SlideShare ist ein Scribd-Unternehmen logo
1 von 21
24/01/2013 1John Rhoton – 2013
Cloud Deployment Strategy
Challenges to Consider
John Rhoton
Cloud Weekend, Giza, Egypt
11-12 May 2013
24/01/2013 2John Rhoton – 2013
Agenda
• Business/Financial
• Risk & Security
• Technical
• Process
24/01/2013 3John Rhoton – 2013
Business Case
• Sunk Cost
– Irrelevant?
– Political, Marginal Costs
• Return on Investment
– Calculated with NPV / IRR
– Payback period
• Cash Flow effects
• Revenue impact of flexibility and speed
24/01/2013 4John Rhoton – 2013
Cost Tradeoffs
Initial Ongoing
Private
Cloud
Capital Expenditures Licensing
Operations
Public
Cloud
Migration Subscription
Hardware, Software, Deployment, Administration, Support
24/01/2013 5John Rhoton – 2013
Hybrid Usage Profile
Base
Base Usage Peak
Spikes
24/01/2013 6John Rhoton – 2013
Risk Analysis
• Governance
• Risk
• Security
• Compliance
24/01/2013 7John Rhoton – 2013
Risk Mitigation Options
Data Leakage
Data Loss
Service Loss
Service Impairment
Damaged Reputation
Lock-In
Provider Assessment
Contract Negotiation
Encryption
Additional Backup
Multi-sourcing
Standardization
24/01/2013 8John Rhoton – 2013
• Personal observation
• Personal experience
• Insight
Employees Contractors
Partners Suppliers
• Public verification
• Contracts
• Compensation
Experts
Legal Counsel
Auditors
Public Scrutiny
Segmentation
Access controls
Encryption
Access controls
Shifting Trust
Adapt Corporate Culture
24/01/2013 9John Rhoton – 2013
Confidentiality
• Data Governance
– Data loss prevention
• Compartmentalization
• Encryption
Classify data, Select and Combine Options
24/01/2013 10John Rhoton – 2013
Compliance
Enforce Logical Barriers
Global Internet versus National Laws
24/01/2013 11John Rhoton – 2013
Business
Continuity
Eliminate
High
Probability
Low
Probability
High ImpactLow Impact
Resilience
Risk Treatment
24/01/2013 12John Rhoton – 2013
Technical Considerations
• Technologies
• Integration
• Availability
• Automation
24/01/2013 13John Rhoton – 2013
Lock-in vs. Cloud Stacks
• Servers
• Storage
• Network
• Hypervisor
• Operating
System
• Orchestration
Proprietary
Hardware
Proprietary
Software
Open
Source
Consortium
Driven
Balance ease with flexibility
24/01/2013 14John Rhoton – 2013
Integration
• Connectivity
• Application Compatibility
• Authorization and Isolation
Internal External
Users
Functions
Resources
24/01/2013 15John Rhoton – 2013
Identity Federation
Identity challenges
• Password
proliferation
• Weak
authentication
• Support costs
• User
productivity
Implement Identity Standards (SAML, SCIM)
24/01/2013 16John Rhoton – 2013
Redundancy
• Dimensions
– Physical
– Geographical
– Technological
– Organizational
• Horizontal Scalability
• ACID (Atomic Consistent Isolated Durable)
=> BASE (Basic Availability, Soft-state, Eventual consistency)
Architect for scale
24/01/2013 17John Rhoton – 2013
Automation
• Efficiency, Quality, Traceability, Compliance
• Scripting
• Workflow
• Sizing
• Best practice configuration
• Puppet, Chef, Capistrano
• OpenStack Heat, Juju Charms
24/01/2013 18John Rhoton – 2013
Process
• Culture
– Job Security Career Enhancement
– Political Power shift
• Skills
– Virtualization, Networking, Storage
– Linux, Python, Ruby, OpenStack, OpenFlow
• Procedures
– Workflow definition
• Project Management
– Rollout pace, schedule
– Continuous integration, continuous deployment
24/01/2013 19John Rhoton – 2013
Emotional vs Factual
• Fear, Uncertainty and Doubt
• Increased Effort
– Evaluation
– Negotiation
– Integration
– Implementation
• Reduce CAPEX benefits
Plan early, think objectively
24/01/2013 20John Rhoton – 2013
Summary
• Build the business case around agility
• New trust model is inevitable
• Security challenges real but addressable
• Integration the biggest technical hurdle
• Don’t forget the human element!
24/01/2013 21John Rhoton – 2013
Contact Details
Follow me: @johnrhoton
Connect: linkedin/in/rhoton
Read the books:
amazon.com/author/rhoton
Download the presentation:
slideshare.net/rhoton

