SlideShare ist ein Scribd-Unternehmen logo
1 von 32
Downloaden Sie, um offline zu lesen
What an Enterprise Should Look for
in a Cloud Computing Provider


Tom Cecere
Director, Novell Cloud Security Service
March 23, 2010
Takeaways for Today

    •   Cloud computing offers the potential for big savings and huge
        increases in flexibility for enterprise IT
    •   Large enterprises are telling analysts, researchers and
        cloud providers that it’s hard to trust cloud-based solutions
    •   But don’t let that fool you – people are using them like mad,
        with 20-40% growth in 2009 in some sectors
    •   Security is a primary concern, but it comes in many guises
    •   Regulations and finances are driving use and risk, leaving you
        with security holes you never had before
    •   Security is the responsibility of both you and your vendors of
        choice

2   © Novell, Inc. All rights reserved.
Cloud Computing:
What Is It, Why and How Much Do We Use It?
Forrester Definition:


      Cloud Computing: A standardized
      IT capability (services, software, or
      infrastructure) delivered via the
      Internet in a pay-per-use,
      self-service way



4   © Novell, Inc. All rights reserved.
Breaking It Down a Bit

                                                                         SaaS … Salesforce.com, Netsuite,
        Web-based Services                Software-as-a-service          Ultimate, Taleo, LinkedIn, Facebook




                      Software-platform-as-a-service                      Google App Engine, Azure, Force




                   Virtual-infrastructure-as-a-service                            Sun, IBM, Azure




                                                                              IaaS … Amazon, Go-Grid,
                  Physical-infrastructure-as-a-service                          OpSource, COLT, etc.



    Source: Forrester Research. August 2008 “Future View: The New Tech Ecosystems of Cloud, Cloud Services,
    and Cloud Computing”
5   © Novell, Inc. All rights reserved.
Cloud Computing
    Really Is the Next Big Thing
    Who are your two largest users of cloud services?
                             FIGURE 12. The two largest users of cloud services
    MID TIER ENTERPRISE

        SAAS PROVIDERS

                      SMB

            DEVELOPERS                                                                        Note: mid-tier sector
             ENTERPRISE                                                                       (250-1000 employees
                                                                                              and revenue between
                     ISV'S
                                                                                              $50m and $1b)
             OTHER PAAS

                   OTHER

                    SOHO


                             0%              10%              20%                 30%   40%   50%          60%




                    Gartner predicts that the market for total
                    cloud services will reach $150B by 2013
     Source: Tier 1 research “Cloud Infrastructure Services – Managed Hosters”, based on poll of top 50 managed
     hosters in US and Europe
6   © Novell, Inc. All rights reserved.
Early Cloud Examples

    US Army — Testing troop vulnerability
    application on cloud platform
    Eli Lilly — Drug research
    Nasdaq — Market Replay service
    USA.gov — Public information portal
    that flexes with traffic fluctuations
    Starbucks — My Starbucks Ideas
    online customer collaboration built on
    Force.com
    Indy500.com — Streams live race
    footage and statistics
    Harvard Medical School — Genetic
    testing models and simulations
7   © Novell, Inc. All rights reserved.
Enterprises Cite Flexibility and On Demand
    over Cost Reasons for IaaS
    “How important were the following in your firm's decision to adopt pay-per-use hosting of virtual servers
     (also known as cloud computing)?”




8   © Novell, Inc. All rights reserved.
SaaS Adoption Growing As Model
    Matures: $8B in ’09 to $14.7B in ‘12




       With Customer Relationship Management and
       Content/Communication and Collaboration
       leading the way
9   © Novell, Inc. All rights reserved.   Source: Gartner Saas Trends 2007-2012
Ok, If It’s So Great,
Why Not Use the Cloud for Everything?
Security is the Top Challenge for
     Customers Moving to Cloud Services
     What are the top two most critical challenges for customers looking to move to a utility/cloud?

                                            FIGURE 15. Top challenges for customers moving to cloud services

                NERVOUS ABOUT SECURITY


               CULTURAL/ORGANIZATIONAL
                 (RESOURCE OWNERSHIP)

          ON PREMISE SOFTWARE/LEGACY
                      INFRASTRUCTURE


     PRODUCT/SERVICE OPTION AVAILABLE


                       SHARED RESOURCES


                 REGULATION/COMPLIANCE


                     AVAILABLILITY/UPTIME


                     SOFTWARE LICENSING


                         CxO SPONSORSHIP



                                            0%             10%              20%              30%               40%   50%

      Source: Tier 1 research “Cloud Infrastructure Services – Managed Hosters”, based on poll of top 50 managed
      hosters in US and Europe
11   © Novell, Inc. All rights reserved.
The Two Largest Users of Cloud Services:
     Mid-tier Enterprise and SaaS Providers
     Who are your two largest users of cloud services?

                              FIGURE 12. The two largest users of cloud services

     MID TIER ENTERPRISE


         SAAS PROVIDERS                                                                        Note: mid-tier sector
                                                                                               (250-1000 employees
                       SMB                                                                     and revenue between
                                                                                               $50m and $1b)
             DEVELOPERS


            ENTERPRISE


                      ISV'S


              OTHER PAAS


                    OTHER


                     SOHO



                              0%              10%              20%                 30%   40%          50%          60%

      Source: Tier 1 research “Cloud Infrastructure Services – Managed Hosters”, based on poll of top 50 managed
      hosters in US and Europe
12   © Novell, Inc. All rights reserved.
Security Worries for Enterprises
           Physical Security                                GRC                        Manageability
      • Physical data location                   • Identity, compliance          • Responsive provisioning/de-
      • Physical data security                   • Manageability of resources      provisioning users across
                                                   in the cloud                    multiple services
                                                 • Multiple identities to        • How to apply roles / policies
                                                   manage                          across multiple services
                                                 • Compliance enforcement        • Cloud workload
                                                                                   management
                                                                                 • Usable for a broader set of
                                                                                   workloads

