SlideShare une entreprise Scribd logo
1  sur  33
SunGard Enterprise Cloud Services

Indu Kodukula
EVP, CTO
Satish Hemachandran
Director Product Management

                                    www.sungardas.com
Production + DR are 80+% of Enterprise Cloud Priorities


                                              What services are you planning enhance
                                                      with Cloud computing?




 *IDG Research, 2010

                       © 2010 SunGard Availability Services LP. - All Rights Reserved - www.sungardas.com   2
The Cloud Promise:




        COST POSITIVE
  FLEXIBILITY POSITIVE

                       RISK ??

             © 2010 SunGard Availability Services LP. - All Rights Reserved - www.sungardas.com   3
And Reality Bears Out There is Risk…




   Jan 2011: Online                                                               Feb 2011: Online Email
   Image service provider                                                         service provider loses
   mistakenly deletes                                                             mails from150K user
   4000 pictures from a                                                           accounts during a
   paid user’s account                                                            weekend outage



                © 2010 SunGard Availability Services LP. - All Rights Reserved - www.sungardas.com         4
Traditional Enterprise IT Risks




       Changing        Unplanned disaster                                                      Breach of security
   Market/Business        scenarios can                                                        and policy controls
    conditions might   significantly disrupt                                                       can lead to
  need you to expand    regular business                                                          business and
  or contract capacity     operations                                                           regulatory issues


                 © 2010 SunGard Availability Services LP. - All Rights Reserved - www.sungardas.com                  5
Cloud Risks are (Mostly) Old Wine in New Bottles




     Security                                Compliance                                              Connectivity




   Manageability                              Availability

                © 2010 SunGard Availability Services LP. - All Rights Reserved - www.sungardas.com                  6
Security & Compliance:
  Platform & Policies



    © 2010 SunGard Availability Services LP. - All Rights Reserved - www.sungardas.com   7
Most Regulations Share a Common Concern:
Implementation and Enforcement of Policies

               Track all access to
                  network and                               Secure Remote Access




                                                                                                   Governance, Periodic platform and
                cardholder data
                                                            Role Based Access Control




                                                                                                     policy audits, and certification
               Documentation of                             Separation of Management,
              Actions & Activities                              Control and Customer Planes
             with 6 yr data retention
                                                            Availability and Fault Isolation
             Org. wide security for                         Issue Prevention, Detection,
             IT systems to support
                ops. and assets
                                                                Remediation
                                                            Log Management

             Protect cu. Information                        Security and Auditing
              Identify, and resolve
               security violations
                                                            Business Continuity &
                                                                Disaster Recovery
                Financial and                               Data retention/archival
             Accounting functions.
             Segregation of Duties



              © 2010 SunGard Availability Services LP. - All Rights Reserved - www.sungardas.com                                        8
Layered Security with Common Base of Controls

            Presentation Models                                        Identity Management Policy, Auditing &
               and Platforms                                           Compliance
            Application Interfaces
                                                                       Abstract layer
                 Applications                                          hardening, monitoring, separation
                     Meta                                              patch/release management and policy
   Data                             Content
                     Data                                              controls

          Integration and Middleware
                                                                         Host hardening, encryption, separation
                                                                         and segregation (Network, Host and
          Abstract           Connectivity
                                                                         Storage)
          Layer                                                          Performance & security monitoring
                                                                         Patch and release management
           Hardware Infrastructure
                                                                           Logical, Physical and
            Facilities Infrastructure                                      Environmental Security

     Security Detection, Response, Containment, Eradication and Forensics

                            © 2010 SunGard Availability Services LP. - All Rights Reserved - www.sungardas.com    9
Creating a Secure Cloud Foundation for Enterprise


        •Role based access control                                                                • ITIL v3 based services
        •Infrastructure security; Shared                                                          • Security assessments and
         vs. dedicated                                                                              recommendations
        •Activity                                                                                 • Periodic Penetration tests
         Logging, monitoring, and
         detection                                                                                • Strict change control


                                              Platform                         IT Best
                                              Security                         Practice




                                               Data-                           Compliance
                                               center                          Mgmt.
                                              Security
       • Biometric access control                                                                • Data center Standards
       • No access to shared                                                                       certifications (SAS 70)
         infrastructure                                                                          • Regulatory compliance
       • 24/7 Security Service;                                                                    (PCI, HIPAA)
         CCTV for Interior/Exterior                                                              • Audit Assistance
         monitoring



                        © 2010 SunGard Availability Services LP. - All Rights Reserved - www.sungardas.com                       10
Connectivity:
Cloud, Non-Cloud/Hybrid



    © 2010 SunGard Availability Services LP. - All Rights Reserved - www.sungardas.com   11
Choice of Connectivity to Meet Every Business Need


     CUSTOMERS’ CUSTOMER                   CUSTOMER WAN/REMOTE                               CUSTOMER WAN/DATACENTER


        Public Internet                  Client VPN                          Site to Site VPN              MPLS




                                                                                               DEDICATED
                            INTERNET
                                                                                                CIRCUIT




                                              SUNGARD ENTERPRISE CLOUD
                      © 2010 SunGard Availability Services LP. - All Rights Reserved - www.sungardas.com               12
Hybrid Cloud Use Case

   Leverage existing/legacy
   infrastructure e.g.
   Mainframes                                                         IaaS Cloud 1                                    Colocation

   Integrate with other
   external virtual clouds for
   burst (flex) capacity
   Host Applications requiring                                                                      Internal Cloud
   physical/dedicated and
   virtual systems (e.g.
   Oracle)
   Integrate with third-party
   hosted applications e.g.                                           IaaS Cloud 2                                    PaaS Cloud
   ASP, PaaS, SaaS,
                © 2010 SunGard Availability Services LP. - All Rights Reserved - www.sungardas.com                                 13
Building a Hybrid Cloud


