Technology Trends Today

Slides:



Advertisements
Similar presentations
Tivoli Storage Manager v. 4.1 Executive Presentation.
Advertisements

O.R. HOLDING INC PRESENTING IT LEGENT 4SERVICE SECURED CLOUD TECHNOLOGY SECURED CLOUD TECHNOLOGY.
© Copyright IBM Corporation 2009 IBM Global Business Services Innovation driving strategic choices for P2P Saul Berman Global & Americas Leader, IBM Strategy.
1 Video Cloud for Business Enterprises Geng Lin CTO, IBM Alliance Cisco Systems P2P & Cloud Media Summit Los Angeles, CA May 6, 2010 Geng Lin CTO, IBM.
Mid-market server campaign – thru partner presentation: Slide for presenter only: do not show Speaker: Partner Title of Presentation: Giving you the power.
Innovation the cloud for modern business
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 Taiwan ITQ.
Cloud Computing for Business By Matthew Bulat M.Eng.Tech MCSE MCDBA
Delivering value through Services. INFOBHAN Systems, Services & Training Qatars leading IT Services company.
IT Infrastructure and Emerging Technologies
Common ISO/RTO Architecture ISO/RTO Information Technology Committee Walter A. Pfuntner, Jr, PhD, PE Chairman, ITC Architecture Working Group
© 2008 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Better business outcomes equal better.
Cloud Computing for Education & Cloud Learning Minjuan Wang to BT Research Center (Abu Dhabi) Educational Technology San Diego State University
Without Limits Keynote: The Latest Trends in Cloud Computing Solutions for the Audio/Video (A/V) Ecosystem Bill Kallman, CEO Scayl.
Customer Presentation ThinkServer EMC VSPEX Private Cloud Solutions.
1 Cloud Computing with Amazon and Oracle Lewis Cunningham TUSC, Sr Datawarehouse Consultant
IT INFRASTRUCTURE AND EMERGING TECHNOLOGIES
UNS Energy Corp / Tucson Electric Power Case Study: Virtualization: Lower IT Costs and Improve Operations Speaker: Chris Rima, Supervisor, Infrastructure.
Cisco and NetApp Confidential. Distributed under non-disclosure only. Name Date FlexPod Entry-level Solution FlexPod Value, Sized Right for Smaller Workloads.
A Brief Introduction to the History of Computing - 4 ANU Faculty of Engineering and IT Department of Computer Science COMP1200 Perspectives on Computing.
CLOUD COMPUTING Assoc.Prof.Dr.Aykan CANDEMİR E-Marketing Melis ÖZÜN Fatih SİVASLIOĞLU Cansu SARAÇLAR
IT Infrastructure and Platforms
Live for today as if it is your last day but plan for tomorrow as if it will last forever!
1© Copyright 2014 EMC Corporation. All rights reserved. CUSTOMER REFERENCES.
Cloud Computing: Pay-per-Use for On-Demand Scalability Avner Algom The Israeli Association of Grid Technologies (IGT( Cloud.
1© Copyright 2010 EMC Corporation. All rights reserved.
Does "The Cloud" Fit Into Your Organization? Tom Horan Meridian IT Inc. VP, Strategic Markets (847)
Management Information Systems Islamia University of Bahawalpur Delivered by: Tasawar Javed.
11 Establishing the Framework for Datacenter of the Future Richard Curran Director Product Marketing, Intel EMEA.
Module 2: Information Technology Infrastructure
Computer History.
Application Architecture
Technology Moves: See How Technology is Changing the Way We Move.
IT Infrastructure Last Update Copyright Kenneth M. Chipps Ph.D
The Continuing Story of the Computer Age: Past, Present, and Future
CLOUD COMPUTING For Beginners.
© 2009 VMware Inc. All rights reserved Confidential VMware: An Overview Pat Gelsinger, CEO.
1 © Copyright 2012 EMC Corporation. All rights reserved. EMC VSPEX Simple. Efficient. Flexible.
Ben Hsu and Sangwon Kim.  Buy at current price (~28 dollars)  Sell at ~34 dollars.
Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Data Center Solutions Marketing Data Center Business Advantage Customer Proof.
CIS 100a TEKnology – High Tech Exploration More on High Tech Careers.
The Orange Coast College Experience Bill Saichek Professor, Computer Science and Information Systems Convergence College Network Annual Meeting July 8,
Presentation To. Mission Think Dynamics is in the business of automating the management of data center resources thereby enabling senior IT executives.
The Information Value Chain A New Perspective on the Knowledge Society Daniel Stanton 17 February 2007 Seminar sponsored by the Pinnacle Group and National.
Tom O’Reilly, CTO - TEEAM, VCE DIGITAL BANKING SUCCESS THROUGH THE EMC FEDERATION.
Technology Trends for IT Manager/Directors CJ Venkataraman CIO Intellectual Ventures.
1© Copyright 2010 EMC Corporation. All rights reserved. Joel Schwartz Senior Vice President & General Manager EMC Storage Platforms Group October 1, 2010.
The Dynamics of the NEW Software Industry: What it Means for Software Companies Ken Wasch, President, SIIA.
Cloud Computing 12/7/ Traditional Computing Hardware – Computers with CPU (hardware) – Storage (hard disk or other materials) – Software packages.
System Infrastructure Application Infrastructure Application and Information Process Business/Enterprise Influenced Consumer/Web Influenced.
Information Systems Week 5 IT Infrastructure & Emerging Technologies.
 Understand the concept and scope of IT Infrastructure  Understand with various components and technologies that make up IT Infrastructure  Learn the.
Who is CDW? Our Customers The power of technology CDW.
1© Copyright 2013 EMC Corporation. All rights reserved. Accelerate Virtualized SAP Performance Callaway Golf optimizes performance and provisioning Challenge.
Amanda Escobedo Jeanetta Harris Leena Asmar Lucille Reddic Shannon Carroll Research Group Six: Cloud Computing RACKSPACE.
Towards the Cloud! Ian Osborne Director, Digital Systems KTN, Intellect.
VKSF 423 System Administration III Service Deployment and the Virtualization of Services.
Platform as a Service (PaaS) Market to Global Analysis and Forecasts by Deployment Model, Solution Types, and End-user Verticals No of Pages: 150.
IOT Critical Impact on DC Design
Tivoli Storage Manager 4.1
Informatics Services Corporation
Global Software Defined Data Center (SDDC) market, Size, Share, Market Intelligence, Company Profiles, Market Trends, Strategy, Analysis, Forecast
Mario Mazzola Sr. Vice President New Business Ventures
Distributed Storage Infrastructure: The Big Picture
Mario Mazzola Sr. Vice President New Business Ventures
Session I Cloud Introduction Session I
Presentation transcript:

Technology Trends Today Nicklous Combs, EMC Federal Chief Technology Officer

Megatrends: Move to the Next Generation Data Center Deployment of ubiquitous IP networks Expansion of networked consumer electronics Explosion of digital content Movement to unified communications Advancement of highly scalable, low cost compute Convergence of networks, compute and storage Recovery of the economy yields technology refresh Desirability of a IT utility model Appetite for new applications

Responsibility of organizations Becoming more regulated Information Today 1.8 Zb Information Growth Mostly unstructured 95% Mostly unmanaged 85% Information Responsibility of organizations 85% Becoming more regulated ▲

Waves of Information Technology Mainframe Mini PC / Micro- processor Networked/ Distributed Computing Next Cloud Mid-’60s -’70s 70s-80s Late 70s-’90s Mid-’90s-Today IBM Burroughs Univac NCR Control Data Honeywell NEC … DEC IBM DG Wang Prime Apollo … Microsoft Intel Apple IBM Sun HP Compaq … Cisco Netscape Google Microsoft Oracle EMC Salesforce.com . . .

>70% <30% Mission Execution IT Agility What Cloud Computing Needs to Solve: IT Infrastructure is Too Hard to Manage 5% Infrastructure Investment Where IT Energy is Spent Today IT Budgets: >70% just maintaining the status quo 23% Application Investment <30% 42% Infrastructure Maintenance goes to innovation and competitive advantage 30% Application Maintenance Mission Execution DEPENDS ON IT Agility Source: VMware Fortune 100 Customers

CLOUD COMPUTING Forces driving change Perceived barriers to a new approach Security Compliance issues: Transparency, citizenship, data location regulations Interoperability: Vendor lock in, Integration, Application rewrites CLOUD COMPUTING Market Forces The Economy Administration priority Anytime, anywhere IT Tectonic shift in technology Business Forces Information Growth Defer and avoid costs Fix the IT bottleneck Map supply and demand more effectively De-capitalize IT

Build the Bridge to the Private Cloud where customers are The Private Cloud Today’s IT World THE Journey Increasing complexity, inflexibility, and cost of traditional IT environments of fully automated and virtualized data centers Unprecedented levels of efficiency, control, choice

What’s the Promise of Cloud Computing? Customers Will Realize Unparalleled Savings 1 Dynamic pools of virtualized resources It's built differently Highly automated low-touch and zero-touch models 2 It's operated differently 3 Convenient consumption, sometimes pay-as-you-go It's consumed differently Data Center Cloud Computing

Converged Infrastructure: A New Way to Deliver IT Solution Packages Rapid deployment model of virtualized infrastructure Preintegrated and validated solutions reduce total cost of ownership (TCO) Service level driven through predictable performance and operational characteristics Improved compliance/security and reduced risk Rich APIs Resource Management Security Network Compute Virtualization Storage Accelerate Time to Results – Reduce TCO

Impact: Converged Infrastructure Customer Example Server Provision Cycle Cut from 46 days to 35 minutes Server Costs Reduced by 40% Hardware Deployment Time Decreased by 40% Overall Hardware Utilization From less than 10% to more than 40%

Policy-driven Infrastructure enables Private Cloud IT Requirements # VMs Disk Capacity (MB) Synchronous Replication Fault Tolerant Security Policy Etc… Business Requirements Application Operating System # Users SLA (Gold, Silver, Bronze) Storage Template Compute Template Fabric Template Application Template Define Translate Map Deploy Enables business requirements to translate to IT resources Business owner inputs application, uptime, number of users, business continuity, backup, and security requirements Resources are rapidly assigned according to user specification reducing time to application availability Enable choice and flexibility, retain control