Weitere ähnliche Inhalte

Was ist angesagt?

Blockchain for Accounting & Assurance
Blockchain for Accounting & AssuranceBlockchain for Accounting & Assurance
Blockchain for Accounting & AssuranceEryk Budi Pratama
 
Direct Edge and BATS Global Markets Trusts Intralinks Dealspace™
Direct Edge and BATS Global Markets Trusts Intralinks Dealspace™Direct Edge and BATS Global Markets Trusts Intralinks Dealspace™
Direct Edge and BATS Global Markets Trusts Intralinks Dealspace™Intralinks
 
Identity, Security and Healthcare
Identity, Security and HealthcareIdentity, Security and Healthcare
Identity, Security and HealthcareNetIQ
 
Privacy by Design - taking in account the state of the art
Privacy by Design - taking in account the state of the artPrivacy by Design - taking in account the state of the art
Privacy by Design - taking in account the state of the artJames Mulhern
 
Next Dimension: How to create a Cybersecurity Strategy
Next Dimension: How to create a Cybersecurity StrategyNext Dimension: How to create a Cybersecurity Strategy
Next Dimension: How to create a Cybersecurity StrategyNext Dimension Inc.
 
Are You Being Anti-Social
Are You Being Anti-SocialAre You Being Anti-Social
Are You Being Anti-SocialNetIQ
 
How Network Data Loss Prevention is Implemented
How Network Data Loss Prevention is ImplementedHow Network Data Loss Prevention is Implemented
How Network Data Loss Prevention is ImplementedJerry Paul Acosta
 
A Data Breach Prevention, Detection & Response Strategy to Combat Today' Threats
A Data Breach Prevention, Detection & Response Strategy to Combat Today' ThreatsA Data Breach Prevention, Detection & Response Strategy to Combat Today' Threats
A Data Breach Prevention, Detection & Response Strategy to Combat Today' ThreatsKirsty Donovan
 
Privacy and Security by Design
Privacy and Security by DesignPrivacy and Security by Design
Privacy and Security by DesignUnisys Corporation
 
Protecting Innovation Through Next Generation Enterprise File Sharing
Protecting Innovation Through Next Generation Enterprise File SharingProtecting Innovation Through Next Generation Enterprise File Sharing
Protecting Innovation Through Next Generation Enterprise File SharingIntralinks
 
Idc bif2018 praveen raman _v1.0
Idc bif2018 praveen raman _v1.0Idc bif2018 praveen raman _v1.0
Idc bif2018 praveen raman _v1.0Praveen Raman
 
GDPR project board deck (example)
GDPR project board deck (example)GDPR project board deck (example)
GDPR project board deck (example)Tommy Vandepitte
 
Three aspects of personal data processing & GDPR
Three aspects of personal data processing & GDPRThree aspects of personal data processing & GDPR
Three aspects of personal data processing & GDPRTudor Stanciu
 
Privacy in Computer Vision
Privacy in Computer Vision Privacy in Computer Vision
Privacy in Computer Vision Omid Mogharian
 
Privacy by Design and by Default + General Data Protection Regulation with Si...
Privacy by Design and by Default + General Data Protection Regulation with Si...Privacy by Design and by Default + General Data Protection Regulation with Si...
Privacy by Design and by Default + General Data Protection Regulation with Si...Peter Procházka
 