       CUSTOMERS’ CUSTOMER                    CUSTOMER WAN/REMOTE                               CUSTOMER WAN/DATACENTER


           Public Internet                  Client VPN                          Site to Site VPN                  MPLS




   Cross Connect


                      SUNGARD                                                                                 DEDICATED
                      NETWORK                                     INTERNET
                                                                                                               CIRCUIT




    SUNGARD
   DATACENTER
                                                 SUNGARD ENTERPRISE CLOUD
                         © 2010 SunGard Availability Services LP. - All Rights Reserved - www.sungardas.com               14
Manageability:
Monitoring and Remote Hands



      © 2010 SunGard Availability Services LP. - All Rights Reserved - www.sungardas.com   15
The Cloud Management Challenge

 Customers are still the same
  • Complex architectures with point-to-point
    connections
  • Legacy platform support dependencies (Win2k,
    Mainframes)
  • Non-(x86)-cloud integrations (Mainframes, Unix)
 Enterprise needs from Cloud Providers
  • A full portfolio of management services (OS,
    Database, Security)
  • Migration assistance and custom policies
  • Integration of Cloud & non-Cloud
  • Auditability of the platform and datacenter
  • SLA’s for the platform & service
  • Periodic reporting and guidance

                 © 2010 SunGard Availability Services LP. - All Rights Reserved - www.sungardas.com   16
Cloud Extends Traditional Management
(but with different tools)
                                         Customer Applications



                           Service and Operations Management

   Availability     Event        Patching                                          Security               Backup
                    Monitoring   Problem                                           Management             Service
   Provisioning     Service Desk Resolution                                        Config Mgmt            Restoration



                                     Infrastructure Management

   Monitoring                            Capacity Planning                                   Performance
   CPU Config               Memory Config                          Storage Config                      Network Config



                                                   Infrastructure

                  © 2010 SunGard Availability Services LP. - All Rights Reserved - www.sungardas.com                    17
ITIL Based Support Process



                                                                     Service Desk                                           Customer
                                                                                                Service Delivery
                                                                                                                            Verification
            Request for Change

                                                                                                Request Fulfillment

            Incident                                                                                                        Resolution
                                                                                               Change Management
 Customer                                                           Front End
                                                                    Ticketing
            Request for Information                                  System
            Service Reporting
            Performance Reporting                  Portal                                             Service Operation
            Availability Reporting
            Configuration Reporting                                                                                Tier 1
            KPI and SLA Reporting                                     CMDB                                         Tier 2
                                                                                                                   Tier 3



                                                                                                         Problem
                                                                                                        Management
                                                                   Configuration
                                                                   Management

                                                            Aggregation Engine
                                                                Correlation                           Event
                                                                 Validation                           Management




                            © 2010 SunGard Availability Services LP. - All Rights Reserved - www.sungardas.com                             18
Enterprise Cloud: Platform + Automation + Process + People
                                  Intrusion Detection System – Incident Handling Process Flow

          System Sensor

                            Monitors and                                                                                          System Users
                              Identifies
                            Security Event




                                                                                                                                                      Information to users
                                                                                                                                                       Provide additional
                                             Non-Critical
                                             and Critical
                            Receives event                    Event Ticket
          SOC




                              information,                    and Report
                             analyzes and
                                 notifies


                                                                                                        Closed Ticket
       Information




                                                               NOC and                               If no response
         Security




                                     Critical Event Notice
           NOC




                                                              Information                               Is needed
                                                             Security Office


                                                                                                                           Planned                Technical
                                                                                                   Analyze
                                                                               Triage               Event
                                                                                                                          Technical               Response
                                                                                                                          Response                Execution
          IT Organization




                            Proactive     Other
                            Indicators sensors and               IT
                                        monitoring            Operations
                                         systems
          Management




                                                                                               If Management or
                                                                                            Legal response is needed     Management               Closed
                                                                                                                          Response                Event




                                                                                                                                  Provide guidance
        External
        Experts




                                                                                                                                  and/or assistance
                                                                                                                                  (Forensics, legal
                                                                                                                                    console, etc.)




                                                                Technical Focus
                                          © 2010 SunGard Availability Services LP. - All Rights Reserved - www.sungardas.com                                                 19
Availability:
Scalability & Recovery



   © 2010 SunGard Availability Services LP. - All Rights Reserved - www.sungardas.com   20
Scalability

   Customer workloads vary
    in their infrastructure
    demands. Typically:
     • Memory Utilization
     • Storage I/O
     • Network Throughput
   Infrastructure needs to
    distribute/scale load
     • Without affecting user
       sessions
     • without affecting other
       applications
     • Maintaining application
       interdependencies

                  © 2010 SunGard Availability Services LP. - All Rights Reserved - www.sungardas.com   21
Cloud enables Application Availability

                                                       Decreasing Availability
                                                        Always                       Available                   Available
                                                        Available                    in hours                    in days
                       Cloud Apps
        More Complex




                       Virtualized Apps
                       Simple Apps
                       Complex Apps
                       Legacy Apps


        But… autoscaling is still unattainable for many
        Replication technologies still offer the most cost
         effective solution for the Enterprise
        Cloud makes Availability more affordable for Complex
         Apps: Database and app/web server
        Cloud done right can also reduce you RTO

                            © 2010 SunGard Availability Services LP. - All Rights Reserved - www.sungardas.com               22
Integrated Recovery: Achieving Continuous Uptime



