Aucune remarque pour cette diapositive
The economic downturn hasn’t reduced the pressures being placed on IT. Here we’re showing how IT is ensconced in the business, delivering value to the business and on behalf of the business out to customers and suppliers. IT is doing this from a variety of infrastructure platforms including mainframe, distributed, virtual and cloud. IT organizations are being asked to cut their budgets by 10%, 20% or more. Yet, b usiness requests for IT services are unabated. It’s even more critical now to optimize the engagement process between IT and business executives to ensure the right projects (and only the right projects) are funded. CIOs are being challenged to deliver the same or better ‘customer experience’ in spite of the budget reductions—and as a result are looking for new ways to further increase productivity and reduce costs without impacting service. Change is constant. IT must be agile to respond to changing market conditions or business requirements. And IT must have controlled processes for managing IT changes to avoid negatively impacting the business. And of course, all of this must be managed in a context that is both secure and compliant with industry or federal regulations.
VPN Auth centralisée sur l’annuaire interne
Virtualization makes the problem worse. The administrator not only have leverage over the physical host, but also all of the virtual sessions running on it. Given the leverage the virtualization platform has on the stability of the entire data center and on integrity of the data it manages, it must be viewed as critical infrastructure. As a result, the virtualization platform is subject to tight regulatory requirements. Organizations must track the interaction that each user has with the virtualization platform and within each of the VMs it hosts. Native audit capabilities provided by operating systems are too coarse to be effective and are vulnerable to tampering. Access to the hosting operating system must be monitored and audited to prove controls have ensured its integrity. Similarly, within each VM, access gained to each guest operating system is subject to the same regulatory compliance requirements.
The Cloud Academy is a CA initiative started in EMEA (Holland) and consists a series of interactive sessions in the local CA offices, leveraging the current high interest in cloud computing. The first 5 sessions are: Security First (about federation etc.), Cloud building blocks (virtualization/automation), Warranting Cloud transactions and performance, The changing role of IT management (impact on Portfolio and Service Management), and two parallel sessions: “Management Software as a Service” and “Mainframe goes Cloud”. Cloud Academy sessions are given by CA’s topic area specialists (our local security/MF/virtualization TSO guys/girls with 10/20 years of experience under their belt). They will each discuss a specific aspect of cloud computing: in local language, using examples from literature, the press (recent articles), case studies, recent events (example Vivek Kundra’s 19 Sept. announcement of http://apps.gov ) etc. etc. The sessions are not about CA products, but examples will of course feature CA solutions. The content will evolve further as the area is maturing. Each session starts with briefly exploring “Cloud Values” such as shorter time to market, lower hardware cost, Opex versus Capex, variabilisation of cost, higher scalability etc. This “Cloud Value” content can also be used for “Executive Awareness Sessions”. The program can be extended with “Building your first internal cloud - the workshop?. The program may someday also become a webcast, but the main value for attendees today is to sit in a room with 5 to 10 “colleagues” from other organizations, who are also thinking about this.