14 2013I mpr client overview   jan 14 2013
I mpr client overview jan 14 2013
Ilissa Miller
 

Was ist angesagt? (20)

Nyc lunch and learn 03 15 2012 final
Nyc lunch and learn   03 15 2012 finalNyc lunch and learn   03 15 2012 final
Nyc lunch and learn 03 15 2012 final
 
Sntvt sentivate presentation_blockfyre
Sntvt sentivate presentation_blockfyreSntvt sentivate presentation_blockfyre
Sntvt sentivate presentation_blockfyre
 
Hybride Cloud Strategy
Hybride Cloud StrategyHybride Cloud Strategy
Hybride Cloud Strategy
 
Dimension Data Cloud Demo
Dimension Data Cloud DemoDimension Data Cloud Demo
Dimension Data Cloud Demo
 
(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...
(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...
(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...
 
DT Company Overview January 2013
DT Company Overview January 2013DT Company Overview January 2013
DT Company Overview January 2013
 
Trend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are youTrend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are you
 
Cloud computing-intel-cloud-2015-vision
Cloud computing-intel-cloud-2015-visionCloud computing-intel-cloud-2015-vision
Cloud computing-intel-cloud-2015-vision
 
Cloud Outlook & Implications for Communications Architecture
Cloud Outlook & Implications for Communications ArchitectureCloud Outlook & Implications for Communications Architecture
Cloud Outlook & Implications for Communications Architecture
 
Migrating to cloud
Migrating to cloudMigrating to cloud
Migrating to cloud
 
Dimension Data Cloud Business Unit - Solution Offering
Dimension Data Cloud Business Unit - Solution OfferingDimension Data Cloud Business Unit - Solution Offering
Dimension Data Cloud Business Unit - Solution Offering
 
Shubhi_Resume_Updated
Shubhi_Resume_UpdatedShubhi_Resume_Updated
Shubhi_Resume_Updated
 
Blockchain ibc eng
Blockchain ibc engBlockchain ibc eng
Blockchain ibc eng
 
Cloud Security Alliance - Guidance
Cloud Security Alliance - GuidanceCloud Security Alliance - Guidance
Cloud Security Alliance - Guidance
 
Embedded Analytics: The Next Mega-Wave of Innovation
Embedded Analytics: The Next Mega-Wave of InnovationEmbedded Analytics: The Next Mega-Wave of Innovation
Embedded Analytics: The Next Mega-Wave of Innovation
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourley
 
SN-Security Architecture for Mobile Computing and IoT
SN-Security Architecture for Mobile Computing and IoTSN-Security Architecture for Mobile Computing and IoT
SN-Security Architecture for Mobile Computing and IoT
 
I mpr client overview jan 14 2013
I mpr client overview   jan 14 2013I mpr client overview   jan 14 2013
I mpr client overview jan 14 2013
 
GDMS Presentation CFA Laos
GDMS Presentation CFA LaosGDMS Presentation CFA Laos
GDMS Presentation CFA Laos
 
Mobile enterprise sept 24 v1
Mobile enterprise sept 24 v1Mobile enterprise sept 24 v1
Mobile enterprise sept 24 v1
 

Ähnlich wie Cloudy with a chance of downtime

Extending security in the cloud network box - v4
Extending security in the cloud   network box - v4Extending security in the cloud   network box - v4
Extending security in the cloud network box - v4
Valencell, Inc.
 
Hybrid IT Operations and the Hybrid Cloud
Hybrid IT Operations and the Hybrid CloudHybrid IT Operations and the Hybrid Cloud
Hybrid IT Operations and the Hybrid Cloud
Vistara
 
Eo navigating the cloud
Eo navigating the cloudEo navigating the cloud
Eo navigating the cloud
eophiladelphia
 
Dr. Michael Valivullah, NASS/USDA - Cloud Computing
Dr. Michael Valivullah, NASS/USDA - Cloud ComputingDr. Michael Valivullah, NASS/USDA - Cloud Computing
Dr. Michael Valivullah, NASS/USDA - Cloud Computing
ikanow
 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud Computing
Rohit Buddabathina
 
security and compliance in the cloud
security and compliance in the cloudsecurity and compliance in the cloud
security and compliance in the cloud
Ajay Rathi
 