                                                                           Cloud is the production environment
                   SunGard
                   Enterprise Cloud                                         Backup and Restore of VMs
                                                                            Active-active deployment mode
                                                                            Site-to-site recovery across multiple
                        VMs on Cloud-site 1
    Customer                                                                 data-centers
   Applications
     & Data                                                                 Recovery of entire application with its
                                                                             dependencies (VMs and non-
                                                                             virtualized assets)
                                                                           Cloud is your target recovery platform
                          VMs on Cloud-site 2
                                                                            Web-based backup/Replication of data
                                                                             to Cloud based on industry leading
      Customer                                                               technologies
     Data-center
                                                                            VM cloning and startup
                                                                            Mapping of cloud-based data to
                                                                             recovered instances


                      © 2010 SunGard Availability Services LP. - All Rights Reserved - www.sungardas.com               23
SunGard Enterprise Cloud Services


  © 2010 SunGard Availability Services LP. - All Rights Reserved - www.sungardas.com   24   24
SunGard Enterprise Cloud Services Vision



     Deliver Managed and Recovery Services

         for enterprise-grade applications

   that ensure availability of business operations




            © 2010 SunGard Availability Services LP. - All Rights Reserved - www.sungardas.com   25
Fully Managed Infrastructure-as-a-Service
     SunGard manages all necessary compute, network, storage and security resources,
                      offering a complete, cost-effective solution

                               Virtualized environment providing hypervisor and OS system services
 Compute                       Customize your virtual machine configurations to specific requirements
                               SunGard Software Licensing Services options available

                               Broad networking options including multiple VLAN support, robust
 Network
                                internet connectivity, MPLS and dedicated circuit options

 Storage                       Managed storage with integrated backup and restore

                               Managed firewall and virtual private network connectivity
 Security
                               Platform built to support compliance requirements

 Rapid                         Ability to store custom VM templates in your own private image library
 Provisioning                  Virtualized instances deployed within minutes

 Management                    24/7/365 management and monitoring of your virtualized infrastructure
 & Monitoring                  99.95% availability Service Level Agreement (per month / per VM)

 Portal &                      Customer management portal to view and request compute resources
 Reporting                      on demand

                     © 2010 SunGard Availability Services LP. - All Rights Reserved - www.sungardas.com   26
Cloud Services for the Enterprise

  Multi-tenant enterprise cloud and dedicated private cloud

  All services fully managed by SunGard’s IT experts

  Infrastructure architected for compliance and security

  All solutions built on enterprise-grade infrastructure

  Designed for production workloads

  Predictable contract pricing with flexibility for rapid response
   to the changing IT demands

  Customized solutions designed to enterprise needs

  Comprehensive consulting services provide complete Cloud
   Readiness Assessments and Migration services



                     © 2010 SunGard Availability Services LP. - All Rights Reserved - www.sungardas.com   27
Customer Deployment – Pharmaceutical Supplier
                                                                                Customer Solution Requirements
  Customer Overview                                                             • Wanted to leverage the cloud technology to
                                                                                  implement new SAP application
  • Customer supports client fulfillment for
    health services customers (e.g., including                                  • Needed a solution that would scale quickly
    pharmacies and health care providers)                                         and efficiently (4x scale)
  • Small business less than generating                                         • Required an enterprise level solution that was
    revenue located in Western US                                                 fully managed by the service provider due to
                                                                                  lack of internal expertise
  • New SAP implementation
                                                                                • Looking for a secure and compliant
                                                                                  infrastructure
  Customer Buying Scenario
  • Leverage new technology platform to
    improve time to market, management                                          Why SunGard Enterprise Cloud Services?
    and scalability                                                             • Commitment to service delivery and
  • Implementing new SAP application and                                          process discipline
    the customer had no prediction                                              • SLA and commitment to reliability
    regarding growth                                                            • SunGard's emphasis on compliance &
                                                                                  process
                                                                                • Consultative relationship with the
                                                                                  customer
                        © 2010 SunGard Availability Services LP. - All Rights Reserved - www.sungardas.com                  28
Customer Deployment – Software Provider

                                                                                  Customer Solution Requirements
  Customer Overview
  • Customer is a provider of enterprise-class                                    • Looking to increase sales, market size and
    electronic content archiving software.                                          penetration
    Services include E-                                                           • End-customers want to reduce CapEx and
    Discovery, compliance, records                                                  shift to OpEx budget
    management and storage optimization
  • Assists large firms in mitigating risk and
    managing their digital assets from a single
    point of control and unified set of policies
                                                                                  Why SunGard Enterprise Cloud Services?
  Customer Buying Scenario                                                        • Industry expertise
                                                                                  • Data center security
  • Appeal to current customers and prospects to
    sell archiving software via new delivery                                      • Reputation with financial & large enterprise
    method, avoiding s/w and h/w CapEx                                              companies
  • Elastic SaaS Model to support rapid build-out                                 • SunGard's emphasis on compliance &
    of infrastructure for on demand E-discovery                                     process
    or growth for any size firm
                                                                                  • Future investments in cloud services


                          © 2010 SunGard Availability Services LP. - All Rights Reserved - www.sungardas.com                     29
SunGard Internal Use of Cloud

   Focused on using Cloud for new
    projects in 2011
   Using cloud for:
    • Development
    • Test/QA
    • Production
   Currently implementing projects for
    •   Enterprise Mobility (IaaS)
    •   Single Sign-On (IaaS)
    •   Store Front/Billing (SaaS)
    •   Ticketing (SaaS)
    •   Email (SaaS)
    •   CRM (SaaS)

                   © 2010 SunGard Availability Services LP. - All Rights Reserved - www.sungardas.com   30
Pragmatic Path to Enterprise Cloud
               Cloud Readiness Assessment



                                          Cloud Design & Architecture


                                                                       Cloud Implementation & Transition


                                                                                                           Steady State Production
 Phase I

           Phase II
                             Phase III
                                                                  Phase IV



                      © 2010 SunGard Availability Services LP. - All Rights Reserved - www.sungardas.com                             31
Key Solution Benefits - Summary