                                           Financial                   Contractual
                               • Audit                          • Software licensing problems
                               • Need to rewrite internal       • SLAs, proof of 99.99+%
                                 applications                     uptime
                               • How to leverage existing       • Intellectual property
                                 investments in the data          concerns
                                 center                         • References




13   © Novell, Inc. All rights reserved.
Security Worries for Enterprises
           Physical Security                                GRC                        Manageability
      • Physical data location                   • Identity, compliance          • Responsive provisioning/de-
      • Physical data security                   • Manageability of resources      provisioning users across
                                                   in the cloud                    multiple services
                                                 • Multiple identities to        • How to apply roles / policies
                                                   manage                          across multiple services
                                                 • Compliance enforcement        • Cloud workload
                                                                                   management
                                                                                 • Usable for a broader set of
                                                                                   workloads

                                           Financial                   Contractual
                               • Audit                          • Software licensing problems
                               • Need to rewrite internal       • SLAs, proof of 99.99+%
                                 applications                     uptime
                               • How to leverage existing       • Intellectual property
                                 investments in the data          concerns
                                 center                         • References




14   © Novell, Inc. All rights reserved.
What Are the Key Risks?
Summary
     The Cloud Amplifies IT Challenges and Opportunities

     •   Data that is safe for you to store inside your firewall is now outside
     •   Access to compute resources that your company is paying for is
         available with simple user name/password authentication
     •   Your compute jobs may be running on many machines; may be
         backed up on many storage networks, and may be exported
         without your knowledge




          Identity, authorization and audit for employees,
          customers, patients and workloads is the future
          of computing security!

16   © Novell, Inc. All rights reserved.
What Do Enterprises Have To Do?
Attach the Same Governance and Access
     Policies to the Cloud as We Have Internally
                                     Internal Cloud                            External Cloud
                                     (on-premise)                              (off-premise)


                                    Business Service Management


                                                                                         Software
                                           IT Service Management                        as a Service

                                                                                         Platform
                                                                                        as a Service
              Internal                         Internal            External
              Capacity                         Capacity            Capacity            Infrastructure
              Legacy                           Abstracted and      Managed              as a Service
                                               disaggregated       Outsource
                                               IT resources        Provider
                                                                   Telco
                                                                   Amazon EC2

                                                  Governance and Compliance

                                                            Firewall
18   © Novell, Inc. All rights reserved.
Action Items

     •   Do a Cloud Computing Discovery project
          –   Don’t forget to ask Accounting how many purchase orders and
              credit card reimbursements you have to Amazon Web Services!
          –   Software usage analysis will discover SaaS products being
              used at your site

     •   Ask your CISO (or if you are one, your team ☺) to
         prepare a report card on the security issues we’ve
         discussed
     •   Every new cloud computing provider should be
         evaluated both in terms of positives and in terms of
         security impact
19   © Novell, Inc. All rights reserved.
Sample Cloud Computing Report Card
     Acme Platform Services
           Physical Security                                GRC                    Manageability
      • Physical data location                   • Identity, compliance       • Responsive provisioning/
      • Physical data security                   • Manageability of             de-provisioning users
                                                   resources in the cloud       across multiple services
                                                 • Multiple identities to     • How to apply roles/policies
                                                   manage                       across multiple services
                                                 • Compliance enforcement     • Cloud workload
                                                                                management
                                                                              • Usable for a broader set of
                                                                                workloads

                                           Financial                Contractual
                               • Audit                        • Software licensing
                               • Need to rewrite internal       problems
                                 applications                 • SLAs, proof of 99.99+%
                               • How to leverage existing       uptime
                                 investments in the data      • Intellectual property
                                 center                         concerns
                                                              • References



20   © Novell, Inc. All rights reserved.
Action Items (cont)

     •   Make a plan to solve the worst 3 problems in 2010
     •   Prohibit any more cloud providers until their offerings
         easily snap into YOUR access and governance policies
          –   Consider a portal where you can control (or even require
              multiple authentication methods for) access to Cloud resources

     •   Insist on audit information you can use from your
         current providers
     •   Investigate managed clouds from trusted MSPs



21   © Novell, Inc. All rights reserved.
What Should I Expect from
      My Cloud Vendors?
Vendors


         SAS 70
         Other transparency
         Identity protection and user-controlled
         access/authorization
         Audit trail
         Trusted Cloud Initiative
23   © Novell, Inc. All rights reserved.
SAS 70 Certification

     •   Created by American Institute of Certified Public
         Accountants
         Represents that a service organization has been
         through an in-depth audit of their control objectives and
         control activities, which often include controls over
         information technology and related processes
     •   Independent “service auditor” issues opinion on
         servicer’s controls, useable by servicer and their
         customers
     •   Type I: a snapshot on a specific date, self reported
     •   Type II: Opinion delivered about ongoing controls
24   © Novell, Inc. All rights reserved.
Other Transparency Issues

     •   Who can reach data?

     •   What level of encryption is available? Practical?

     •   Where is data located?

     •   Where is computer located?

     •   SLA terms (Microsoft requires an NDA to even see
         their SLA model agreement!)




25   © Novell, Inc. All rights reserved.
Identity Protection

     •   What is the process for:

          –   Provisioning identities?

          –   Guarding them?

          –   De-provisioning with role changes?

     •   Does vendor support multi-factor authentication?

     •   Do they support standards-based federation?