Identity Insights: Social, Local and Mobile Identity
Identity Insights: Social, Local and Mobile IdentityIdentity Insights: Social, Local and Mobile Identity
Identity Insights: Social, Local and Mobile Identity
Jon Bultmeyer
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Razib M
 
It resource us signal cloud presentation itr - final
It resource   us signal cloud presentation itr - finalIt resource   us signal cloud presentation itr - final
It resource us signal cloud presentation itr - final
svanelderen
 

Ähnlich wie Cloudy with a chance of downtime (20)

EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the Cloud
 
Extending security in the cloud network box - v4
Extending security in the cloud   network box - v4Extending security in the cloud   network box - v4
Extending security in the cloud network box - v4
 
Hybrid IT Operations and the Hybrid Cloud
Hybrid IT Operations and the Hybrid CloudHybrid IT Operations and the Hybrid Cloud
Hybrid IT Operations and the Hybrid Cloud
 
Eo navigating the cloud
Eo navigating the cloudEo navigating the cloud
Eo navigating the cloud
 
Eo navigating the cloud v8
Eo navigating the cloud v8Eo navigating the cloud v8
Eo navigating the cloud v8
 
Dr. Michael Valivullah, NASS/USDA - Cloud Computing
Dr. Michael Valivullah, NASS/USDA - Cloud ComputingDr. Michael Valivullah, NASS/USDA - Cloud Computing
Dr. Michael Valivullah, NASS/USDA - Cloud Computing
 
Cloud Computing and eDiscovery: What is in it for you? By ESG's Brian Babinea...
Cloud Computing and eDiscovery: What is in it for you? By ESG's Brian Babinea...Cloud Computing and eDiscovery: What is in it for you? By ESG's Brian Babinea...
Cloud Computing and eDiscovery: What is in it for you? By ESG's Brian Babinea...
 
ICRTITCS-2012 Conference Publication
ICRTITCS-2012 Conference PublicationICRTITCS-2012 Conference Publication
ICRTITCS-2012 Conference Publication
 
Rubik cloud risks-jun2012
Rubik cloud risks-jun2012Rubik cloud risks-jun2012
Rubik cloud risks-jun2012
 
Business in the cloud
Business in the cloudBusiness in the cloud
Business in the cloud
 
Securing The Clouds with The Standard Best Practices-1.pdf
Securing The Clouds with The Standard Best Practices-1.pdfSecuring The Clouds with The Standard Best Practices-1.pdf
Securing The Clouds with The Standard Best Practices-1.pdf
 
How to Power Innovation with Geo-Distributed Data Management in Hybrid Cloud
How to Power Innovation with Geo-Distributed Data Management in Hybrid CloudHow to Power Innovation with Geo-Distributed Data Management in Hybrid Cloud
How to Power Innovation with Geo-Distributed Data Management in Hybrid Cloud
 
Smarter Test Automation for Web & Mobile Apps
Smarter Test Automation for Web & Mobile AppsSmarter Test Automation for Web & Mobile Apps
Smarter Test Automation for Web & Mobile Apps
 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud Computing
 
security and compliance in the cloud
security and compliance in the cloudsecurity and compliance in the cloud
security and compliance in the cloud
 
Identity Insights: Social, Local and Mobile Identity
Identity Insights: Social, Local and Mobile IdentityIdentity Insights: Social, Local and Mobile Identity
Identity Insights: Social, Local and Mobile Identity
 
ISACA Cloud Computing Risks
ISACA Cloud Computing RisksISACA Cloud Computing Risks
ISACA Cloud Computing Risks
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Secure Big Data Analytics - Hadoop & Intel
Secure Big Data Analytics - Hadoop & IntelSecure Big Data Analytics - Hadoop & Intel
Secure Big Data Analytics - Hadoop & Intel
 
It resource us signal cloud presentation itr - final
It resource   us signal cloud presentation itr - finalIt resource   us signal cloud presentation itr - final
It resource us signal cloud presentation itr - final
 

Mehr von AFCOM

Mehr von AFCOM (12)

Maximizing the life of existing equipment
Maximizing the life of existing equipmentMaximizing the life of existing equipment
Maximizing the life of existing equipment
 
Lowering operating costs through cooling system design
Lowering operating costs through cooling system designLowering operating costs through cooling system design
Lowering operating costs through cooling system design
 
Disaster recovery the new imperative
Disaster recovery the new imperativeDisaster recovery the new imperative
Disaster recovery the new imperative
 
