SlideShare ist ein Scribd-Unternehmen logo
1 von 27
OPTIMIZING YOUR IT STRATEGY
5 STEPS TO SUCCESSFUL HYBRID IT
MEET THE
EXPERTS
JOE VIDAL
NA Hybrid IT Chief
Technologist
Hewlett Packard Enterprise
KEN HOWELL
Converged Infrastructure and
Storage Architect
Sirius
IS HYBRID IT
THE NEW
NORMAL?
A study conducted by IDC found
that 90% of respondents
had a hybrid IT strategy in place.
In a recent survey conducted
by Forrester, two-thirds of
the organizations ended up
with hybrid IT by accident.
Research suggests that an
increasing number of IT
departments are experimenting with
cloud or are working toward
integrating it into their IT Strategy.
Source: IDC, Forrester
Last year Dropbox collaborated with HPE to move their
data on-premises in the U.S. while the cloud “lives” in
Europe.
Dropbox completed one the largest reverse cloud
migrations ever undertaken, moving some
600 petabytes
from Amazon’s cloud to its own data centers.
Trying to transform your
company’s infrastructure without
the correct strategy and technical
expertise can severely disrupt
your business.
THE TRUTH ABOUT
HYBRID IT
Ask Yourself:
WHERE DOES YOUR
ORGANIZATION STAND WITH
HYBRID IT?
a) We have adopted hybrid IT
b) We have adopted a cloud first strategy
c) We don’t have hybrid IT
d) Not sure I understand the question
5 THINGS TO AVOID WITH HYBRID IT
1. Inflexible infrastructures that hold back deployment
2. Complexity that undermines control over IT
3. Traditional IT operations that impede application development
4. Legacy infrastructure that increases business risks
5. IT procurement and provisioning processes that increase costs
Flexibility is Key to Accelerating Speed of Service
91% 92% 89% 89%
gained a
competitive edge
over traditional
competitors.
were able to meet
customer
expectations
improved user
experience (UX)
streamlined their
business processes
WHEN DONE BY DESIGN, HYBRID IT HAS THE
POTENTIAL TO HELP BUSINESSES SEE
INCREASED BENEFITS
5 STEPS TO SUCCESSFUL
HYBRID IT
Conducting a comprehensive security
audit should be the first task on your list.
ONE
SECURING YOUR
HYBRID IT
• This includes evaluating firewall policies as well as
any existing applications that require a firewall rule.
• You’ll also want to examine all users, existing
privileges, policies and procedures surrounding the
granting and monitoring of admin rights.
• A comprehensive monitoring or logging solution
can help identify shadow IT situations, and it will help
your organization maintain control.
The way your workload is structured
should reflect the uniqueness of your
infrastructure.
TWO
WORKLOAD
PLACEMENT
Just because you can place your workload on the
cloud doesn’t mean that you should.
Four key factors should influence your workload
placement:
• Hybrid IT security and compliance
• Total cost of ownership
• Application performance
• Level of control with regard to company culture
and policies.
You’ll want to avoid the traditional method of
pulling together a mixture of siloed tools, as
this will only add complexities down the road.
THREE
CROSS-PLATFORM
MANAGEMENT &
MONITORING
IT administrators agree that a hybrid infrastructure
introduces a host of management and monitoring
complexities.
When evaluating the monitoring and management
solutions for hybrid IT, be sure to consider what
capabilities you need in your cloud and how they
might impact your whole environment.
FOUR
EVALUATING
YOUR
INFRASTRUCTURE
Identifying your core applications can be
a complex task because applications that
support critical business operations vary
from one business to another.
How do you distinguish core vs. critical apps?
Taking inventory of your current apps requires
administrators to be aware that not every
application in use is known to IT. Additionally,
some applications may be critical to a particular
function, job or project that is not necessarily core
to the enterprise.
FIVE
DATA SECURITY
CONSIDERATIONS
It all comes down to understanding what
responsibilities are outsourced to a cloud
vendor, and what will remain the
responsibility of the organization.
Just like all other aspects of hybrid IT, the location you
choose for individual workloads depends on several
factors, including security.
Staying on top of security is an ongoing task, and no single
measure or technique can keep a company’s data secure.
One of the weakest links in any security system is the
human element. People can make mistakes. When
considering your information and security strategy, you
should ensure that there is always a second set of eyes
reviewing all decisions, systems and processes.
On-Prem Vs. Cloud Storage: Lessons for Leaders
If you are considering building a private cloud, make sure its
strategically critical to your corporate mission.
To move data between an on-premises data center and a
public cloud service, use the same software in both places.
Even after building your own infrastructure, keep in mind
that a public cloud service might offer advantages down the
road. Embrace standards that will enable you to move
applications and data to the cloud should the need arise.
If your private cloud project is a big one, and it probably will
be, strange things can happen. Be prepared to deal with the
unexpected.
INVESTING
INTELLIGENTLY
IN HYBRID IT
HybridIT@siriuscom.com
Or contact your
Sirius Account Manager
SCHEDULE A
CLOUD READINESS
REVIEW
Optimizing Your IT Strategy: 5 Steps to Successfull Hybrid IT