26   © Novell, Inc. All rights reserved.
Audit/GRC

     •   How do you find out what’s going on inside your
         vendor’s data center?

     •   How do you check up on SLA terms?

     •   Can you reconcile information you do receive with
         the rest of your GRC inspection regime?

     •   Is sensitive data moving through scale-out or
         through backup?




27   © Novell, Inc. All rights reserved.
Trusted-Cloud Initiative




                                           Novell/CSA partnership
                                           initiative now prominently
                                           displayed to CSA members
28   © Novell, Inc. All rights reserved.
Responsibility
           Physical Security                                 GRC                   Manageability
      • Physical data location                   • Identity creation          • Responsive provisioning/
      • Physical data security                   • Manageability of             de-provisioning users
                                                   resources in the cloud       across multiple services
                                                 • Simplify identity          • How to apply roles/policies
                                                   management                   across multiple services
                                                 • Compliance enforcement     • Cloud workload
                                                                                management
                                                                              • Ability to move workloads to
                                                                                different vendor(s)

                                           Financial                Contractual
                               • Audit                        • Software licensing
                               • Avoid re-writing internal      problems                           Vendor
                                 applications                 • SLAs, proof of 99.99+%
                                                                                               Enterprise
                               • Leveraging existing            uptime
                                 investments in the data      • Intellectual property                 Joint
                                 center                         concerns
                                                              • References



29   © Novell, Inc. All rights reserved.
Questions
Unpublished Work of Novell, Inc. All Rights Reserved.
This work is an unpublished work and contains confidential, proprietary, and trade secret information of Novell, Inc.
Access to this work is restricted to Novell employees who have a need to know to perform tasks within the scope
of their assignments. No part of this work may be practiced, performed, copied, distributed, revised, modified,
translated, abridged, condensed, expanded, collected, or adapted without the prior written consent of Novell, Inc.
Any use or exploitation of this work without authorization could subject the perpetrator to criminal and civil liability.


General Disclaimer
This document is not to be construed as a promise by any participating company to develop, deliver, or market a
product. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in
making purchasing decisions. Novell, Inc. makes no representations or warranties with respect to the contents
of this document, and specifically disclaims any express or implied warranties of merchantability or fitness for any
particular purpose. The development, release, and timing of features or functionality described for Novell products
remains at the sole discretion of Novell. Further, Novell, Inc. reserves the right to revise this document and to
make changes to its content, at any time, without obligation to notify any person or entity of such revisions or
changes. All Novell marks referenced in this presentation are trademarks or registered trademarks of Novell, Inc.
in the United States and other countries. All third-party trademarks are the property of their respective owners.

Weitere ähnliche Inhalte

Was ist angesagt?

Novell Success Stories: Endpoint Management in High Tech and Professional Ser...
Novell Success Stories: Endpoint Management in High Tech and Professional Ser...Novell Success Stories: Endpoint Management in High Tech and Professional Ser...
Novell Success Stories: Endpoint Management in High Tech and Professional Ser...Novell
 
Novell Success Stories: Endpoint Management in Education
Novell Success Stories: Endpoint Management in EducationNovell Success Stories: Endpoint Management in Education
Novell Success Stories: Endpoint Management in EducationNovell
 
Novell Success Stories: Collaboration in Travel and Hospitality
Novell Success Stories: Collaboration in Travel and HospitalityNovell Success Stories: Collaboration in Travel and Hospitality
Novell Success Stories: Collaboration in Travel and HospitalityNovell
 
Novell Success Stories: Collaboration in Education
Novell Success Stories: Collaboration in EducationNovell Success Stories: Collaboration in Education
Novell Success Stories: Collaboration in EducationNovell
 
Introducing Novell Privileged User Manager and Securing Novell Open Enterpris...
Introducing Novell Privileged User Manager and Securing Novell Open Enterpris...Introducing Novell Privileged User Manager and Securing Novell Open Enterpris...
Introducing Novell Privileged User Manager and Securing Novell Open Enterpris...Novell
 
Adaptive Computing Using PlateSpin Orchestrate
Adaptive Computing Using PlateSpin OrchestrateAdaptive Computing Using PlateSpin Orchestrate
Adaptive Computing Using PlateSpin OrchestrateNovell
 
IBM BP Kickoff 2013 VDI Solutions
IBM BP Kickoff 2013    VDI SolutionsIBM BP Kickoff 2013    VDI Solutions
IBM BP Kickoff 2013 VDI SolutionsIBM Danmark
 
Workload IQ: A Differentiated Approach
Workload IQ: A Differentiated ApproachWorkload IQ: A Differentiated Approach
Workload IQ: A Differentiated ApproachNovell
 
Run Book Automation with PlateSpin Orchestrate
Run Book Automation with PlateSpin OrchestrateRun Book Automation with PlateSpin Orchestrate
Run Book Automation with PlateSpin OrchestrateNovell
 
CL100.pdf
CL100.pdfCL100.pdf
CL100.pdfNovell
 
It infrastructure cost reduction vision v5 customer
It infrastructure cost reduction vision v5   customerIt infrastructure cost reduction vision v5   customer
It infrastructure cost reduction vision v5 customerddeschenes99
 
Managing change in the data center network
Managing change in the data center networkManaging change in the data center network
Managing change in the data center networkInterop
 
Novell Success Stories: Endpoint Management in Healthcare
Novell Success Stories: Endpoint Management in HealthcareNovell Success Stories: Endpoint Management in Healthcare
Novell Success Stories: Endpoint Management in HealthcareNovell
 
Novell Success Stories: Endpoint Management in Government
Novell Success Stories: Endpoint Management in GovernmentNovell Success Stories: Endpoint Management in Government
Novell Success Stories: Endpoint Management in GovernmentNovell
 