                                  Highly secure and resilient platform built on IT security best
Secure enterprise-                 practices and meeting numerous compliance standards
   grade cloud                    Fully managed infrastructure reduces the IT administrative burden
                                   and allows redirection of staff to strategic business initiatives



                                  Rapid provisioning and ability to scale up and down to support new
Improved IT agility                business ventures and peak periods where infrastructure may only be
                                   needed for a short time
   & scalability
                                  Flexible contract pricing to respond to your IT requirements



                                  Shift from CapEx to OpEx model so you can pay as you go and only
Financial flexibility              pay for what you need while experiencing faster payback of investment

 & increased ROI                  Reduce labor costs via elimination of time spent on day to day
                                   infrastructure management




                  © 2010 SunGard Availability Services LP. - All Rights Reserved - www.sungardas.com     32
© 2010 SunGard Availability Services LP. - All Rights Reserved - www.sungardas.com   33

Contenu connexe

Tendances

Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...
Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...
Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...DFLABS SRL
 
Information Security By Design
Information Security By DesignInformation Security By Design
Information Security By DesignNalneesh Gaur
 
Improving Your Information Security Program
Improving Your Information Security ProgramImproving Your Information Security Program
Improving Your Information Security ProgramSeccuris Inc.
 
ccmigration_09186a008033a3b4
ccmigration_09186a008033a3b4ccmigration_09186a008033a3b4
ccmigration_09186a008033a3b4guest66dc5f
 
Cat6500 Praesentation
Cat6500 PraesentationCat6500 Praesentation
Cat6500 PraesentationSophan_Pheng
 
IDBI Intech - Information security consulting
IDBI Intech - Information security consultingIDBI Intech - Information security consulting
IDBI Intech - Information security consultingIDBI Intech
 
Bridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical DataBridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical DataIBM Security
 
Guardium value proposition for fss pn 12 02-10
Guardium value proposition for fss pn 12 02-10Guardium value proposition for fss pn 12 02-10
Guardium value proposition for fss pn 12 02-10Avirot Mitamura
 
Cso oow12-summit-sonny-sing hv4
Cso oow12-summit-sonny-sing hv4Cso oow12-summit-sonny-sing hv4
Cso oow12-summit-sonny-sing hv4OracleIDM
 
Auditing in the Cloud
Auditing in the CloudAuditing in the Cloud
Auditing in the Cloudtcarrucan
 
Secure on demand from cdg
Secure on demand from cdgSecure on demand from cdg
Secure on demand from cdgShekar N.
 
Symantec Enterprise Mobility - Mobile World Congress February 2012
Symantec Enterprise Mobility - Mobile World Congress February 2012Symantec Enterprise Mobility - Mobile World Congress February 2012
Symantec Enterprise Mobility - Mobile World Congress February 2012Symantec
 
Internet Security Threat Report (ISTR) Vol. 16
Internet Security Threat Report (ISTR) Vol. 16Internet Security Threat Report (ISTR) Vol. 16
Internet Security Threat Report (ISTR) Vol. 16Symantec APJ
 
A better waytosecureapps-finalv1
A better waytosecureapps-finalv1A better waytosecureapps-finalv1
A better waytosecureapps-finalv1OracleIDM
 
Data Integrity Protection
Data Integrity ProtectionData Integrity Protection
Data Integrity Protectionproitsolutions
 

Tendances (19)

Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...
Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...
Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...
 
Information Security By Design
Information Security By DesignInformation Security By Design
Information Security By Design
 
Improving Your Information Security Program
Improving Your Information Security ProgramImproving Your Information Security Program
Improving Your Information Security Program
 
ccmigration_09186a008033a3b4
ccmigration_09186a008033a3b4ccmigration_09186a008033a3b4
ccmigration_09186a008033a3b4
 
Cat6500 Praesentation
Cat6500 PraesentationCat6500 Praesentation
Cat6500 Praesentation
 
IDBI Intech - Information security consulting
IDBI Intech - Information security consultingIDBI Intech - Information security consulting
IDBI Intech - Information security consulting
 
Bridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical DataBridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical Data
 
VSD Infotech
VSD InfotechVSD Infotech
VSD Infotech
 
Guardium value proposition for fss pn 12 02-10
Guardium value proposition for fss pn 12 02-10Guardium value proposition for fss pn 12 02-10
Guardium value proposition for fss pn 12 02-10
 
Security Intelligence
Security IntelligenceSecurity Intelligence
Security Intelligence
 
Cso oow12-summit-sonny-sing hv4
Cso oow12-summit-sonny-sing hv4Cso oow12-summit-sonny-sing hv4
Cso oow12-summit-sonny-sing hv4
 
Stone gate ips
Stone gate ipsStone gate ips
Stone gate ips
 
Auditing in the Cloud
Auditing in the CloudAuditing in the Cloud
Auditing in the Cloud
 
Secure on demand from cdg
Secure on demand from cdgSecure on demand from cdg
Secure on demand from cdg
 
Securityinsideout
SecurityinsideoutSecurityinsideout
Securityinsideout
 
Symantec Enterprise Mobility - Mobile World Congress February 2012
Symantec Enterprise Mobility - Mobile World Congress February 2012Symantec Enterprise Mobility - Mobile World Congress February 2012
Symantec Enterprise Mobility - Mobile World Congress February 2012
 
Internet Security Threat Report (ISTR) Vol. 16
Internet Security Threat Report (ISTR) Vol. 16Internet Security Threat Report (ISTR) Vol. 16
Internet Security Threat Report (ISTR) Vol. 16
 
A better waytosecureapps-finalv1
A better waytosecureapps-finalv1A better waytosecureapps-finalv1
A better waytosecureapps-finalv1
 