Adding intelligence to your dcim solution rf code
Adding intelligence to your dcim solution rf codeAdding intelligence to your dcim solution rf code
Adding intelligence to your dcim solution rf code
 
Benchmark the Relative Performance of Your Data Center
Benchmark the Relative Performance of Your Data CenterBenchmark the Relative Performance of Your Data Center
Benchmark the Relative Performance of Your Data Center
 
Understanding And Evaluating Colocation Data Centers
Understanding And Evaluating Colocation Data CentersUnderstanding And Evaluating Colocation Data Centers
Understanding And Evaluating Colocation Data Centers
 
Buy vs Build Considerations in Today's Data Center Marketplace
Buy vs Build Considerations in Today's Data Center Marketplace Buy vs Build Considerations in Today's Data Center Marketplace
Buy vs Build Considerations in Today's Data Center Marketplace
 
Data Center Management: Where Brain Meet Braun
Data Center Management: Where Brain Meet BraunData Center Management: Where Brain Meet Braun
Data Center Management: Where Brain Meet Braun
 
Taming the DCIM Wave with ITIL
Taming the DCIM Wave with ITILTaming the DCIM Wave with ITIL
Taming the DCIM Wave with ITIL
 
How to Design a Scalable Private Cloud
How to Design a Scalable Private CloudHow to Design a Scalable Private Cloud
How to Design a Scalable Private Cloud
 
Best Practices To Mitigate Risks When Retiring IT Assets
Best Practices To Mitigate Risks When Retiring IT AssetsBest Practices To Mitigate Risks When Retiring IT Assets
Best Practices To Mitigate Risks When Retiring IT Assets
 
Balancing Trends in Data Center Migration, Site Selection, and Operating Costs
Balancing Trends in Data Center Migration, Site Selection, and Operating CostsBalancing Trends in Data Center Migration, Site Selection, and Operating Costs
Balancing Trends in Data Center Migration, Site Selection, and Operating Costs
 

Kürzlich hochgeladen

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Kürzlich hochgeladen (20)

presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

Cloudy with a chance of downtime

  • 1. Interested in learning more cloud? Learn about the cloud sessions offered at the upcoming Fall 2012 Data Center World Conference at: www.datacenterworld.com. This presentation was given during the Spring, 2012 Data Center World Conference and Expo. Contents contained are owned by AFCOM and Data Center World and can only be reused with the express permission of ACOM. Questions or for permission contact: jater@afcom.com.
  • 2. Turbulence in the Cloud Richard L. Sawyer Strategist, HP Critical Facilities Services AFCOM Spring 2012
  • 3.  Demand drives the market  What is the cloud?  Impact of the cloud  Storm clouds on the horizon  What is the risk, really?  How do you manage the cloud?  Storm cloud checklist
  • 4. Service demand drives cloud formation
  • 6. • On-line, real time services • Self-service • Automated response • Automated payment • Automated qualification • Digital direct marketing (is your insurance due to renew?) • Digital mass marketing (who needs and actor?) • Digital claims processing
  • 7. Instantaneous Consumption: 10 Billion iPhone Application downloads WW from Apple alone Nielsen: 98% of iPhone owners use data services 88% use iPhone for internet
  • 8.  A pool of highly scalable, abstracted infrastructure, capable of hosting end-customer applications, that is billed by consumption.  Implications: ◦ “Pool” = shared things ◦ “Abstracted infrastructure” = virtualization ◦ “Highly scalable” = load sensitive ◦ “Hosting” = servicing ◦ “Billed” = metered service
  • 9. Data USER Network Center • DedicatedData Center, owned, leased, rented • Business specific applications on silo systems • Data and user closely linked
  • 10. • Data Center anywhere • User anywhere • Shared platforms • Virtual servers • Rented service • User/data link weak
  • 11. Hybrid delivery mix and cloud Public HYBRID DELIVERY • Fully automated self- service delivery • Orchestrated, managed & Private secured hybrid service delivery TRADITIONAL IT PRIVATE AND • Brokered services based •Minimal automation PUBLIC CLOUD on business requirements •Traditional methods of •Partial automation service delivery – internal, 11HP Confidential •New disparate public and outsourcing, hosting private cloud services
  • 13. Data center as a utility ◦ PODs ◦ Modular construction ◦ Redundancy as needed  Utilization (cost) driven metrics ◦ Server images: from 1 to 8+ ◦ Metered usage  Access is dependent ◦ Network and Internet availability ◦ Security and operational stability  More data centers!
  • 14. Christian Belady, MS Global Foundation Services, Mar 2011 “How big is the data center market?”
  • 15.  Fraud  Identity theft  Financial immobility  Lack of access (911, heath, safety services)  Whacking: WAP networking invasions  Hacking: Incursion for information  Cracking: Incursion for malice (destruction, financial gain, denial of service, etc.)  Government monitoring and control  BYOD!
  • 16. •Federal Budget for Internet Security: $13.3 Billion by 2015 •9.1% growth Y-O-Y •445% increase in reported attacks between 2006 - GAO-10-834T 2010 Sources: GAO, Security Week
  • 17.
  • 18. Item Activity No Ye s People Right employees, right knowledge, right roles Policies Policies and procedures for service continuity Process Models for secure transfer of data between users and providers Product Defense-in-Depth technology to manage and mitigate risk Proof Validation methods, metrics and KPI’s to track security controls What is your capability maturity level?
  • 19.  Everything depends on network connectivity.  The data, whether business or personal, resides elsewhere.  The ability to process with sufficient capacity, reliability and availability depends, ultimately, on the reliability of the data center.
  • 20. Three (3) types: Strategy to Mitigate ◦ Loss of risk: 1)Diversify access connectivity (no -Modality data) -Routing ◦ Bad connectivity 1)Monitor (bad data) -Qualitative ◦ Redirection -Quantitative (stolen data) -Access/Output 1)Operate without network
  • 21.  Your data is your business  Your data is your life  You are your data  Where is your data? ◦ Access controlled ◦ Resident copies (stored, electronically or paper) ◦ Dedicated data center ◦ Backup servers ◦ Multi-site storage ◦ Encrypted
  • 22.  Unreliable data center = unreliable Cloud  Reliable data centers have common engineering characteristics: ◦ Redundant capacity ◦ Concurrent maintainability ◦ Fault tolerance  Scaling down reliability ◦ PODs, Hybrid, Modular data centers ◦ The “7-11” Solution ◦ “Laptop, Smartphone, HD” to Go ◦ “Data Centers on a Chip”
  • 23. The Cloud is a Service ◦ Get your Service Level Agreements right ◦ Train your suppliers, train your users  The Cloud is the Data Center ◦ Locate, design, build and operate for reliability ◦ Leverage reliability methodology no matter what the scale  Low tech business continuity options ◦ Don’t assume high tech is going to be the go-to solution ◦ Build your crash cart
  • 24. RANSFORM legacy MANAGE AN frastructure, SECURE acro pplications, people legacy applica nd process and cloud ass on-premises CO ervices of se se
  • 25.  Are space, power and cooling sufficiently available?  Are there differentiated reliability levels?  Are personnel screened and trained?  Are vendors and other clients managed effectively?  What is the connectivity capacity and topography?  What is the availability history of the site?  Are SLA’s negotiable and meaningful?  Do I trust my data to their management?
  • 26.  Do I have more than two ways to communicate?  How long can I operate with no internet?  Can I recover data after the internet is restored?  Is my recovery management dependent on the network?  Are my human resources going to be available and productive?  Am I sure my plan is going to work?
  • 27.
  • 28. Data demand is driving the cloud  The data center is the cloud  There will be a significant increase in data centers, worldwide to meet demand.  The major risk is loss of access to data to run the business and service clients.  Network, data and physical security need to be managed to mitigate real risks.  Ask the right questions before committing.  Have a valid, tested recovery plan.
  • 29. Credits: •Ian Jagger, HP Marketing •US Government, office of GAO •Security Weekly •Christian Belady, MS Gobal Foundation Services •Gail Dutton, Contributor, Data Center Management •David Geer, Freelance writer Richard L. Sawyer, Strategist, HP Critical Facility Services rsawyer@hp.com
  • 30. Interested in learning more cloud? Learn about the cloud sessions offered at the upcoming Fall 2012 Data Center World Conference at: www.datacenterworld.com. This presentation was given during the Spring, 2012 Data Center World Conference and Expo. Contents contained are owned by AFCOM and Data Center World and can only be reused with the express permission of ACOM. Questions or for permission contact: jater@afcom.com.