Security Architecture for the Cloud

Multi-INT Fusion in an Agile Operation Center Scenario Overview Single-INT Application Media WorkSpace TaskSpace Case Management Collaboration Content Security Media Delivery Services FTP Business Process Management SOAP MPP Data Warehouse Queries (Big Data) Populate Virtual Case File with supporting content Transform Images Extract Metadata Assemble Content .KML Private Cloud Media Transformation Services Content Store Integration Services

Journey to the Cloud 85% 95% Broad adoption of service model 50% Virtualized, proven solutions 30% Cloud operating system and model Virtual data center-centric systems management 15% Private cloud-enabled infrastructure

Architect for the Future

Conclusion 1 Cloud evolution has launched Adoption will accelerate and last 24-36 months Converged infrastructure is the foundation Innovation will be led by market leaders Cost matters but the need is speed 2 3 4 5

Security challenges in today’s virtualized and cloud environments

The Challenge Cyber security is major national and economic security issue Protecting assets and managing access to IT resources has never been more important Cloud computing is expanding the attack surface and breaking traditional network boundaries. Do our current security architectures meet the threats?

Security: A Core Component of the Cloud Trusted Control Reliable Secure Flexible Dynamic On-demand Efficient Private Cloud Federation Cloud Computing Security Virtualization Virtualized Data Center Information 19 Internal cloud External cloud

Provide Cybercrime Intelligence Based on Feeds from the Dark Cloud Stolen Files Repository Hacker Forum Discussion Botnet Herders Malware Infection Point Trojan Mothership Credentials Database eFraudNetwork USER 1 USER 2 USER 3 USER 4 Corp 5 Corp 6 Corp 7 GSA First level of defense: Cybercrime intelligence Second level of defense: Strong authentication Third level of defense: Information rights management

Traditional Computing: The Network Security Perimeter is Aligned with Policy Boundaries Attackers Physical Infrastructure Physical Infrastructure APP OS APP OS APP OS APP OS Infor- mation Identity Infor- mation Identity Enterprise #1 Enterprise #2

Adoption of Cloud Computing is Expanding the Enterprise Attack Surface Internal Employees Business Analytics Enterprise Applications Replica Backup Disk Tape SharePoint eRoom, etc. File Server Arrays Production Database Privileged Users Contractors Partner Entry Points Channels Customers Partners Remote Employees VPN Apps/DB Storage FS/CMS Network Endpoint IP Sent to non trusted user Stolen IP App, DB or Encryption Key Hack Fraud Stolen Credentials Endpoint theft/loss Network Leak Email-IM-HTTP-FTP-etc. Privileged User Breach Inappropriate Access Tapes lost or stolen Data Leak Via USB/Print Public Infrastructure Access Hack Unintentional Distribution (Semi) Trusted User Misuse Discarded disk exploited

Private Clouds demand a Policy-aware “Trusted Zone” for Data, VMs, and Identities Attackers Information Information APP OS Virtual Infrastructure APP OS APP OS Virtual Infrastructure APP OS Identity Identity Physical Infrastructure Physical Infrastructure Physical Infrastructure Tenant #1 Cloud Provider Tenant #2

Trusted Zones Key Capabilities Isolate infrastructure from Malware, Trojans and cybercriminals Anti-malware Federate identities with public clouds Cybercrime intelligence Identity federation APP OS Tenant #2 Strong authentication Virtual Infrastructure Control and isolate VM in the virtual infrastructure Virtual network security Isolate information among tenants APP OS Tenant #1 Data loss prevention Virtual Infrastructure Segregate and control user access Isolate information from cloud providers’ employees Physical Infrastructure Cloud Provider Access Mgmt Encryption & key mgmt Tokenization Physical Infrastructure Security Info. & Event Mgmt Enable end to end view of security events and compliance across infrastructures GRC

Virtualization Enables More Effective Security by Pushing Enforcement Down the Stack vApp and VM layer APP OS APP OS Today most security is enforced by the OS and application stack making it ineffective, inconsistent and complex Pushing information security enforcement in the virtualization and cloud infrastructure ensures consistency, simplifies security management and enables customers to surpass the levels of security possible in today’s physical infrastructures Virtual and cloud infrastructure Physical infrastructure

Monitoring and Managing Corporate Policy Compliance Across virtual, physical, internal and external infrastructures Tenant #2 APP OS Virtual Infrastructure Physical Infrastructure Cloud Provider Tenant #1 Virtual infrastructure management GRC Compliance Dashboard: End-to-end compliance reporting End-to-end security event management Security configuration and vulnerability management for physical and virtual infrastructures

Securing the Cloud Securing the virtual datacenter Federation between internal and external clouds Security-aware cloud infrastructures Securing the private cloud Securing the public cloud Strong authentication Access management Identity protection Cybercrime monitoring Delivering products as cloud services Adaptive Authentication, FraudNetwork Delivered by MSSP or other cloud providers

Thank you!