Communication Patterns Using Data-Centric Publish/Subscribe
Communication Patterns Using Data-Centric Publish/SubscribeCommunication Patterns Using Data-Centric Publish/Subscribe
Communication Patterns Using Data-Centric Publish/SubscribeSumant Tambe
 
Custom Development with Novell Teaming
Custom Development with Novell TeamingCustom Development with Novell Teaming
Custom Development with Novell TeamingNovell
 
Windows and Linux Interopability
Windows and Linux InteropabilityWindows and Linux Interopability
Windows and Linux InteropabilityNovell
 
Deadly Sins Bcs Elite
Deadly Sins Bcs EliteDeadly Sins Bcs Elite
Deadly Sins Bcs EliteJon G. Hall
 
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...Novell
 
Migrating from Novell ZENworks 7 Desktop Management to Novell ZENworks Config...
Migrating from Novell ZENworks 7 Desktop Management to Novell ZENworks Config...Migrating from Novell ZENworks 7 Desktop Management to Novell ZENworks Config...
Migrating from Novell ZENworks 7 Desktop Management to Novell ZENworks Config...Novell
 

Was ist angesagt? (20)

Novell Success Stories: Endpoint Management in High Tech and Professional Ser...
Novell Success Stories: Endpoint Management in High Tech and Professional Ser...Novell Success Stories: Endpoint Management in High Tech and Professional Ser...
Novell Success Stories: Endpoint Management in High Tech and Professional Ser...
 
Novell Success Stories: Endpoint Management in Education
Novell Success Stories: Endpoint Management in EducationNovell Success Stories: Endpoint Management in Education
Novell Success Stories: Endpoint Management in Education
 
Novell Success Stories: Collaboration in Travel and Hospitality
Novell Success Stories: Collaboration in Travel and HospitalityNovell Success Stories: Collaboration in Travel and Hospitality
Novell Success Stories: Collaboration in Travel and Hospitality
 
Novell Success Stories: Collaboration in Education
Novell Success Stories: Collaboration in EducationNovell Success Stories: Collaboration in Education
Novell Success Stories: Collaboration in Education
 
Introducing Novell Privileged User Manager and Securing Novell Open Enterpris...
Introducing Novell Privileged User Manager and Securing Novell Open Enterpris...Introducing Novell Privileged User Manager and Securing Novell Open Enterpris...
Introducing Novell Privileged User Manager and Securing Novell Open Enterpris...
 
Adaptive Computing Using PlateSpin Orchestrate
Adaptive Computing Using PlateSpin OrchestrateAdaptive Computing Using PlateSpin Orchestrate
Adaptive Computing Using PlateSpin Orchestrate
 
IBM BP Kickoff 2013 VDI Solutions
IBM BP Kickoff 2013    VDI SolutionsIBM BP Kickoff 2013    VDI Solutions
IBM BP Kickoff 2013 VDI Solutions
 
Workload IQ: A Differentiated Approach
Workload IQ: A Differentiated ApproachWorkload IQ: A Differentiated Approach
Workload IQ: A Differentiated Approach
 
Run Book Automation with PlateSpin Orchestrate
Run Book Automation with PlateSpin OrchestrateRun Book Automation with PlateSpin Orchestrate
Run Book Automation with PlateSpin Orchestrate
 
CL100.pdf
CL100.pdfCL100.pdf
CL100.pdf
 
It infrastructure cost reduction vision v5 customer
It infrastructure cost reduction vision v5   customerIt infrastructure cost reduction vision v5   customer
It infrastructure cost reduction vision v5 customer
 
Managing change in the data center network
Managing change in the data center networkManaging change in the data center network
Managing change in the data center network
 
Novell Success Stories: Endpoint Management in Healthcare
Novell Success Stories: Endpoint Management in HealthcareNovell Success Stories: Endpoint Management in Healthcare
Novell Success Stories: Endpoint Management in Healthcare
 
Novell Success Stories: Endpoint Management in Government
Novell Success Stories: Endpoint Management in GovernmentNovell Success Stories: Endpoint Management in Government
Novell Success Stories: Endpoint Management in Government
 
Communication Patterns Using Data-Centric Publish/Subscribe
Communication Patterns Using Data-Centric Publish/SubscribeCommunication Patterns Using Data-Centric Publish/Subscribe
Communication Patterns Using Data-Centric Publish/Subscribe
 
Custom Development with Novell Teaming
Custom Development with Novell TeamingCustom Development with Novell Teaming
Custom Development with Novell Teaming
 
Windows and Linux Interopability
Windows and Linux InteropabilityWindows and Linux Interopability
Windows and Linux Interopability
 
Deadly Sins Bcs Elite
Deadly Sins Bcs EliteDeadly Sins Bcs Elite
Deadly Sins Bcs Elite
 
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
 
Migrating from Novell ZENworks 7 Desktop Management to Novell ZENworks Config...
Migrating from Novell ZENworks 7 Desktop Management to Novell ZENworks Config...Migrating from Novell ZENworks 7 Desktop Management to Novell ZENworks Config...
Migrating from Novell ZENworks 7 Desktop Management to Novell ZENworks Config...
 