Data Integrity Protection
Data Integrity ProtectionData Integrity Protection
Data Integrity Protection
 

Similaire à SunGard Enterprise Cloud Services @ Cloud Connect 2011

Security Patterns How To Make Security Arch Easy To Consume
Security Patterns   How To Make Security Arch Easy To ConsumeSecurity Patterns   How To Make Security Arch Easy To Consume
Security Patterns How To Make Security Arch Easy To ConsumeJeff Johnson
 
Enterprise Strategy for Cloud Security
Enterprise Strategy for Cloud SecurityEnterprise Strategy for Cloud Security
Enterprise Strategy for Cloud SecurityBob Rhubart
 
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...Chad Lawler
 
Symantec Enterprise Mobility Vision May 2012
Symantec Enterprise Mobility Vision May 2012Symantec Enterprise Mobility Vision May 2012
Symantec Enterprise Mobility Vision May 2012Symantec
 
Qradar ibm partner_enablement_220212_final
Qradar ibm partner_enablement_220212_finalQradar ibm partner_enablement_220212_final
Qradar ibm partner_enablement_220212_finalArrow ECS UK
 
Sun2 oracle avea's identity management platform transformation
Sun2 oracle   avea's identity management platform transformationSun2 oracle   avea's identity management platform transformation
Sun2 oracle avea's identity management platform transformationOracleIDM
 
Enterprise Security Architecture: From access to audit
Enterprise Security Architecture: From access to auditEnterprise Security Architecture: From access to audit
Enterprise Security Architecture: From access to auditBob Rhubart
 
SAPience.be User Day 13 - Keneos - Be mobile, stay safe go for mobility with SAP
SAPience.be User Day 13 - Keneos - Be mobile, stay safe go for mobility with SAPSAPience.be User Day 13 - Keneos - Be mobile, stay safe go for mobility with SAP
SAPience.be User Day 13 - Keneos - Be mobile, stay safe go for mobility with SAPKeneos
 
Best Practices for Cloud Security
Best Practices for Cloud SecurityBest Practices for Cloud Security
Best Practices for Cloud SecurityIT@Intel
 
Cisco tec chris young - security intelligence operations
Cisco tec   chris young - security intelligence operationsCisco tec   chris young - security intelligence operations
Cisco tec chris young - security intelligence operationsCisco Public Relations
 
En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj - PCTY 2011
En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj - PCTY 2011En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj - PCTY 2011
En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj - PCTY 2011IBM Sverige
 
Ca partner day - qualità servizi - roma 1 di 2
Ca partner day - qualità servizi - roma 1 di 2Ca partner day - qualità servizi - roma 1 di 2
Ca partner day - qualità servizi - roma 1 di 2CA Technologies Italia
 
Integrating Information Protection Into Data Architecture & SDLC
Integrating Information Protection Into Data Architecture & SDLCIntegrating Information Protection Into Data Architecture & SDLC
Integrating Information Protection Into Data Architecture & SDLCDATAVERSITY
 
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNetAWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNetAmazon Web Services
 
IBM Infosphere Guardium - Database Security
IBM Infosphere Guardium - Database SecurityIBM Infosphere Guardium - Database Security
IBM Infosphere Guardium - Database Securityebuc
 
Implications Of The Cloud
Implications Of The CloudImplications Of The Cloud
Implications Of The CloudMatt Deacon
 
The Cloud according to VMware
The Cloud according to VMwareThe Cloud according to VMware
The Cloud according to VMwareOpSource
 

Similaire à SunGard Enterprise Cloud Services @ Cloud Connect 2011 (20)

Cloud Auditing
Cloud AuditingCloud Auditing
Cloud Auditing
 
Security Patterns How To Make Security Arch Easy To Consume
Security Patterns   How To Make Security Arch Easy To ConsumeSecurity Patterns   How To Make Security Arch Easy To Consume
Security Patterns How To Make Security Arch Easy To Consume
 
Enterprise Strategy for Cloud Security
Enterprise Strategy for Cloud SecurityEnterprise Strategy for Cloud Security
Enterprise Strategy for Cloud Security
 
Cloud Security
Cloud Security Cloud Security
Cloud Security
 
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
 
Symantec Enterprise Mobility Vision May 2012
Symantec Enterprise Mobility Vision May 2012Symantec Enterprise Mobility Vision May 2012
Symantec Enterprise Mobility Vision May 2012
 
Qradar ibm partner_enablement_220212_final
Qradar ibm partner_enablement_220212_finalQradar ibm partner_enablement_220212_final
Qradar ibm partner_enablement_220212_final
 
Sun2 oracle avea's identity management platform transformation
Sun2 oracle   avea's identity management platform transformationSun2 oracle   avea's identity management platform transformation
Sun2 oracle avea's identity management platform transformation
 
Sw keynote
Sw keynoteSw keynote
Sw keynote
 
Enterprise Security Architecture: From access to audit
Enterprise Security Architecture: From access to auditEnterprise Security Architecture: From access to audit
Enterprise Security Architecture: From access to audit
 
SAPience.be User Day 13 - Keneos - Be mobile, stay safe go for mobility with SAP
SAPience.be User Day 13 - Keneos - Be mobile, stay safe go for mobility with SAPSAPience.be User Day 13 - Keneos - Be mobile, stay safe go for mobility with SAP
SAPience.be User Day 13 - Keneos - Be mobile, stay safe go for mobility with SAP
 
Best Practices for Cloud Security
Best Practices for Cloud SecurityBest Practices for Cloud Security
Best Practices for Cloud Security
 
Cisco tec chris young - security intelligence operations
Cisco tec   chris young - security intelligence operationsCisco tec   chris young - security intelligence operations
Cisco tec chris young - security intelligence operations
 
En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj - PCTY 2011
En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj - PCTY 2011En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj - PCTY 2011
En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj - PCTY 2011
 