Weitere ähnliche Inhalte

Was ist angesagt?

How to Modernize Your Data Strategy to Fuel Digital Transformation
How to Modernize Your Data Strategy to Fuel Digital TransformationHow to Modernize Your Data Strategy to Fuel Digital Transformation
How to Modernize Your Data Strategy to Fuel Digital TransformationBrainSell Technologies
 
Article Evaluation 4
Article Evaluation 4Article Evaluation 4
Article Evaluation 4AnshumanRaina
 
Visual Design with Data
Visual Design with DataVisual Design with Data
Visual Design with DataSeth Familian
 
Kit Collingwood, Human Centred Data Transformation ThoughtWorks Live UK 18
Kit Collingwood, Human Centred Data Transformation ThoughtWorks Live UK 18Kit Collingwood, Human Centred Data Transformation ThoughtWorks Live UK 18
Kit Collingwood, Human Centred Data Transformation ThoughtWorks Live UK 18Thoughtworks
 
[AIIM16] What Did AIIM16 Mean?
[AIIM16]  What Did AIIM16 Mean?[AIIM16]  What Did AIIM16 Mean?
[AIIM16] What Did AIIM16 Mean?AIIM International
 
How to Build a Remote Workforce
How to Build a Remote WorkforceHow to Build a Remote Workforce
How to Build a Remote WorkforceUpwork
 
Finding the Right Partner to Power up Your IT
Finding the Right Partner to Power up Your ITFinding the Right Partner to Power up Your IT
Finding the Right Partner to Power up Your ITManxTelecom
 
[AIIM16] Leaning into the Future: What the h*** is an information professiona...
[AIIM16] Leaning into the Future: What the h*** is an information professiona...[AIIM16] Leaning into the Future: What the h*** is an information professiona...
[AIIM16] Leaning into the Future: What the h*** is an information professiona...AIIM International
 
Technology Lab June 2020 - Where to begin in your digital transformation jour...
Technology Lab June 2020 - Where to begin in your digital transformation jour...Technology Lab June 2020 - Where to begin in your digital transformation jour...
Technology Lab June 2020 - Where to begin in your digital transformation jour...Digital Workplace Group
 
A Digital Workplace for the Flexible Workforce
A Digital Workplace for the Flexible WorkforceA Digital Workplace for the Flexible Workforce
A Digital Workplace for the Flexible WorkforceBMC_DSM
 
Building a change approach to live beyond one project
Building a change approach to live beyond one projectBuilding a change approach to live beyond one project
Building a change approach to live beyond one projectRebecca Jackson
 
Zero to 100% on Day 1: Getting All Users and Contracts onto an Enterprise Con...
Zero to 100% on Day 1: Getting All Users and Contracts onto an Enterprise Con...Zero to 100% on Day 1: Getting All Users and Contracts onto an Enterprise Con...
Zero to 100% on Day 1: Getting All Users and Contracts onto an Enterprise Con...Apttus
 
Building an Equitable Tech Future - By ThoughtWorks Brisbane
Building an Equitable Tech Future - By ThoughtWorks BrisbaneBuilding an Equitable Tech Future - By ThoughtWorks Brisbane
Building an Equitable Tech Future - By ThoughtWorks BrisbaneThoughtworks
 
Agile for enterprise - Architecting digital change using agile as a strategy ...
Agile for enterprise - Architecting digital change using agile as a strategy ...Agile for enterprise - Architecting digital change using agile as a strategy ...
Agile for enterprise - Architecting digital change using agile as a strategy ...Reading Room
 