Ähnlich wie What an Enterprise Should Look for in a Cloud Provider

Service Manager Cloud Seminar introcustext
Service Manager Cloud Seminar introcustextService Manager Cloud Seminar introcustext
Service Manager Cloud Seminar introcustextMicrosoft Norge AS
 
Hybrid Customer Insight - Data Collection and Analysis from On-premise and in...
Hybrid Customer Insight - Data Collection and Analysis from On-premise and in...Hybrid Customer Insight - Data Collection and Analysis from On-premise and in...
Hybrid Customer Insight - Data Collection and Analysis from On-premise and in...LicensingLive! - SafeNet
 
Cloud Computing - Jan 2011 - Chandna
Cloud Computing - Jan 2011 - ChandnaCloud Computing - Jan 2011 - Chandna
Cloud Computing - Jan 2011 - ChandnaAsheem Chandna
 
Cloud Lock-in vs. Cloud Interoperability - Indicthreads cloud computing conf...
Cloud Lock-in vs. Cloud Interoperability  - Indicthreads cloud computing conf...Cloud Lock-in vs. Cloud Interoperability  - Indicthreads cloud computing conf...
Cloud Lock-in vs. Cloud Interoperability - Indicthreads cloud computing conf...IndicThreads
 
Perfect Storm: HR in the Cloud
Perfect Storm: HR in the CloudPerfect Storm: HR in the Cloud
Perfect Storm: HR in the CloudStanton Jones
 
Developing Your Cloud Strategy
Developing Your Cloud StrategyDeveloping Your Cloud Strategy
Developing Your Cloud StrategyInternap
 
SIOS Private Cloud
SIOS Private CloudSIOS Private Cloud
SIOS Private CloudJim Kaskade
 
The Cloud and Next Gen IT Gordon Haff - p camp-boston2012
The Cloud and Next Gen IT   Gordon Haff - p camp-boston2012The Cloud and Next Gen IT   Gordon Haff - p camp-boston2012
The Cloud and Next Gen IT Gordon Haff - p camp-boston2012ProductCamp Boston
 
Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...
Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...
Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...Arrow ECS UK
 
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...Eucalyptus Systems, Inc.
 
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...Eucalyptus Systems, Inc.
 
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...Eucalyptus Systems, Inc.
 
Cloud Computing for Enterprise Architects
Cloud Computing for Enterprise ArchitectsCloud Computing for Enterprise Architects
Cloud Computing for Enterprise ArchitectsJean-François Caenen
 
How Cloud Providers' Business Needs Drive Enterprise Identity & Security
How Cloud Providers' Business Needs Drive Enterprise Identity & SecurityHow Cloud Providers' Business Needs Drive Enterprise Identity & Security
How Cloud Providers' Business Needs Drive Enterprise Identity & SecurityNovell
 
Government cloud deployment lessons learned final (4 4 2013)
Government cloud deployment lessons learned final (4 4 2013)Government cloud deployment lessons learned final (4 4 2013)
Government cloud deployment lessons learned final (4 4 2013)GovCloud Network
 
Taiye Lambo - Auditing the cloud
Taiye Lambo - Auditing the cloudTaiye Lambo - Auditing the cloud
Taiye Lambo - Auditing the cloudnooralmousa
 
Zsl cloud-management-made-easier-with-scm
Zsl cloud-management-made-easier-with-scmZsl cloud-management-made-easier-with-scm
Zsl cloud-management-made-easier-with-scmzslmarketing
 
RTView - Monitoring Service for SmartCloud Applications
RTView - Monitoring Service for SmartCloud ApplicationsRTView - Monitoring Service for SmartCloud Applications
RTView - Monitoring Service for SmartCloud ApplicationsSL Corporation
 

Ähnlich wie What an Enterprise Should Look for in a Cloud Provider (20)

Service Manager Cloud Seminar introcustext
Service Manager Cloud Seminar introcustextService Manager Cloud Seminar introcustext
Service Manager Cloud Seminar introcustext
 
Hybrid Customer Insight - Data Collection and Analysis from On-premise and in...
Hybrid Customer Insight - Data Collection and Analysis from On-premise and in...Hybrid Customer Insight - Data Collection and Analysis from On-premise and in...
Hybrid Customer Insight - Data Collection and Analysis from On-premise and in...
 
Cloud Computing - Jan 2011 - Chandna
Cloud Computing - Jan 2011 - ChandnaCloud Computing - Jan 2011 - Chandna
Cloud Computing - Jan 2011 - Chandna
 
Cloud Lock-in vs. Cloud Interoperability - Indicthreads cloud computing conf...
Cloud Lock-in vs. Cloud Interoperability  - Indicthreads cloud computing conf...Cloud Lock-in vs. Cloud Interoperability  - Indicthreads cloud computing conf...
Cloud Lock-in vs. Cloud Interoperability - Indicthreads cloud computing conf...
 
Perfect Storm: HR in the Cloud
Perfect Storm: HR in the CloudPerfect Storm: HR in the Cloud
Perfect Storm: HR in the Cloud
 
Developing Your Cloud Strategy
Developing Your Cloud StrategyDeveloping Your Cloud Strategy
Developing Your Cloud Strategy
 
SIOS Private Cloud
SIOS Private CloudSIOS Private Cloud
SIOS Private Cloud
 
The Cloud and Next Gen IT Gordon Haff - p camp-boston2012
The Cloud and Next Gen IT   Gordon Haff - p camp-boston2012The Cloud and Next Gen IT   Gordon Haff - p camp-boston2012
The Cloud and Next Gen IT Gordon Haff - p camp-boston2012
 
Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...
Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...
Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...
 
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...
 
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...
 
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...
 