Legal, Policy & the Blockchain
Legal, Policy & the BlockchainLegal, Policy & the Blockchain
Legal, Policy & the BlockchainTudor Stanciu
 
Vlad Andrei - Tokens Deep Dive presentation
Vlad Andrei - Tokens Deep Dive presentationVlad Andrei - Tokens Deep Dive presentation
Vlad Andrei - Tokens Deep Dive presentationSebastian Cochinescu
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Preventiondj1arry
 
Webinar: Designing Storage Architectures for Data Privacy, Compliance and Gov...
Webinar: Designing Storage Architectures for Data Privacy, Compliance and Gov...Webinar: Designing Storage Architectures for Data Privacy, Compliance and Gov...
Webinar: Designing Storage Architectures for Data Privacy, Compliance and Gov...Storage Switzerland
 

Was ist angesagt? (19)

Blockchain for Accounting & Assurance
Blockchain for Accounting & AssuranceBlockchain for Accounting & Assurance
Blockchain for Accounting & Assurance
 
Direct Edge and BATS Global Markets Trusts Intralinks Dealspace™
Direct Edge and BATS Global Markets Trusts Intralinks Dealspace™Direct Edge and BATS Global Markets Trusts Intralinks Dealspace™
Direct Edge and BATS Global Markets Trusts Intralinks Dealspace™
 
Identity, Security and Healthcare
Identity, Security and HealthcareIdentity, Security and Healthcare
Identity, Security and Healthcare
 
Privacy by Design - taking in account the state of the art
Privacy by Design - taking in account the state of the artPrivacy by Design - taking in account the state of the art
Privacy by Design - taking in account the state of the art
 
Next Dimension: How to create a Cybersecurity Strategy
Next Dimension: How to create a Cybersecurity StrategyNext Dimension: How to create a Cybersecurity Strategy
Next Dimension: How to create a Cybersecurity Strategy
 
Are You Being Anti-Social
Are You Being Anti-SocialAre You Being Anti-Social
Are You Being Anti-Social
 
How Network Data Loss Prevention is Implemented
How Network Data Loss Prevention is ImplementedHow Network Data Loss Prevention is Implemented
How Network Data Loss Prevention is Implemented
 
A Data Breach Prevention, Detection & Response Strategy to Combat Today' Threats
A Data Breach Prevention, Detection & Response Strategy to Combat Today' ThreatsA Data Breach Prevention, Detection & Response Strategy to Combat Today' Threats
A Data Breach Prevention, Detection & Response Strategy to Combat Today' Threats
 
Privacy and Security by Design
Privacy and Security by DesignPrivacy and Security by Design
Privacy and Security by Design
 
Protecting Innovation Through Next Generation Enterprise File Sharing
Protecting Innovation Through Next Generation Enterprise File SharingProtecting Innovation Through Next Generation Enterprise File Sharing
Protecting Innovation Through Next Generation Enterprise File Sharing
 
Idc bif2018 praveen raman _v1.0
Idc bif2018 praveen raman _v1.0Idc bif2018 praveen raman _v1.0
Idc bif2018 praveen raman _v1.0
 
GDPR project board deck (example)
GDPR project board deck (example)GDPR project board deck (example)
GDPR project board deck (example)
 
Three aspects of personal data processing & GDPR
Three aspects of personal data processing & GDPRThree aspects of personal data processing & GDPR
Three aspects of personal data processing & GDPR
 
Privacy in Computer Vision
Privacy in Computer Vision Privacy in Computer Vision
Privacy in Computer Vision
 
Privacy by Design and by Default + General Data Protection Regulation with Si...
Privacy by Design and by Default + General Data Protection Regulation with Si...Privacy by Design and by Default + General Data Protection Regulation with Si...
Privacy by Design and by Default + General Data Protection Regulation with Si...
 