Ca partner day - qualità servizi - roma 1 di 2
Ca partner day - qualità servizi - roma 1 di 2Ca partner day - qualità servizi - roma 1 di 2
Ca partner day - qualità servizi - roma 1 di 2
 
Integrating Information Protection Into Data Architecture & SDLC
Integrating Information Protection Into Data Architecture & SDLCIntegrating Information Protection Into Data Architecture & SDLC
Integrating Information Protection Into Data Architecture & SDLC
 
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNetAWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
 
IBM Infosphere Guardium - Database Security
IBM Infosphere Guardium - Database SecurityIBM Infosphere Guardium - Database Security
IBM Infosphere Guardium - Database Security
 
Implications Of The Cloud
Implications Of The CloudImplications Of The Cloud
Implications Of The Cloud
 
The Cloud according to VMware
The Cloud according to VMwareThe Cloud according to VMware
The Cloud according to VMware
 

SunGard Enterprise Cloud Services @ Cloud Connect 2011

  • 1. SunGard Enterprise Cloud Services Indu Kodukula EVP, CTO Satish Hemachandran Director Product Management www.sungardas.com
  • 2. Production + DR are 80+% of Enterprise Cloud Priorities What services are you planning enhance with Cloud computing? *IDG Research, 2010 © 2010 SunGard Availability Services LP. - All Rights Reserved - www.sungardas.com 2
  • 3. The Cloud Promise: COST POSITIVE FLEXIBILITY POSITIVE RISK ?? © 2010 SunGard Availability Services LP. - All Rights Reserved - www.sungardas.com 3
  • 4. And Reality Bears Out There is Risk… Jan 2011: Online Feb 2011: Online Email Image service provider service provider loses mistakenly deletes mails from150K user 4000 pictures from a accounts during a paid user’s account weekend outage © 2010 SunGard Availability Services LP. - All Rights Reserved - www.sungardas.com 4
  • 5. Traditional Enterprise IT Risks Changing Unplanned disaster Breach of security Market/Business scenarios can and policy controls conditions might significantly disrupt can lead to need you to expand regular business business and or contract capacity operations regulatory issues © 2010 SunGard Availability Services LP. - All Rights Reserved - www.sungardas.com 5
  • 6. Cloud Risks are (Mostly) Old Wine in New Bottles Security Compliance Connectivity Manageability Availability © 2010 SunGard Availability Services LP. - All Rights Reserved - www.sungardas.com 6
  • 7. Security & Compliance: Platform & Policies © 2010 SunGard Availability Services LP. - All Rights Reserved - www.sungardas.com 7
  • 8. Most Regulations Share a Common Concern: Implementation and Enforcement of Policies Track all access to network and  Secure Remote Access Governance, Periodic platform and cardholder data  Role Based Access Control policy audits, and certification Documentation of  Separation of Management, Actions & Activities Control and Customer Planes with 6 yr data retention  Availability and Fault Isolation Org. wide security for  Issue Prevention, Detection, IT systems to support ops. and assets Remediation  Log Management Protect cu. Information  Security and Auditing Identify, and resolve security violations  Business Continuity & Disaster Recovery Financial and  Data retention/archival Accounting functions. Segregation of Duties © 2010 SunGard Availability Services LP. - All Rights Reserved - www.sungardas.com 8
  • 9. Layered Security with Common Base of Controls Presentation Models Identity Management Policy, Auditing & and Platforms Compliance Application Interfaces Abstract layer Applications hardening, monitoring, separation Meta patch/release management and policy Data Content Data controls Integration and Middleware Host hardening, encryption, separation and segregation (Network, Host and Abstract Connectivity Storage) Layer Performance & security monitoring Patch and release management Hardware Infrastructure Logical, Physical and Facilities Infrastructure Environmental Security Security Detection, Response, Containment, Eradication and Forensics © 2010 SunGard Availability Services LP. - All Rights Reserved - www.sungardas.com 9
  • 10. Creating a Secure Cloud Foundation for Enterprise •Role based access control • ITIL v3 based services •Infrastructure security; Shared • Security assessments and vs. dedicated recommendations •Activity • Periodic Penetration tests Logging, monitoring, and detection • Strict change control Platform IT Best Security Practice Data- Compliance center Mgmt. Security • Biometric access control • Data center Standards • No access to shared certifications (SAS 70) infrastructure • Regulatory compliance • 24/7 Security Service; (PCI, HIPAA) CCTV for Interior/Exterior • Audit Assistance monitoring © 2010 SunGard Availability Services LP. - All Rights Reserved - www.sungardas.com 10
  • 11. Connectivity: Cloud, Non-Cloud/Hybrid © 2010 SunGard Availability Services LP. - All Rights Reserved - www.sungardas.com 11
  • 12. Choice of Connectivity to Meet Every Business Need CUSTOMERS’ CUSTOMER CUSTOMER WAN/REMOTE CUSTOMER WAN/DATACENTER Public Internet Client VPN Site to Site VPN MPLS DEDICATED INTERNET CIRCUIT SUNGARD ENTERPRISE CLOUD © 2010 SunGard Availability Services LP. - All Rights Reserved - www.sungardas.com 12
  • 13. Hybrid Cloud Use Case  Leverage existing/legacy infrastructure e.g. Mainframes IaaS Cloud 1 Colocation  Integrate with other external virtual clouds for burst (flex) capacity  Host Applications requiring Internal Cloud physical/dedicated and virtual systems (e.g. Oracle)  Integrate with third-party hosted applications e.g. IaaS Cloud 2 PaaS Cloud ASP, PaaS, SaaS, © 2010 SunGard Availability Services LP. - All Rights Reserved - www.sungardas.com 13
  • 14. Building a Hybrid Cloud CUSTOMERS’ CUSTOMER CUSTOMER WAN/REMOTE CUSTOMER WAN/DATACENTER Public Internet Client VPN Site to Site VPN MPLS Cross Connect SUNGARD DEDICATED NETWORK INTERNET CIRCUIT SUNGARD DATACENTER SUNGARD ENTERPRISE CLOUD © 2010 SunGard Availability Services LP. - All Rights Reserved - www.sungardas.com 14
  • 15. Manageability: Monitoring and Remote Hands © 2010 SunGard Availability Services LP. - All Rights Reserved - www.sungardas.com 15
  • 16. The Cloud Management Challenge  Customers are still the same • Complex architectures with point-to-point connections • Legacy platform support dependencies (Win2k, Mainframes) • Non-(x86)-cloud integrations (Mainframes, Unix)  Enterprise needs from Cloud Providers • A full portfolio of management services (OS, Database, Security) • Migration assistance and custom policies • Integration of Cloud & non-Cloud • Auditability of the platform and datacenter • SLA’s for the platform & service • Periodic reporting and guidance © 2010 SunGard Availability Services LP. - All Rights Reserved - www.sungardas.com 16
  • 17. Cloud Extends Traditional Management (but with different tools) Customer Applications Service and Operations Management Availability Event Patching Security Backup Monitoring Problem Management Service Provisioning Service Desk Resolution Config Mgmt Restoration Infrastructure Management Monitoring Capacity Planning Performance CPU Config Memory Config Storage Config Network Config Infrastructure © 2010 SunGard Availability Services LP. - All Rights Reserved - www.sungardas.com 17
  • 18. ITIL Based Support Process Service Desk Customer Service Delivery Verification Request for Change Request Fulfillment Incident Resolution Change Management Customer Front End Ticketing Request for Information System Service Reporting Performance Reporting Portal Service Operation Availability Reporting Configuration Reporting Tier 1 KPI and SLA Reporting CMDB Tier 2 Tier 3 Problem Management Configuration Management Aggregation Engine Correlation Event Validation Management © 2010 SunGard Availability Services LP. - All Rights Reserved - www.sungardas.com 18
  • 19. Enterprise Cloud: Platform + Automation + Process + People Intrusion Detection System – Incident Handling Process Flow System Sensor Monitors and System Users Identifies Security Event Information to users Provide additional Non-Critical and Critical Receives event Event Ticket SOC information, and Report analyzes and notifies Closed Ticket Information NOC and If no response Security Critical Event Notice NOC Information Is needed Security Office Planned Technical Analyze Triage Event Technical Response Response Execution IT Organization Proactive Other Indicators sensors and IT monitoring Operations systems Management If Management or Legal response is needed Management Closed Response Event Provide guidance External Experts and/or assistance (Forensics, legal console, etc.) Technical Focus © 2010 SunGard Availability Services LP. - All Rights Reserved - www.sungardas.com 19