Cloud Computing for Enterprise Architects
Cloud Computing for Enterprise ArchitectsCloud Computing for Enterprise Architects
Cloud Computing for Enterprise Architects
 
How Cloud Providers' Business Needs Drive Enterprise Identity & Security
How Cloud Providers' Business Needs Drive Enterprise Identity & SecurityHow Cloud Providers' Business Needs Drive Enterprise Identity & Security
How Cloud Providers' Business Needs Drive Enterprise Identity & Security
 
Government cloud deployment lessons learned final (4 4 2013)
Government cloud deployment lessons learned final (4 4 2013)Government cloud deployment lessons learned final (4 4 2013)
Government cloud deployment lessons learned final (4 4 2013)
 
Taiye Lambo - Auditing the cloud
Taiye Lambo - Auditing the cloudTaiye Lambo - Auditing the cloud
Taiye Lambo - Auditing the cloud
 
Zsl cloud-management-made-easier-with-scm
Zsl cloud-management-made-easier-with-scmZsl cloud-management-made-easier-with-scm
Zsl cloud-management-made-easier-with-scm
 
RTView - Monitoring Service for SmartCloud Applications
RTView - Monitoring Service for SmartCloud ApplicationsRTView - Monitoring Service for SmartCloud Applications
RTView - Monitoring Service for SmartCloud Applications
 
Antonio piraino v1
Antonio piraino v1Antonio piraino v1
Antonio piraino v1
 
PCI and the Cloud
PCI and the CloudPCI and the Cloud
PCI and the Cloud
 

Mehr von Novell

Filr white paper
Filr white paperFilr white paper
Filr white paperNovell
 
Social media class 4 v2
Social media class 4 v2Social media class 4 v2
Social media class 4 v2Novell
 
Social media class 3
Social media class 3Social media class 3
Social media class 3Novell
 
Social media class 2
Social media class 2Social media class 2
Social media class 2Novell
 
Social media class 1
Social media class 1Social media class 1
Social media class 1Novell
 
Social media class 2 v2
Social media class 2 v2Social media class 2 v2
Social media class 2 v2Novell
 
LinkedIn training presentation
LinkedIn training presentationLinkedIn training presentation
LinkedIn training presentationNovell
 
Twitter training presentation
Twitter training presentationTwitter training presentation
Twitter training presentationNovell
 
Getting started with social media
Getting started with social mediaGetting started with social media
Getting started with social mediaNovell
 
Strategies for sharing and commenting in social media
Strategies for sharing and commenting in social mediaStrategies for sharing and commenting in social media
Strategies for sharing and commenting in social mediaNovell
 
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECHInformation Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECHNovell
 
Workload iq final
Workload iq   finalWorkload iq   final
Workload iq finalNovell
 
The Identity-infused Enterprise
The Identity-infused EnterpriseThe Identity-infused Enterprise
The Identity-infused EnterpriseNovell
 
Shining the Enterprise Light on Shades of Social
Shining the Enterprise Light on Shades of SocialShining the Enterprise Light on Shades of Social
Shining the Enterprise Light on Shades of SocialNovell
 
Accelerate to the Cloud
Accelerate to the CloudAccelerate to the Cloud
Accelerate to the CloudNovell
 
The New Business Value of Today’s Collaboration Trends
The New Business Value of Today’s Collaboration TrendsThe New Business Value of Today’s Collaboration Trends
The New Business Value of Today’s Collaboration TrendsNovell
 
Preventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementPreventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementNovell
 
Iaas for a demanding business
Iaas for a demanding businessIaas for a demanding business
Iaas for a demanding businessNovell
 
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...Novell
 
ASP.NET on zLinux: A New Workload
ASP.NET on zLinux: A New WorkloadASP.NET on zLinux: A New Workload
ASP.NET on zLinux: A New WorkloadNovell
 

Mehr von Novell (20)

Filr white paper
Filr white paperFilr white paper
Filr white paper
 
Social media class 4 v2
Social media class 4 v2Social media class 4 v2
Social media class 4 v2
 
Social media class 3
Social media class 3Social media class 3
Social media class 3
 
Social media class 2
Social media class 2Social media class 2
Social media class 2
 
Social media class 1
Social media class 1Social media class 1
Social media class 1
 
Social media class 2 v2
Social media class 2 v2Social media class 2 v2
Social media class 2 v2
 
LinkedIn training presentation
LinkedIn training presentationLinkedIn training presentation
LinkedIn training presentation
 
Twitter training presentation
Twitter training presentationTwitter training presentation
Twitter training presentation
 
Getting started with social media
Getting started with social mediaGetting started with social media
Getting started with social media
 
Strategies for sharing and commenting in social media
Strategies for sharing and commenting in social mediaStrategies for sharing and commenting in social media
Strategies for sharing and commenting in social media
 
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECHInformation Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
 
Workload iq final
Workload iq   finalWorkload iq   final
Workload iq final
 
The Identity-infused Enterprise
The Identity-infused EnterpriseThe Identity-infused Enterprise
The Identity-infused Enterprise
 
Shining the Enterprise Light on Shades of Social
Shining the Enterprise Light on Shades of SocialShining the Enterprise Light on Shades of Social
Shining the Enterprise Light on Shades of Social
 
Accelerate to the Cloud
Accelerate to the CloudAccelerate to the Cloud
Accelerate to the Cloud
 
The New Business Value of Today’s Collaboration Trends
The New Business Value of Today’s Collaboration TrendsThe New Business Value of Today’s Collaboration Trends
The New Business Value of Today’s Collaboration Trends
 
Preventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementPreventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log Management
 
Iaas for a demanding business
Iaas for a demanding businessIaas for a demanding business
Iaas for a demanding business
 
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
 
ASP.NET on zLinux: A New Workload
ASP.NET on zLinux: A New WorkloadASP.NET on zLinux: A New Workload
ASP.NET on zLinux: A New Workload
 