SaaStrU 101: How Hybrid is Working in Practice....What the Data Shows with Ra...
SaaStrU 101: How Hybrid is Working in Practice....What the Data Shows with Ra...SaaStrU 101: How Hybrid is Working in Practice....What the Data Shows with Ra...
SaaStrU 101: How Hybrid is Working in Practice....What the Data Shows with Ra...saastr
 
Salesforce and Remedyforce ISV Tech Talk: Pushing New Versions of your App
Salesforce and Remedyforce ISV Tech Talk: Pushing New Versions of your AppSalesforce and Remedyforce ISV Tech Talk: Pushing New Versions of your App
Salesforce and Remedyforce ISV Tech Talk: Pushing New Versions of your AppBMC Software
 
Gartner Digital Workplace Brochure 2015
Gartner Digital Workplace Brochure 2015Gartner Digital Workplace Brochure 2015
Gartner Digital Workplace Brochure 2015Nadia Smith
 
How to Rethink Your Company Intranet to Deliver Business Value
How to Rethink Your Company Intranet to Deliver Business ValueHow to Rethink Your Company Intranet to Deliver Business Value
How to Rethink Your Company Intranet to Deliver Business ValueJive Software an Aurea company
 

Was ist angesagt? (19)

How to Modernize Your Data Strategy to Fuel Digital Transformation
How to Modernize Your Data Strategy to Fuel Digital TransformationHow to Modernize Your Data Strategy to Fuel Digital Transformation
How to Modernize Your Data Strategy to Fuel Digital Transformation
 
Measuring User Adoption
Measuring User AdoptionMeasuring User Adoption
Measuring User Adoption
 
Article Evaluation 4
Article Evaluation 4Article Evaluation 4
Article Evaluation 4
 
Visual Design with Data
Visual Design with DataVisual Design with Data
Visual Design with Data
 
Kit Collingwood, Human Centred Data Transformation ThoughtWorks Live UK 18
Kit Collingwood, Human Centred Data Transformation ThoughtWorks Live UK 18Kit Collingwood, Human Centred Data Transformation ThoughtWorks Live UK 18
Kit Collingwood, Human Centred Data Transformation ThoughtWorks Live UK 18
 
[AIIM16] What Did AIIM16 Mean?
[AIIM16]  What Did AIIM16 Mean?[AIIM16]  What Did AIIM16 Mean?
[AIIM16] What Did AIIM16 Mean?
 
How to Build a Remote Workforce
How to Build a Remote WorkforceHow to Build a Remote Workforce
How to Build a Remote Workforce
 
Finding the Right Partner to Power up Your IT
Finding the Right Partner to Power up Your ITFinding the Right Partner to Power up Your IT
Finding the Right Partner to Power up Your IT
 
[AIIM16] Leaning into the Future: What the h*** is an information professiona...
[AIIM16] Leaning into the Future: What the h*** is an information professiona...[AIIM16] Leaning into the Future: What the h*** is an information professiona...
[AIIM16] Leaning into the Future: What the h*** is an information professiona...
 
Technology Lab June 2020 - Where to begin in your digital transformation jour...
Technology Lab June 2020 - Where to begin in your digital transformation jour...Technology Lab June 2020 - Where to begin in your digital transformation jour...
Technology Lab June 2020 - Where to begin in your digital transformation jour...
 
A Digital Workplace for the Flexible Workforce
A Digital Workplace for the Flexible WorkforceA Digital Workplace for the Flexible Workforce
A Digital Workplace for the Flexible Workforce
 
Building a change approach to live beyond one project
Building a change approach to live beyond one projectBuilding a change approach to live beyond one project
Building a change approach to live beyond one project
 
Zero to 100% on Day 1: Getting All Users and Contracts onto an Enterprise Con...
Zero to 100% on Day 1: Getting All Users and Contracts onto an Enterprise Con...Zero to 100% on Day 1: Getting All Users and Contracts onto an Enterprise Con...
Zero to 100% on Day 1: Getting All Users and Contracts onto an Enterprise Con...
 