  • 20. Availability: Scalability & Recovery © 2010 SunGard Availability Services LP. - All Rights Reserved - www.sungardas.com 20
  • 21. Scalability  Customer workloads vary in their infrastructure demands. Typically: • Memory Utilization • Storage I/O • Network Throughput  Infrastructure needs to distribute/scale load • Without affecting user sessions • without affecting other applications • Maintaining application interdependencies © 2010 SunGard Availability Services LP. - All Rights Reserved - www.sungardas.com 21
  • 22. Cloud enables Application Availability Decreasing Availability Always Available Available Available in hours in days Cloud Apps More Complex Virtualized Apps Simple Apps Complex Apps Legacy Apps  But… autoscaling is still unattainable for many  Replication technologies still offer the most cost effective solution for the Enterprise  Cloud makes Availability more affordable for Complex Apps: Database and app/web server  Cloud done right can also reduce you RTO © 2010 SunGard Availability Services LP. - All Rights Reserved - www.sungardas.com 22
  • 23. Integrated Recovery: Achieving Continuous Uptime Cloud is the production environment SunGard Enterprise Cloud  Backup and Restore of VMs  Active-active deployment mode  Site-to-site recovery across multiple VMs on Cloud-site 1 Customer data-centers Applications & Data  Recovery of entire application with its dependencies (VMs and non- virtualized assets) Cloud is your target recovery platform VMs on Cloud-site 2  Web-based backup/Replication of data to Cloud based on industry leading Customer technologies Data-center  VM cloning and startup  Mapping of cloud-based data to recovered instances © 2010 SunGard Availability Services LP. - All Rights Reserved - www.sungardas.com 23
  • 24. SunGard Enterprise Cloud Services © 2010 SunGard Availability Services LP. - All Rights Reserved - www.sungardas.com 24 24
  • 25. SunGard Enterprise Cloud Services Vision Deliver Managed and Recovery Services for enterprise-grade applications that ensure availability of business operations © 2010 SunGard Availability Services LP. - All Rights Reserved - www.sungardas.com 25
  • 26. Fully Managed Infrastructure-as-a-Service SunGard manages all necessary compute, network, storage and security resources, offering a complete, cost-effective solution  Virtualized environment providing hypervisor and OS system services Compute  Customize your virtual machine configurations to specific requirements  SunGard Software Licensing Services options available  Broad networking options including multiple VLAN support, robust Network internet connectivity, MPLS and dedicated circuit options Storage  Managed storage with integrated backup and restore  Managed firewall and virtual private network connectivity Security  Platform built to support compliance requirements Rapid  Ability to store custom VM templates in your own private image library Provisioning  Virtualized instances deployed within minutes Management  24/7/365 management and monitoring of your virtualized infrastructure & Monitoring  99.95% availability Service Level Agreement (per month / per VM) Portal &  Customer management portal to view and request compute resources Reporting on demand © 2010 SunGard Availability Services LP. - All Rights Reserved - www.sungardas.com 26
  • 27. Cloud Services for the Enterprise  Multi-tenant enterprise cloud and dedicated private cloud  All services fully managed by SunGard’s IT experts  Infrastructure architected for compliance and security  All solutions built on enterprise-grade infrastructure  Designed for production workloads  Predictable contract pricing with flexibility for rapid response to the changing IT demands  Customized solutions designed to enterprise needs  Comprehensive consulting services provide complete Cloud Readiness Assessments and Migration services © 2010 SunGard Availability Services LP. - All Rights Reserved - www.sungardas.com 27
  • 28. Customer Deployment – Pharmaceutical Supplier Customer Solution Requirements Customer Overview • Wanted to leverage the cloud technology to implement new SAP application • Customer supports client fulfillment for health services customers (e.g., including • Needed a solution that would scale quickly pharmacies and health care providers) and efficiently (4x scale) • Small business less than generating • Required an enterprise level solution that was revenue located in Western US fully managed by the service provider due to lack of internal expertise • New SAP implementation • Looking for a secure and compliant infrastructure Customer Buying Scenario • Leverage new technology platform to improve time to market, management Why SunGard Enterprise Cloud Services? and scalability • Commitment to service delivery and • Implementing new SAP application and process discipline the customer had no prediction • SLA and commitment to reliability regarding growth • SunGard's emphasis on compliance & process • Consultative relationship with the customer © 2010 SunGard Availability Services LP. - All Rights Reserved - www.sungardas.com 28
  • 29. Customer Deployment – Software Provider Customer Solution Requirements Customer Overview • Customer is a provider of enterprise-class • Looking to increase sales, market size and electronic content archiving software. penetration Services include E- • End-customers want to reduce CapEx and Discovery, compliance, records shift to OpEx budget management and storage optimization • Assists large firms in mitigating risk and managing their digital assets from a single point of control and unified set of policies Why SunGard Enterprise Cloud Services? Customer Buying Scenario • Industry expertise • Data center security • Appeal to current customers and prospects to sell archiving software via new delivery • Reputation with financial & large enterprise method, avoiding s/w and h/w CapEx companies • Elastic SaaS Model to support rapid build-out • SunGard's emphasis on compliance & of infrastructure for on demand E-discovery process or growth for any size firm • Future investments in cloud services © 2010 SunGard Availability Services LP. - All Rights Reserved - www.sungardas.com 29
  • 30. SunGard Internal Use of Cloud  Focused on using Cloud for new projects in 2011  Using cloud for: • Development • Test/QA • Production  Currently implementing projects for • Enterprise Mobility (IaaS) • Single Sign-On (IaaS) • Store Front/Billing (SaaS) • Ticketing (SaaS) • Email (SaaS) • CRM (SaaS) © 2010 SunGard Availability Services LP. - All Rights Reserved - www.sungardas.com 30
  • 31. Pragmatic Path to Enterprise Cloud Cloud Readiness Assessment Cloud Design & Architecture Cloud Implementation & Transition Steady State Production Phase I Phase II Phase III Phase IV © 2010 SunGard Availability Services LP. - All Rights Reserved - www.sungardas.com 31
  • 32. Key Solution Benefits - Summary  Highly secure and resilient platform built on IT security best Secure enterprise- practices and meeting numerous compliance standards grade cloud  Fully managed infrastructure reduces the IT administrative burden and allows redirection of staff to strategic business initiatives  Rapid provisioning and ability to scale up and down to support new Improved IT agility business ventures and peak periods where infrastructure may only be needed for a short time & scalability  Flexible contract pricing to respond to your IT requirements  Shift from CapEx to OpEx model so you can pay as you go and only Financial flexibility pay for what you need while experiencing faster payback of investment & increased ROI  Reduce labor costs via elimination of time spent on day to day infrastructure management © 2010 SunGard Availability Services LP. - All Rights Reserved - www.sungardas.com 32
  • 33. © 2010 SunGard Availability Services LP. - All Rights Reserved - www.sungardas.com 33