What an Enterprise Should Look for in a Cloud Provider

  • 1. What an Enterprise Should Look for in a Cloud Computing Provider Tom Cecere Director, Novell Cloud Security Service March 23, 2010
  • 2. Takeaways for Today • Cloud computing offers the potential for big savings and huge increases in flexibility for enterprise IT • Large enterprises are telling analysts, researchers and cloud providers that it’s hard to trust cloud-based solutions • But don’t let that fool you – people are using them like mad, with 20-40% growth in 2009 in some sectors • Security is a primary concern, but it comes in many guises • Regulations and finances are driving use and risk, leaving you with security holes you never had before • Security is the responsibility of both you and your vendors of choice 2 © Novell, Inc. All rights reserved.
  • 3. Cloud Computing: What Is It, Why and How Much Do We Use It?
  • 4. Forrester Definition: Cloud Computing: A standardized IT capability (services, software, or infrastructure) delivered via the Internet in a pay-per-use, self-service way 4 © Novell, Inc. All rights reserved.
  • 5. Breaking It Down a Bit SaaS … Salesforce.com, Netsuite, Web-based Services Software-as-a-service Ultimate, Taleo, LinkedIn, Facebook Software-platform-as-a-service Google App Engine, Azure, Force Virtual-infrastructure-as-a-service Sun, IBM, Azure IaaS … Amazon, Go-Grid, Physical-infrastructure-as-a-service OpSource, COLT, etc. Source: Forrester Research. August 2008 “Future View: The New Tech Ecosystems of Cloud, Cloud Services, and Cloud Computing” 5 © Novell, Inc. All rights reserved.
  • 6. Cloud Computing Really Is the Next Big Thing Who are your two largest users of cloud services? FIGURE 12. The two largest users of cloud services MID TIER ENTERPRISE SAAS PROVIDERS SMB DEVELOPERS Note: mid-tier sector ENTERPRISE (250-1000 employees and revenue between ISV'S $50m and $1b) OTHER PAAS OTHER SOHO 0% 10% 20% 30% 40% 50% 60% Gartner predicts that the market for total cloud services will reach $150B by 2013 Source: Tier 1 research “Cloud Infrastructure Services – Managed Hosters”, based on poll of top 50 managed hosters in US and Europe 6 © Novell, Inc. All rights reserved.
  • 7. Early Cloud Examples US Army — Testing troop vulnerability application on cloud platform Eli Lilly — Drug research Nasdaq — Market Replay service USA.gov — Public information portal that flexes with traffic fluctuations Starbucks — My Starbucks Ideas online customer collaboration built on Force.com Indy500.com — Streams live race footage and statistics Harvard Medical School — Genetic testing models and simulations 7 © Novell, Inc. All rights reserved.
  • 8. Enterprises Cite Flexibility and On Demand over Cost Reasons for IaaS “How important were the following in your firm's decision to adopt pay-per-use hosting of virtual servers (also known as cloud computing)?” 8 © Novell, Inc. All rights reserved.
  • 9. SaaS Adoption Growing As Model Matures: $8B in ’09 to $14.7B in ‘12 With Customer Relationship Management and Content/Communication and Collaboration leading the way 9 © Novell, Inc. All rights reserved. Source: Gartner Saas Trends 2007-2012
  • 10. Ok, If It’s So Great, Why Not Use the Cloud for Everything?
  • 11. Security is the Top Challenge for Customers Moving to Cloud Services What are the top two most critical challenges for customers looking to move to a utility/cloud? FIGURE 15. Top challenges for customers moving to cloud services NERVOUS ABOUT SECURITY CULTURAL/ORGANIZATIONAL (RESOURCE OWNERSHIP) ON PREMISE SOFTWARE/LEGACY INFRASTRUCTURE PRODUCT/SERVICE OPTION AVAILABLE SHARED RESOURCES REGULATION/COMPLIANCE AVAILABLILITY/UPTIME SOFTWARE LICENSING CxO SPONSORSHIP 0% 10% 20% 30% 40% 50% Source: Tier 1 research “Cloud Infrastructure Services – Managed Hosters”, based on poll of top 50 managed hosters in US and Europe 11 © Novell, Inc. All rights reserved.
  • 12. The Two Largest Users of Cloud Services: Mid-tier Enterprise and SaaS Providers Who are your two largest users of cloud services? FIGURE 12. The two largest users of cloud services MID TIER ENTERPRISE SAAS PROVIDERS Note: mid-tier sector (250-1000 employees SMB and revenue between $50m and $1b) DEVELOPERS ENTERPRISE ISV'S OTHER PAAS OTHER SOHO 0% 10% 20% 30% 40% 50% 60% Source: Tier 1 research “Cloud Infrastructure Services – Managed Hosters”, based on poll of top 50 managed hosters in US and Europe 12 © Novell, Inc. All rights reserved.
  • 13. Security Worries for Enterprises Physical Security GRC Manageability • Physical data location • Identity, compliance • Responsive provisioning/de- • Physical data security • Manageability of resources provisioning users across in the cloud multiple services • Multiple identities to • How to apply roles / policies manage across multiple services • Compliance enforcement • Cloud workload management • Usable for a broader set of workloads Financial Contractual • Audit • Software licensing problems • Need to rewrite internal • SLAs, proof of 99.99+% applications uptime • How to leverage existing • Intellectual property investments in the data concerns center • References 13 © Novell, Inc. All rights reserved.
  • 14. Security Worries for Enterprises Physical Security GRC Manageability • Physical data location • Identity, compliance • Responsive provisioning/de- • Physical data security • Manageability of resources provisioning users across in the cloud multiple services • Multiple identities to • How to apply roles / policies manage across multiple services • Compliance enforcement • Cloud workload management • Usable for a broader set of workloads Financial Contractual • Audit • Software licensing problems • Need to rewrite internal • SLAs, proof of 99.99+% applications uptime • How to leverage existing • Intellectual property investments in the data concerns center • References 14 © Novell, Inc. All rights reserved.
  • 15. What Are the Key Risks?
  • 16. Summary The Cloud Amplifies IT Challenges and Opportunities • Data that is safe for you to store inside your firewall is now outside • Access to compute resources that your company is paying for is available with simple user name/password authentication • Your compute jobs may be running on many machines; may be backed up on many storage networks, and may be exported without your knowledge Identity, authorization and audit for employees, customers, patients and workloads is the future of computing security! 16 © Novell, Inc. All rights reserved.