Legal, Policy & the Blockchain
Legal, Policy & the BlockchainLegal, Policy & the Blockchain
Legal, Policy & the Blockchain
 
Vlad Andrei - Tokens Deep Dive presentation
Vlad Andrei - Tokens Deep Dive presentationVlad Andrei - Tokens Deep Dive presentation
Vlad Andrei - Tokens Deep Dive presentation
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
 
Webinar: Designing Storage Architectures for Data Privacy, Compliance and Gov...
Webinar: Designing Storage Architectures for Data Privacy, Compliance and Gov...Webinar: Designing Storage Architectures for Data Privacy, Compliance and Gov...
Webinar: Designing Storage Architectures for Data Privacy, Compliance and Gov...
 

Ähnlich wie Cloud Deployment Strategy: Challenges to consider

Cw13 cloud computing 2013-status and trends by john rhoton
Cw13 cloud computing 2013-status and trends by john rhotonCw13 cloud computing 2013-status and trends by john rhoton
Cw13 cloud computing 2013-status and trends by john rhotoninevitablecloud
 
Privacy by Design or Privacy by Re-engineering
Privacy by Design or Privacy by Re-engineeringPrivacy by Design or Privacy by Re-engineering
Privacy by Design or Privacy by Re-engineeringAndre Cardinaal
 
BATbern48_How Zero Trust can help your organisation keep safe.pdf
BATbern48_How Zero Trust can help your organisation keep safe.pdfBATbern48_How Zero Trust can help your organisation keep safe.pdf
BATbern48_How Zero Trust can help your organisation keep safe.pdfBATbern
 
Inria LORIA SCORE Team presentation
Inria LORIA SCORE Team presentationInria LORIA SCORE Team presentation
Inria LORIA SCORE Team presentationFrançois Charoy
 
A deep dive into digital lifesytles Allot Communications - Eyal Yaron
A deep dive into digital lifesytles Allot Communications - Eyal YaronA deep dive into digital lifesytles Allot Communications - Eyal Yaron
A deep dive into digital lifesytles Allot Communications - Eyal YaronEyal Yaron
 
The Website Resiliency Imperative
The Website Resiliency ImperativeThe Website Resiliency Imperative
The Website Resiliency ImperativeDistil Networks
 
27 Nov 2013 Cyber defence CDE themed competition presentations
27 Nov 2013 Cyber defence CDE themed competition presentations27 Nov 2013 Cyber defence CDE themed competition presentations
27 Nov 2013 Cyber defence CDE themed competition presentationsDefence and Security Accelerator
 
Lorraine Morgan: Factors affecting the adoption of cloud computing
Lorraine Morgan: Factors affecting the adoption of cloud computingLorraine Morgan: Factors affecting the adoption of cloud computing
Lorraine Morgan: Factors affecting the adoption of cloud computingCBOD ANR project U-PSUD
 
Considerations for Moving Your Enterprise Mission Critical Applications to th...
Considerations for Moving Your Enterprise Mission Critical Applications to th...Considerations for Moving Your Enterprise Mission Critical Applications to th...
Considerations for Moving Your Enterprise Mission Critical Applications to th...Amazon Web Services
 
How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?IBM Security
 
Marlabs Capabilities Overview: Cyber Security Services
Marlabs Capabilities Overview: Cyber Security Services Marlabs Capabilities Overview: Cyber Security Services
Marlabs Capabilities Overview: Cyber Security Services Marlabs
 
Your only as strong as your weakest link – Edward Ogden
Your only as strong as your weakest link – Edward OgdenYour only as strong as your weakest link – Edward Ogden
Your only as strong as your weakest link – Edward Ogdenowaspsuffolk
 
The System Administrator Role in the Cloud Era: Better Than Ever (ENT212) | A...
The System Administrator Role in the Cloud Era: Better Than Ever (ENT212) | A...The System Administrator Role in the Cloud Era: Better Than Ever (ENT212) | A...
The System Administrator Role in the Cloud Era: Better Than Ever (ENT212) | A...Amazon Web Services
 