Building an Equitable Tech Future - By ThoughtWorks Brisbane
Building an Equitable Tech Future - By ThoughtWorks BrisbaneBuilding an Equitable Tech Future - By ThoughtWorks Brisbane
Building an Equitable Tech Future - By ThoughtWorks Brisbane
 
Agile for enterprise - Architecting digital change using agile as a strategy ...
Agile for enterprise - Architecting digital change using agile as a strategy ...Agile for enterprise - Architecting digital change using agile as a strategy ...
Agile for enterprise - Architecting digital change using agile as a strategy ...
 
SaaStrU 101: How Hybrid is Working in Practice....What the Data Shows with Ra...
SaaStrU 101: How Hybrid is Working in Practice....What the Data Shows with Ra...SaaStrU 101: How Hybrid is Working in Practice....What the Data Shows with Ra...
SaaStrU 101: How Hybrid is Working in Practice....What the Data Shows with Ra...
 
Salesforce and Remedyforce ISV Tech Talk: Pushing New Versions of your App
Salesforce and Remedyforce ISV Tech Talk: Pushing New Versions of your AppSalesforce and Remedyforce ISV Tech Talk: Pushing New Versions of your App
Salesforce and Remedyforce ISV Tech Talk: Pushing New Versions of your App
 
Gartner Digital Workplace Brochure 2015
Gartner Digital Workplace Brochure 2015Gartner Digital Workplace Brochure 2015
Gartner Digital Workplace Brochure 2015
 
How to Rethink Your Company Intranet to Deliver Business Value
How to Rethink Your Company Intranet to Deliver Business ValueHow to Rethink Your Company Intranet to Deliver Business Value
How to Rethink Your Company Intranet to Deliver Business Value
 

Ähnlich wie Optimizing Your IT Strategy: 5 Steps to Successfull Hybrid IT

Hybrid IT – A Winning Strategy
Hybrid IT – A Winning StrategyHybrid IT – A Winning Strategy
Hybrid IT – A Winning StrategyOneNeck
 
Five Best Practices for Improving the Cloud Experience
Five Best Practices for Improving the Cloud ExperienceFive Best Practices for Improving the Cloud Experience
Five Best Practices for Improving the Cloud ExperienceHitachi Vantara
 
IBM Relay 2015: Cloud is All About the Customer
IBM Relay 2015: Cloud is All About the Customer IBM Relay 2015: Cloud is All About the Customer
IBM Relay 2015: Cloud is All About the Customer IBM
 
Webinar: 5 Key Trends That Could Challenge Your Data Protection Plan in 2018
Webinar: 5 Key Trends That Could Challenge Your Data Protection Plan in 2018Webinar: 5 Key Trends That Could Challenge Your Data Protection Plan in 2018
Webinar: 5 Key Trends That Could Challenge Your Data Protection Plan in 2018Storage Switzerland
 
6 Reasons To Embrace Cloud Computing Now
6 Reasons To Embrace Cloud Computing Now6 Reasons To Embrace Cloud Computing Now
6 Reasons To Embrace Cloud Computing NowHudson IT
 
Cloud vs. on premise
Cloud vs. on premiseCloud vs. on premise
Cloud vs. on premiseAndrew Das
 
Top 10 Cloud Trends for 2017
Top 10 Cloud Trends for 2017Top 10 Cloud Trends for 2017
Top 10 Cloud Trends for 2017Tableau Software
 
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapteIT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChaptemariuse18nolet
 
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte.docx
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte.docxIT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte.docx
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte.docxvrickens
 
How to add security in dataops and devops
How to add security in dataops and devopsHow to add security in dataops and devops
How to add security in dataops and devopsUlf Mattsson
 
Current trends in enterprise application integration
Current trends in enterprise application integrationCurrent trends in enterprise application integration
Current trends in enterprise application integrationVisionet Systems, Inc.
 