Notes de l'éditeur

  1. These risks are already addressed within an existing IT infrastructure. Hence, the Cloud will also need to mitigate these risks.
  2. Multi-tenancy & Virtualization – Is Virtualization secure and will one customers be truly not overlap with another customer on the same system? Customers are often concerned that regulatory reasons might need them to stay on a dedicated system – however there is a risk/reward tradeoff to deal with.Data Governance – Customers are concerned that they don’t have direct visibility into where their data will reside or who will interact with it and how. Hence. this is ultimately about information lifecycle managementApplication Integration – As part of the Cloud adoption, Customers are not willing to rewrite their entire application – While the Cloud is ideal for new projects that can be contained within the Cloud, in the short term they are looking to leverage as much of their existing assets as possible (including hardware and software) to protect their current investment. This requires a hybrid approach that leverages the Cloud for part of the overall application – requiring integration with the customers datacenter or their colo footprintMonitoring – Customers who ran their own cloud are used to keeping track of the various thresholds of their environment for managing the health of their applications proactively. In the Cloud, customers are concerned about being in the dark about the health of their virtual assets but also the health of the overall platform – they want to know whether there is someone truly taking care of the platform as a wholeOracle - the last major issue on every CXOs mind is whether they can get Oracle to run on the virtual environment or how their apps can still run leveraging the cloud and not breaking any contract definitionsManageability – none of the previous issues can truly be addressed without any clear form of SLAs – its these SLAs that actually serve to reduce the risk for the customer. SLAs however come in varying sizes and shapes and require a deeper understanding from the customer
  3. Cloud will enable the development moving forward of our LOBs. It will allow for the delivery of a range of availability technologies by developing services that deliver productivity and expertise to IT production services.