LuminrDRPresentation_AITP_October2014.pptx
LuminrDRPresentation_AITP_October2014.pptxLuminrDRPresentation_AITP_October2014.pptx
LuminrDRPresentation_AITP_October2014.pptxTimothy Krupinski
 
Adopting Cloud Testing for Continuous Delivery, with the premier global provi...
Adopting Cloud Testing for Continuous Delivery, with the premier global provi...Adopting Cloud Testing for Continuous Delivery, with the premier global provi...
Adopting Cloud Testing for Continuous Delivery, with the premier global provi...SOASTA
 
Con8819 context and risk aware access control any device any where - final
Con8819   context and risk aware access control any device any where - finalCon8819   context and risk aware access control any device any where - final
Con8819 context and risk aware access control any device any where - finalOracleIDM
 

Ähnlich wie Cloud Deployment Strategy: Challenges to consider (20)

Cw13 cloud computing 2013-status and trends by john rhoton
Cw13 cloud computing 2013-status and trends by john rhotonCw13 cloud computing 2013-status and trends by john rhoton
Cw13 cloud computing 2013-status and trends by john rhoton
 
Privacy by Design or Privacy by Re-engineering
Privacy by Design or Privacy by Re-engineeringPrivacy by Design or Privacy by Re-engineering
Privacy by Design or Privacy by Re-engineering
 
Digital trends rhoton-20111205
Digital trends rhoton-20111205Digital trends rhoton-20111205
Digital trends rhoton-20111205
 
BATbern48_How Zero Trust can help your organisation keep safe.pdf
BATbern48_How Zero Trust can help your organisation keep safe.pdfBATbern48_How Zero Trust can help your organisation keep safe.pdf
BATbern48_How Zero Trust can help your organisation keep safe.pdf
 
Inria LORIA SCORE Team presentation
Inria LORIA SCORE Team presentationInria LORIA SCORE Team presentation
Inria LORIA SCORE Team presentation
 
A deep dive into digital lifesytles Allot Communications - Eyal Yaron
A deep dive into digital lifesytles Allot Communications - Eyal YaronA deep dive into digital lifesytles Allot Communications - Eyal Yaron
A deep dive into digital lifesytles Allot Communications - Eyal Yaron
 
The Website Resiliency Imperative
The Website Resiliency ImperativeThe Website Resiliency Imperative
The Website Resiliency Imperative
 
27 Nov 2013 Cyber defence CDE themed competition presentations
27 Nov 2013 Cyber defence CDE themed competition presentations27 Nov 2013 Cyber defence CDE themed competition presentations
27 Nov 2013 Cyber defence CDE themed competition presentations
 
Securing your Cloud Deployment
Securing your Cloud DeploymentSecuring your Cloud Deployment
Securing your Cloud Deployment
 
Lorraine Morgan: Factors affecting the adoption of cloud computing
Lorraine Morgan: Factors affecting the adoption of cloud computingLorraine Morgan: Factors affecting the adoption of cloud computing
Lorraine Morgan: Factors affecting the adoption of cloud computing
 
Considerations for Moving Your Enterprise Mission Critical Applications to th...
Considerations for Moving Your Enterprise Mission Critical Applications to th...Considerations for Moving Your Enterprise Mission Critical Applications to th...
Considerations for Moving Your Enterprise Mission Critical Applications to th...
 
How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?
 