Simplifying Security Management in the Virtual Data Center
Simplifying Security Management in the Virtual Data CenterSimplifying Security Management in the Virtual Data Center
Simplifying Security Management in the Virtual Data CenterAlgoSec
 
Top 3 Reasons to Move Existing Applications to the Cloud
Top 3 Reasons to Move Existing Applications to the CloudTop 3 Reasons to Move Existing Applications to the Cloud
Top 3 Reasons to Move Existing Applications to the CloudVMware
 
State of the Cloud and Data Centers 2014
State of the Cloud and Data Centers 2014State of the Cloud and Data Centers 2014
State of the Cloud and Data Centers 2014Digital Realty
 
Tailoring hybrid cloud exec report
Tailoring hybrid cloud exec reportTailoring hybrid cloud exec report
Tailoring hybrid cloud exec reportJose Pena
 
IDC Study on Enterprise Hybrid Cloud Strategies
IDC Study on Enterprise Hybrid Cloud StrategiesIDC Study on Enterprise Hybrid Cloud Strategies
IDC Study on Enterprise Hybrid Cloud StrategiesEMC
 
Hybrid Cloud - Key Benefits & Must Have Requirements
Hybrid Cloud - Key Benefits & Must Have RequirementsHybrid Cloud - Key Benefits & Must Have Requirements
Hybrid Cloud - Key Benefits & Must Have RequirementsJamcracker Inc
 

Ähnlich wie Optimizing Your IT Strategy: 5 Steps to Successfull Hybrid IT (20)

Hybrid IT – A Winning Strategy
Hybrid IT – A Winning StrategyHybrid IT – A Winning Strategy
Hybrid IT – A Winning Strategy
 
Five Best Practices for Improving the Cloud Experience
Five Best Practices for Improving the Cloud ExperienceFive Best Practices for Improving the Cloud Experience
Five Best Practices for Improving the Cloud Experience
 
IBM Relay 2015: Cloud is All About the Customer
IBM Relay 2015: Cloud is All About the Customer IBM Relay 2015: Cloud is All About the Customer
IBM Relay 2015: Cloud is All About the Customer
 
Webinar: 5 Key Trends That Could Challenge Your Data Protection Plan in 2018
Webinar: 5 Key Trends That Could Challenge Your Data Protection Plan in 2018Webinar: 5 Key Trends That Could Challenge Your Data Protection Plan in 2018
Webinar: 5 Key Trends That Could Challenge Your Data Protection Plan in 2018
 
6 Reasons To Embrace Cloud Computing Now
6 Reasons To Embrace Cloud Computing Now6 Reasons To Embrace Cloud Computing Now
6 Reasons To Embrace Cloud Computing Now
 
Cloud vs. on premise
Cloud vs. on premiseCloud vs. on premise
Cloud vs. on premise
 
Top 10 Cloud Trends for 2017
Top 10 Cloud Trends for 2017Top 10 Cloud Trends for 2017
Top 10 Cloud Trends for 2017
 
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapteIT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte
 
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte.docx
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte.docxIT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte.docx
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte.docx
 
How to add security in dataops and devops
How to add security in dataops and devopsHow to add security in dataops and devops
How to add security in dataops and devops
 
Cloud capability for startups
Cloud capability for startupsCloud capability for startups
Cloud capability for startups
 
Current trends in enterprise application integration
Current trends in enterprise application integrationCurrent trends in enterprise application integration
Current trends in enterprise application integration
 
Simplifying Security Management in the Virtual Data Center
Simplifying Security Management in the Virtual Data CenterSimplifying Security Management in the Virtual Data Center
Simplifying Security Management in the Virtual Data Center
 
Top 3 Reasons to Move Existing Applications to the Cloud
Top 3 Reasons to Move Existing Applications to the CloudTop 3 Reasons to Move Existing Applications to the Cloud
Top 3 Reasons to Move Existing Applications to the Cloud
 
Hybrid IT
Hybrid ITHybrid IT
Hybrid IT
 
State of the Cloud and Data Centers 2014
State of the Cloud and Data Centers 2014State of the Cloud and Data Centers 2014
State of the Cloud and Data Centers 2014
 
Tailoring hybrid cloud exec report
Tailoring hybrid cloud exec reportTailoring hybrid cloud exec report
Tailoring hybrid cloud exec report
 
IDC Study on Enterprise Hybrid Cloud Strategies
IDC Study on Enterprise Hybrid Cloud StrategiesIDC Study on Enterprise Hybrid Cloud Strategies
IDC Study on Enterprise Hybrid Cloud Strategies
 
Cloud Industry Forum Report: Cloud for Business, Why Security is No Longer a ...
Cloud Industry Forum Report: Cloud for Business, Why Security is No Longer a ...Cloud Industry Forum Report: Cloud for Business, Why Security is No Longer a ...
Cloud Industry Forum Report: Cloud for Business, Why Security is No Longer a ...
 