  • 17. What Do Enterprises Have To Do?
  • 18. Attach the Same Governance and Access Policies to the Cloud as We Have Internally Internal Cloud External Cloud (on-premise) (off-premise) Business Service Management Software IT Service Management as a Service Platform as a Service Internal Internal External Capacity Capacity Capacity Infrastructure Legacy Abstracted and Managed as a Service disaggregated Outsource IT resources Provider Telco Amazon EC2 Governance and Compliance Firewall 18 © Novell, Inc. All rights reserved.
  • 19. Action Items • Do a Cloud Computing Discovery project – Don’t forget to ask Accounting how many purchase orders and credit card reimbursements you have to Amazon Web Services! – Software usage analysis will discover SaaS products being used at your site • Ask your CISO (or if you are one, your team ☺) to prepare a report card on the security issues we’ve discussed • Every new cloud computing provider should be evaluated both in terms of positives and in terms of security impact 19 © Novell, Inc. All rights reserved.
  • 20. Sample Cloud Computing Report Card Acme Platform Services Physical Security GRC Manageability • Physical data location • Identity, compliance • Responsive provisioning/ • Physical data security • Manageability of de-provisioning users resources in the cloud across multiple services • Multiple identities to • How to apply roles/policies manage across multiple services • Compliance enforcement • Cloud workload management • Usable for a broader set of workloads Financial Contractual • Audit • Software licensing • Need to rewrite internal problems applications • SLAs, proof of 99.99+% • How to leverage existing uptime investments in the data • Intellectual property center concerns • References 20 © Novell, Inc. All rights reserved.
  • 21. Action Items (cont) • Make a plan to solve the worst 3 problems in 2010 • Prohibit any more cloud providers until their offerings easily snap into YOUR access and governance policies – Consider a portal where you can control (or even require multiple authentication methods for) access to Cloud resources • Insist on audit information you can use from your current providers • Investigate managed clouds from trusted MSPs 21 © Novell, Inc. All rights reserved.
  • 22. What Should I Expect from My Cloud Vendors?
  • 23. Vendors SAS 70 Other transparency Identity protection and user-controlled access/authorization Audit trail Trusted Cloud Initiative 23 © Novell, Inc. All rights reserved.
  • 24. SAS 70 Certification • Created by American Institute of Certified Public Accountants Represents that a service organization has been through an in-depth audit of their control objectives and control activities, which often include controls over information technology and related processes • Independent “service auditor” issues opinion on servicer’s controls, useable by servicer and their customers • Type I: a snapshot on a specific date, self reported • Type II: Opinion delivered about ongoing controls 24 © Novell, Inc. All rights reserved.
  • 25. Other Transparency Issues • Who can reach data? • What level of encryption is available? Practical? • Where is data located? • Where is computer located? • SLA terms (Microsoft requires an NDA to even see their SLA model agreement!) 25 © Novell, Inc. All rights reserved.
  • 26. Identity Protection • What is the process for: – Provisioning identities? – Guarding them? – De-provisioning with role changes? • Does vendor support multi-factor authentication? • Do they support standards-based federation? 26 © Novell, Inc. All rights reserved.
  • 27. Audit/GRC • How do you find out what’s going on inside your vendor’s data center? • How do you check up on SLA terms? • Can you reconcile information you do receive with the rest of your GRC inspection regime? • Is sensitive data moving through scale-out or through backup? 27 © Novell, Inc. All rights reserved.
  • 28. Trusted-Cloud Initiative Novell/CSA partnership initiative now prominently displayed to CSA members 28 © Novell, Inc. All rights reserved.
  • 29. Responsibility Physical Security GRC Manageability • Physical data location • Identity creation • Responsive provisioning/ • Physical data security • Manageability of de-provisioning users resources in the cloud across multiple services • Simplify identity • How to apply roles/policies management across multiple services • Compliance enforcement • Cloud workload management • Ability to move workloads to different vendor(s) Financial Contractual • Audit • Software licensing • Avoid re-writing internal problems Vendor applications • SLAs, proof of 99.99+% Enterprise • Leveraging existing uptime investments in the data • Intellectual property Joint center concerns • References 29 © Novell, Inc. All rights reserved.
  • 31.
  • 32. Unpublished Work of Novell, Inc. All Rights Reserved. This work is an unpublished work and contains confidential, proprietary, and trade secret information of Novell, Inc. Access to this work is restricted to Novell employees who have a need to know to perform tasks within the scope of their assignments. No part of this work may be practiced, performed, copied, distributed, revised, modified, translated, abridged, condensed, expanded, collected, or adapted without the prior written consent of Novell, Inc. Any use or exploitation of this work without authorization could subject the perpetrator to criminal and civil liability. General Disclaimer This document is not to be construed as a promise by any participating company to develop, deliver, or market a product. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. Novell, Inc. makes no representations or warranties with respect to the contents of this document, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. The development, release, and timing of features or functionality described for Novell products remains at the sole discretion of Novell. Further, Novell, Inc. reserves the right to revise this document and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. All Novell marks referenced in this presentation are trademarks or registered trademarks of Novell, Inc. in the United States and other countries. All third-party trademarks are the property of their respective owners.