Marlabs Capabilities Overview: Cyber Security Services
Marlabs Capabilities Overview: Cyber Security Services Marlabs Capabilities Overview: Cyber Security Services
Marlabs Capabilities Overview: Cyber Security Services
 
How to Avoid Cloud Migration Pitfalls
How to Avoid Cloud Migration PitfallsHow to Avoid Cloud Migration Pitfalls
How to Avoid Cloud Migration Pitfalls
 
Your only as strong as your weakest link – Edward Ogden
Your only as strong as your weakest link – Edward OgdenYour only as strong as your weakest link – Edward Ogden
Your only as strong as your weakest link – Edward Ogden
 
Orsyp Software
Orsyp SoftwareOrsyp Software
Orsyp Software
 
The System Administrator Role in the Cloud Era: Better Than Ever (ENT212) | A...
The System Administrator Role in the Cloud Era: Better Than Ever (ENT212) | A...The System Administrator Role in the Cloud Era: Better Than Ever (ENT212) | A...
The System Administrator Role in the Cloud Era: Better Than Ever (ENT212) | A...
 
LuminrDRPresentation_AITP_October2014.pptx
LuminrDRPresentation_AITP_October2014.pptxLuminrDRPresentation_AITP_October2014.pptx
LuminrDRPresentation_AITP_October2014.pptx
 
Adopting Cloud Testing for Continuous Delivery, with the premier global provi...
Adopting Cloud Testing for Continuous Delivery, with the premier global provi...Adopting Cloud Testing for Continuous Delivery, with the premier global provi...
Adopting Cloud Testing for Continuous Delivery, with the premier global provi...
 
Con8819 context and risk aware access control any device any where - final
Con8819   context and risk aware access control any device any where - finalCon8819   context and risk aware access control any device any where - final
Con8819 context and risk aware access control any device any where - final
 

Mehr von John Rhoton

Cloud Computing Explained: Guide to Enterprise Implementation
Cloud Computing Explained: Guide to Enterprise ImplementationCloud Computing Explained: Guide to Enterprise Implementation
Cloud Computing Explained: Guide to Enterprise ImplementationJohn Rhoton
 
Optimizing Cloud Computing with IPv6
Optimizing Cloud Computing with IPv6Optimizing Cloud Computing with IPv6
Optimizing Cloud Computing with IPv6John Rhoton
 
Securing Cloud Services
Securing Cloud ServicesSecuring Cloud Services
Securing Cloud ServicesJohn Rhoton
 
Clouds in the Enterprise
Clouds in the EnterpriseClouds in the Enterprise
Clouds in the EnterpriseJohn Rhoton
 
Enterprise Preparation for IPv6
Enterprise Preparation for IPv6Enterprise Preparation for IPv6
Enterprise Preparation for IPv6John Rhoton
 
Unauthorized Wireless Network Connections
Unauthorized Wireless Network ConnectionsUnauthorized Wireless Network Connections
Unauthorized Wireless Network ConnectionsJohn Rhoton
 
ISSE Mobile Device Policy Enforcement
ISSE Mobile Device Policy EnforcementISSE Mobile Device Policy Enforcement
ISSE Mobile Device Policy EnforcementJohn Rhoton
 
RSA - WLAN Hacking
RSA - WLAN HackingRSA - WLAN Hacking
RSA - WLAN HackingJohn Rhoton
 
Cloud Computing: Hindernisse und Chancen für Großunternehmen
Cloud Computing: Hindernisse und Chancen für GroßunternehmenCloud Computing: Hindernisse und Chancen für Großunternehmen
Cloud Computing: Hindernisse und Chancen für GroßunternehmenJohn Rhoton
 
Peer-based Enterprise Document Workflow
Peer-based EnterpriseDocument WorkflowPeer-based EnterpriseDocument Workflow
Peer-based Enterprise Document WorkflowJohn Rhoton
 
A Critical Analysis of Microsoft Data Protection Solutions
A Critical Analysis of Microsoft Data Protection SolutionsA Critical Analysis of Microsoft Data Protection Solutions
A Critical Analysis of Microsoft Data Protection SolutionsJohn Rhoton
 
IPv6 for the Enterprise
IPv6 for the EnterpriseIPv6 for the Enterprise
IPv6 for the EnterpriseJohn Rhoton
 
Windows Mobile Enterprise Security Best Practices
Windows Mobile Enterprise Security Best PracticesWindows Mobile Enterprise Security Best Practices
Windows Mobile Enterprise Security Best PracticesJohn Rhoton
 