Hybrid Cloud - Key Benefits & Must Have Requirements
Hybrid Cloud - Key Benefits & Must Have RequirementsHybrid Cloud - Key Benefits & Must Have Requirements
Hybrid Cloud - Key Benefits & Must Have Requirements
 

Mehr von Sirius

Healthcare Cybersecurity Survey 2018 - Sirius
Healthcare Cybersecurity Survey 2018 - SiriusHealthcare Cybersecurity Survey 2018 - Sirius
Healthcare Cybersecurity Survey 2018 - SiriusSirius
 
3 Keys to Web Application Security
3 Keys to Web Application Security3 Keys to Web Application Security
3 Keys to Web Application SecuritySirius
 
Best Practices for Multi-Factor Authentication: Delivering Stronger Security ...
Best Practices for Multi-Factor Authentication: Delivering Stronger Security ...Best Practices for Multi-Factor Authentication: Delivering Stronger Security ...
Best Practices for Multi-Factor Authentication: Delivering Stronger Security ...Sirius
 
Optimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessOptimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessSirius
 
Keep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR SuccessKeep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR SuccessSirius
 
Beyond backup to intelligent data management
Beyond backup to intelligent data managementBeyond backup to intelligent data management
Beyond backup to intelligent data managementSirius
 
Making the Jump to Hyperconvergence: Don't Get Left Behind
Making the Jump to Hyperconvergence: Don't Get Left BehindMaking the Jump to Hyperconvergence: Don't Get Left Behind
Making the Jump to Hyperconvergence: Don't Get Left BehindSirius
 
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessAddressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessSirius
 
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...Sirius
 
6 Ways to Deceive Cyber Attackers
6 Ways to Deceive Cyber Attackers6 Ways to Deceive Cyber Attackers
6 Ways to Deceive Cyber AttackersSirius
 
Your Cloud Strategy: Evolution or Revolution
Your Cloud Strategy: Evolution or RevolutionYour Cloud Strategy: Evolution or Revolution
Your Cloud Strategy: Evolution or RevolutionSirius
 
Maturing Endpoint Security: 5 Key Considerations
Maturing Endpoint Security: 5 Key ConsiderationsMaturing Endpoint Security: 5 Key Considerations
Maturing Endpoint Security: 5 Key ConsiderationsSirius
 
Open Source, Open Mindset: 4 Keys to Continuous Cloud Transformation
Open Source, Open Mindset: 4 Keys to Continuous Cloud TransformationOpen Source, Open Mindset: 4 Keys to Continuous Cloud Transformation
Open Source, Open Mindset: 4 Keys to Continuous Cloud TransformationSirius
 
7 Essential Services Every Data Center Solutions Provider Should Have
7 Essential Services Every Data Center Solutions Provider Should Have7 Essential Services Every Data Center Solutions Provider Should Have
7 Essential Services Every Data Center Solutions Provider Should HaveSirius
 
10 Keys to Data-Centric Security
10 Keys to Data-Centric Security10 Keys to Data-Centric Security
10 Keys to Data-Centric SecuritySirius
 
5 Keys to Addressing Insider Threats
5 Keys to Addressing Insider Threats5 Keys to Addressing Insider Threats
5 Keys to Addressing Insider ThreatsSirius
 
6 Steps for Operationalizing Threat Intelligence
6 Steps for Operationalizing Threat Intelligence6 Steps for Operationalizing Threat Intelligence
6 Steps for Operationalizing Threat IntelligenceSirius
 
5 Ways to Close Your Information Technology Skills Gap
5 Ways to Close Your Information Technology Skills Gap5 Ways to Close Your Information Technology Skills Gap
5 Ways to Close Your Information Technology Skills GapSirius
 
What's Wrong with IT
What's Wrong with ITWhat's Wrong with IT
What's Wrong with ITSirius
 
Eight Steps to an Effective Vulnerability Assessment
Eight Steps to an Effective Vulnerability AssessmentEight Steps to an Effective Vulnerability Assessment
Eight Steps to an Effective Vulnerability AssessmentSirius
 

Mehr von Sirius (20)

Healthcare Cybersecurity Survey 2018 - Sirius
Healthcare Cybersecurity Survey 2018 - SiriusHealthcare Cybersecurity Survey 2018 - Sirius
Healthcare Cybersecurity Survey 2018 - Sirius
 
3 Keys to Web Application Security
3 Keys to Web Application Security3 Keys to Web Application Security
3 Keys to Web Application Security
 
Best Practices for Multi-Factor Authentication: Delivering Stronger Security ...
Best Practices for Multi-Factor Authentication: Delivering Stronger Security ...Best Practices for Multi-Factor Authentication: Delivering Stronger Security ...
Best Practices for Multi-Factor Authentication: Delivering Stronger Security ...
 
Optimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessOptimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to Success
 
Keep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR SuccessKeep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR Success
 
Beyond backup to intelligent data management
Beyond backup to intelligent data managementBeyond backup to intelligent data management
Beyond backup to intelligent data management
 
Making the Jump to Hyperconvergence: Don't Get Left Behind
Making the Jump to Hyperconvergence: Don't Get Left BehindMaking the Jump to Hyperconvergence: Don't Get Left Behind
Making the Jump to Hyperconvergence: Don't Get Left Behind
 
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessAddressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
 
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
 
6 Ways to Deceive Cyber Attackers
6 Ways to Deceive Cyber Attackers6 Ways to Deceive Cyber Attackers
6 Ways to Deceive Cyber Attackers
 
Your Cloud Strategy: Evolution or Revolution
Your Cloud Strategy: Evolution or RevolutionYour Cloud Strategy: Evolution or Revolution
Your Cloud Strategy: Evolution or Revolution
 
Maturing Endpoint Security: 5 Key Considerations
Maturing Endpoint Security: 5 Key ConsiderationsMaturing Endpoint Security: 5 Key Considerations
Maturing Endpoint Security: 5 Key Considerations
 
Open Source, Open Mindset: 4 Keys to Continuous Cloud Transformation
Open Source, Open Mindset: 4 Keys to Continuous Cloud TransformationOpen Source, Open Mindset: 4 Keys to Continuous Cloud Transformation
Open Source, Open Mindset: 4 Keys to Continuous Cloud Transformation
 
7 Essential Services Every Data Center Solutions Provider Should Have
7 Essential Services Every Data Center Solutions Provider Should Have7 Essential Services Every Data Center Solutions Provider Should Have
7 Essential Services Every Data Center Solutions Provider Should Have
 
10 Keys to Data-Centric Security
10 Keys to Data-Centric Security10 Keys to Data-Centric Security
10 Keys to Data-Centric Security
 
5 Keys to Addressing Insider Threats
5 Keys to Addressing Insider Threats5 Keys to Addressing Insider Threats
5 Keys to Addressing Insider Threats
 
6 Steps for Operationalizing Threat Intelligence
6 Steps for Operationalizing Threat Intelligence6 Steps for Operationalizing Threat Intelligence
6 Steps for Operationalizing Threat Intelligence
 
5 Ways to Close Your Information Technology Skills Gap
5 Ways to Close Your Information Technology Skills Gap5 Ways to Close Your Information Technology Skills Gap
5 Ways to Close Your Information Technology Skills Gap
 
What's Wrong with IT
What's Wrong with ITWhat's Wrong with IT
What's Wrong with IT
 
Eight Steps to an Effective Vulnerability Assessment
Eight Steps to an Effective Vulnerability AssessmentEight Steps to an Effective Vulnerability Assessment
Eight Steps to an Effective Vulnerability Assessment
 

Kürzlich hochgeladen

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 

Kürzlich hochgeladen (20)