System Center Mobile Device Manager
System Center Mobile Device ManagerSystem Center Mobile Device Manager
System Center Mobile Device ManagerJohn Rhoton
 
Mobile Device Management
Mobile Device ManagementMobile Device Management
Mobile Device ManagementJohn Rhoton
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device SecurityJohn Rhoton
 

Mehr von John Rhoton (16)

Cloud Computing Explained: Guide to Enterprise Implementation
Cloud Computing Explained: Guide to Enterprise ImplementationCloud Computing Explained: Guide to Enterprise Implementation
Cloud Computing Explained: Guide to Enterprise Implementation
 
Optimizing Cloud Computing with IPv6
Optimizing Cloud Computing with IPv6Optimizing Cloud Computing with IPv6
Optimizing Cloud Computing with IPv6
 
Securing Cloud Services
Securing Cloud ServicesSecuring Cloud Services
Securing Cloud Services
 
Clouds in the Enterprise
Clouds in the EnterpriseClouds in the Enterprise
Clouds in the Enterprise
 
Enterprise Preparation for IPv6
Enterprise Preparation for IPv6Enterprise Preparation for IPv6
Enterprise Preparation for IPv6
 
Unauthorized Wireless Network Connections
Unauthorized Wireless Network ConnectionsUnauthorized Wireless Network Connections
Unauthorized Wireless Network Connections
 
ISSE Mobile Device Policy Enforcement
ISSE Mobile Device Policy EnforcementISSE Mobile Device Policy Enforcement
ISSE Mobile Device Policy Enforcement
 
RSA - WLAN Hacking
RSA - WLAN HackingRSA - WLAN Hacking
RSA - WLAN Hacking
 
Cloud Computing: Hindernisse und Chancen für Großunternehmen
Cloud Computing: Hindernisse und Chancen für GroßunternehmenCloud Computing: Hindernisse und Chancen für Großunternehmen
Cloud Computing: Hindernisse und Chancen für Großunternehmen
 
Peer-based Enterprise Document Workflow
Peer-based EnterpriseDocument WorkflowPeer-based EnterpriseDocument Workflow
Peer-based Enterprise Document Workflow
 
A Critical Analysis of Microsoft Data Protection Solutions
A Critical Analysis of Microsoft Data Protection SolutionsA Critical Analysis of Microsoft Data Protection Solutions
A Critical Analysis of Microsoft Data Protection Solutions
 
IPv6 for the Enterprise
IPv6 for the EnterpriseIPv6 for the Enterprise
IPv6 for the Enterprise
 
Windows Mobile Enterprise Security Best Practices
Windows Mobile Enterprise Security Best PracticesWindows Mobile Enterprise Security Best Practices
Windows Mobile Enterprise Security Best Practices
 
System Center Mobile Device Manager
System Center Mobile Device ManagerSystem Center Mobile Device Manager
System Center Mobile Device Manager
 
Mobile Device Management
Mobile Device ManagementMobile Device Management
Mobile Device Management
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 

Kürzlich hochgeladen

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 

Kürzlich hochgeladen (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 

Cloud Deployment Strategy: Challenges to consider

  • 1. 24/01/2013 1John Rhoton – 2013 Cloud Deployment Strategy Challenges to Consider John Rhoton Cloud Weekend, Giza, Egypt 11-12 May 2013
  • 2. 24/01/2013 2John Rhoton – 2013 Agenda • Business/Financial • Risk & Security • Technical • Process
  • 3. 24/01/2013 3John Rhoton – 2013 Business Case • Sunk Cost – Irrelevant? – Political, Marginal Costs • Return on Investment – Calculated with NPV / IRR – Payback period • Cash Flow effects • Revenue impact of flexibility and speed
  • 4. 24/01/2013 4John Rhoton – 2013 Cost Tradeoffs Initial Ongoing Private Cloud Capital Expenditures Licensing Operations Public Cloud Migration Subscription Hardware, Software, Deployment, Administration, Support
  • 5. 24/01/2013 5John Rhoton – 2013 Hybrid Usage Profile Base Base Usage Peak Spikes
  • 6. 24/01/2013 6John Rhoton – 2013 Risk Analysis • Governance • Risk • Security • Compliance
  • 7. 24/01/2013 7John Rhoton – 2013 Risk Mitigation Options Data Leakage Data Loss Service Loss Service Impairment Damaged Reputation Lock-In Provider Assessment Contract Negotiation Encryption Additional Backup Multi-sourcing Standardization
  • 8. 24/01/2013 8John Rhoton – 2013 • Personal observation • Personal experience • Insight Employees Contractors Partners Suppliers • Public verification • Contracts • Compensation Experts Legal Counsel Auditors Public Scrutiny Segmentation Access controls Encryption Access controls Shifting Trust Adapt Corporate Culture
  • 9. 24/01/2013 9John Rhoton – 2013 Confidentiality • Data Governance – Data loss prevention • Compartmentalization • Encryption Classify data, Select and Combine Options
  • 10. 24/01/2013 10John Rhoton – 2013 Compliance Enforce Logical Barriers Global Internet versus National Laws
  • 11. 24/01/2013 11John Rhoton – 2013 Business Continuity Eliminate High Probability Low Probability High ImpactLow Impact Resilience Risk Treatment
  • 12. 24/01/2013 12John Rhoton – 2013 Technical Considerations • Technologies • Integration • Availability • Automation
  • 13. 24/01/2013 13John Rhoton – 2013 Lock-in vs. Cloud Stacks • Servers • Storage • Network • Hypervisor • Operating System • Orchestration Proprietary Hardware Proprietary Software Open Source Consortium Driven Balance ease with flexibility
  • 14. 24/01/2013 14John Rhoton – 2013 Integration • Connectivity • Application Compatibility • Authorization and Isolation Internal External Users Functions Resources
  • 15. 24/01/2013 15John Rhoton – 2013 Identity Federation Identity challenges • Password proliferation • Weak authentication • Support costs • User productivity Implement Identity Standards (SAML, SCIM)
  • 16. 24/01/2013 16John Rhoton – 2013 Redundancy • Dimensions – Physical – Geographical – Technological – Organizational • Horizontal Scalability • ACID (Atomic Consistent Isolated Durable) => BASE (Basic Availability, Soft-state, Eventual consistency) Architect for scale
  • 17. 24/01/2013 17John Rhoton – 2013 Automation • Efficiency, Quality, Traceability, Compliance • Scripting • Workflow • Sizing • Best practice configuration • Puppet, Chef, Capistrano • OpenStack Heat, Juju Charms
  • 18. 24/01/2013 18John Rhoton – 2013 Process • Culture – Job Security Career Enhancement – Political Power shift • Skills – Virtualization, Networking, Storage – Linux, Python, Ruby, OpenStack, OpenFlow • Procedures – Workflow definition • Project Management – Rollout pace, schedule – Continuous integration, continuous deployment
  • 19. 24/01/2013 19John Rhoton – 2013 Emotional vs Factual • Fear, Uncertainty and Doubt • Increased Effort – Evaluation – Negotiation – Integration – Implementation • Reduce CAPEX benefits Plan early, think objectively
  • 20. 24/01/2013 20John Rhoton – 2013 Summary • Build the business case around agility • New trust model is inevitable • Security challenges real but addressable • Integration the biggest technical hurdle • Don’t forget the human element!
  • 21. 24/01/2013 21John Rhoton – 2013 Contact Details Follow me: @johnrhoton Connect: linkedin/in/rhoton Read the books: amazon.com/author/rhoton Download the presentation: slideshare.net/rhoton

Hinweis der Redaktion

  1. ACID: Atomic Consistent Isolated DurableBASE: Basic Availability, Soft-state,Eventual consistency