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

Optimizing Your IT Strategy: 5 Steps to Successfull Hybrid IT

  • 1. OPTIMIZING YOUR IT STRATEGY 5 STEPS TO SUCCESSFUL HYBRID IT
  • 2. MEET THE EXPERTS JOE VIDAL NA Hybrid IT Chief Technologist Hewlett Packard Enterprise KEN HOWELL Converged Infrastructure and Storage Architect Sirius
  • 3.
  • 4. IS HYBRID IT THE NEW NORMAL?
  • 5. A study conducted by IDC found that 90% of respondents had a hybrid IT strategy in place. In a recent survey conducted by Forrester, two-thirds of the organizations ended up with hybrid IT by accident. Research suggests that an increasing number of IT departments are experimenting with cloud or are working toward integrating it into their IT Strategy. Source: IDC, Forrester
  • 6. Last year Dropbox collaborated with HPE to move their data on-premises in the U.S. while the cloud “lives” in Europe. Dropbox completed one the largest reverse cloud migrations ever undertaken, moving some 600 petabytes from Amazon’s cloud to its own data centers.
  • 7. Trying to transform your company’s infrastructure without the correct strategy and technical expertise can severely disrupt your business. THE TRUTH ABOUT HYBRID IT
  • 8. Ask Yourself: WHERE DOES YOUR ORGANIZATION STAND WITH HYBRID IT? a) We have adopted hybrid IT b) We have adopted a cloud first strategy c) We don’t have hybrid IT d) Not sure I understand the question
  • 9. 5 THINGS TO AVOID WITH HYBRID IT 1. Inflexible infrastructures that hold back deployment 2. Complexity that undermines control over IT 3. Traditional IT operations that impede application development 4. Legacy infrastructure that increases business risks 5. IT procurement and provisioning processes that increase costs
  • 10. Flexibility is Key to Accelerating Speed of Service
  • 11. 91% 92% 89% 89% gained a competitive edge over traditional competitors. were able to meet customer expectations improved user experience (UX) streamlined their business processes WHEN DONE BY DESIGN, HYBRID IT HAS THE POTENTIAL TO HELP BUSINESSES SEE INCREASED BENEFITS
  • 12. 5 STEPS TO SUCCESSFUL HYBRID IT
  • 13. Conducting a comprehensive security audit should be the first task on your list. ONE SECURING YOUR HYBRID IT
  • 14. • This includes evaluating firewall policies as well as any existing applications that require a firewall rule. • You’ll also want to examine all users, existing privileges, policies and procedures surrounding the granting and monitoring of admin rights. • A comprehensive monitoring or logging solution can help identify shadow IT situations, and it will help your organization maintain control.
  • 15. The way your workload is structured should reflect the uniqueness of your infrastructure. TWO WORKLOAD PLACEMENT
  • 16. Just because you can place your workload on the cloud doesn’t mean that you should. Four key factors should influence your workload placement: • Hybrid IT security and compliance • Total cost of ownership • Application performance • Level of control with regard to company culture and policies.
  • 17. You’ll want to avoid the traditional method of pulling together a mixture of siloed tools, as this will only add complexities down the road. THREE CROSS-PLATFORM MANAGEMENT & MONITORING
  • 18. IT administrators agree that a hybrid infrastructure introduces a host of management and monitoring complexities. When evaluating the monitoring and management solutions for hybrid IT, be sure to consider what capabilities you need in your cloud and how they might impact your whole environment.
  • 19. FOUR EVALUATING YOUR INFRASTRUCTURE Identifying your core applications can be a complex task because applications that support critical business operations vary from one business to another.
  • 20. How do you distinguish core vs. critical apps? Taking inventory of your current apps requires administrators to be aware that not every application in use is known to IT. Additionally, some applications may be critical to a particular function, job or project that is not necessarily core to the enterprise.
  • 21. FIVE DATA SECURITY CONSIDERATIONS It all comes down to understanding what responsibilities are outsourced to a cloud vendor, and what will remain the responsibility of the organization.
  • 22. Just like all other aspects of hybrid IT, the location you choose for individual workloads depends on several factors, including security. Staying on top of security is an ongoing task, and no single measure or technique can keep a company’s data secure. One of the weakest links in any security system is the human element. People can make mistakes. When considering your information and security strategy, you should ensure that there is always a second set of eyes reviewing all decisions, systems and processes.
  • 23. On-Prem Vs. Cloud Storage: Lessons for Leaders
  • 24. If you are considering building a private cloud, make sure its strategically critical to your corporate mission. To move data between an on-premises data center and a public cloud service, use the same software in both places. Even after building your own infrastructure, keep in mind that a public cloud service might offer advantages down the road. Embrace standards that will enable you to move applications and data to the cloud should the need arise. If your private cloud project is a big one, and it probably will be, strange things can happen. Be prepared to deal with the unexpected.
  • 26. HybridIT@siriuscom.com Or contact your Sirius Account Manager SCHEDULE A CLOUD READINESS REVIEW