Rik Ferguson

Addressing the new security challenges posed by virtualisation & cloud computing,[object Object],Rik Ferguson •  Senior Security Advisor ,[object Object]
A working definition of Cloud Computing,[object Object],Cloud computing is a pay-per-use model for enabling available, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.,[object Object],National Institute of Standards & Technology (NIST), USA,[object Object],5 Key Cloud Characteristics,[object Object],[object Object]
	Ubiquitous network access
	Location independent resource pooling
	Rapid elasticity
	Pay per use,[object Object]
Security: the #1 Cloud Challenge,[object Object]
Who Has Control?,[object Object],Servers,[object Object],Virtualization & ,[object Object],Private Cloud,[object Object],Public Cloud,[object Object],PaaS,[object Object],Public Cloud,[object Object],IaaS,[object Object],Public Cloud,[object Object],SaaS,[object Object],End-User (Enterprise),[object Object],Service Provider,[object Object]
Amazon Web Services™Customer Agreement,[object Object],7.2. Security. We strive to keep Your Content secure, but cannot guarantee that we will be successful at doing so, given the nature of the Internet. Accordingly, without limitation to Section 4.3 above and Section 11.5 below, you acknowledge that you bear sole responsibility for adequate security, protection and backup of Your Content and Applications. We strongly encourage you, where available and appropriate, to (a) use encryption technology to protect Your Content from unauthorized access, (b) routinely archive Your Content, and (c) keep your Applications or any software that you use or run with our Services current with the latest security patches or updates. We will have no liability to you for any unauthorized access or use, corruption, deletion, destruction or loss of any of Your Content or Applications.,[object Object],http://aws.amazon.com/agreement/#7  (3 March 2010),[object Object],The cloud customer has responsibility for security and needs to plan for protection. ,[object Object]
The Evolving Datacentre,[object Object],Stage 1,[object Object],Consolidation,[object Object],Stage 2,[object Object],Expansion & Desktop,[object Object],Stage 3,[object Object],Private > Public Cloud,[object Object],Cost-efficiency ,[object Object],+ Quality of Service ,[object Object],+ Business Agility ,[object Object],Servers,[object Object],85%,[object Object],70%,[object Object],30%,[object Object],Virtualization Adoption Rate,[object Object],Desktops,[object Object],15%,[object Object],Datacentres are evolving to drive down costs and increase business flexibility,[object Object]
Security Challenges in the Cloud ,[object Object],Stage 1,[object Object],Consolidation,[object Object],Stage 2,[object Object],Expansion & Desktop,[object Object],Stage 3,[object Object],Private > Public Cloud,[object Object],Cost-efficiency ,[object Object],+ Quality of Service ,[object Object],+ Business Agility ,[object Object],Servers,[object Object],85%,[object Object],70%,[object Object],30%,[object Object],Virtualization Adoption Rate,[object Object],Desktops,[object Object],Inter-VM attacksInstant-ON gapsMixed Trust Level VMsResource ContentionMaintaining ComplianceService Provider (in)SecurityMulti-tenancy,[object Object],15%,[object Object],Inter-VM attacksInstant-ON gapsMixed Trust Level VMsResource ContentionMaintaining Compliance,[object Object],Inter-VM attacksInstant-ON gaps,[object Object]
The Enterprise Cloud Conundrum:The Cloud is Fantastic, but…,[object Object],How can I maintain control of my data in the cloud? ,[object Object],What if I want to change cloud vendors? How can I verify my data is “destroyed” when terminating a service provider?,[object Object],What happens if my service provider goes out of business?  ,[object Object],How can I comply with security best practices, internal governance and compliance rules in the cloud? ,[object Object],How can I guarantee only I have access to my data? ,[object Object]
Challenges for Public Cloud,[object Object],Multiple customers on one physical server – potential for attacks via the hypervisor,[object Object],Shared network inside the firewall,[object Object],Internet,[object Object],Shared Storage,[object Object],Shared Firewall,[object Object],Shared firewall – Lowest common denominator – less fine grained control,[object Object],Easily copied machine images – who else has your server?,[object Object],Shared storage – is customer segmentation secure against attack?,[object Object],Virtual Servers,[object Object]
Data Security Challenges in the Cloud,[object Object],Encryption rarely used:,[object Object], - Who can see your information?,[object Object],Storage volumes and servers are mobile: ,[object Object], - Where is your data?  Has it moved?,[object Object],Rogue servers might access data: ,[object Object], - Who is attaching to your storage?,[object Object],Audit and alerting modules lacking:,[object Object], - What happened when you weren’t looking?  ,[object Object],Encryption keys tied to vendor:,[object Object],- Are you locked into a single security solution?   ,[object Object],  Who has access to your keys?  ,[object Object],Storage volumes contain residual data:,[object Object], - Are your storage devices recycled securely?,[object Object],Name:  John Doe,[object Object],SSN: 425-79-0053,[object Object],Visa #: 4456-8732…,[object Object],Name:  John Doe,[object Object],SSN: 425-79-0053,[object Object],Visa #: 4456-8732…,[object Object],11,[object Object],Classification 2/7/2011,[object Object]
Physical layer,[object Object],Could retool,[object Object],New Shared Storage systems,[object Object],Designed to segment multiple hostile tenants,[object Object],Dynamic firewall policies,[object Object],Different and flexible for every customer,[object Object],Strongly segmented networks,[object Object],Hardened switches that can’t be hacked from the inside,[object Object]
The security arms race,[object Object],Existing infrastructure hits EOL too early,[object Object],Every customer wants to inspect and audit,[object Object],They have to for their compliance,[object Object],Always someone demanding the latest security feature,[object Object],More frequent swap out cycle,[object Object],Lower ROI,[object Object],Need permission from every customer to make a change,[object Object],Your kit has become part of their security audit,[object Object],You end up stuck in an impossible position where you make less money and still can’t keep the customers happy,[object Object]
Logical Layer,[object Object],Customer has responsibility for their data,[object Object],Give them a solution to help them deliver on that,[object Object],Let them segment their data,[object Object],Away from other customers (may be the bad guy),[object Object],Away from you (don’t inherit a liability),[object Object],Look for something that runs on top of any hardware,[object Object],You run your own swap out programmes without interference,[object Object]
Challenge of Securing Data,[object Object],Datacenter,[object Object],Public Cloud,[object Object],Perimeter,[object Object],Company 1,[object Object],Company 2,[object Object],Company 3,[object Object],Company 4,[object Object],Company 5,[object Object],Company n,[object Object],App 1,[object Object],App 2,[object Object],App 3,[object Object],…,[object Object],App 2,[object Object],App 1,[object Object],App 3,[object Object],App 4,[object Object],App 5,[object Object],App n,[object Object],Hypervisor,[object Object],Hypervisor,[object Object],Strong perimeter security,[object Object],No shared CPU,[object Object],No shared network,[object Object],No shared storage,[object Object],Weak perimeter security,[object Object],Shared CPU,[object Object],Shared network,[object Object],Shared storage,[object Object],Traditional “outside-in” approach is inadequate in an “inside-out” cloud world full of strangers,[object Object]
Protection at the OS levelServer & application protection for:,[object Object],PHYSICAL,[object Object],VIRTUAL & PRIVATE CLOUD,[object Object],PUBLIC CLOUD ,[object Object],Deep Packet Inspection,[object Object],Firewall,[object Object],Integrity,[object Object],Monitoring,[object Object],Log,[object Object],Inspection,[object Object],Malware Protection,[object Object],IDS / IPS,[object Object],Web App.,[object Object],Protection,[object Object],Application,[object Object],Control,[object Object]
Protection at the Data LevelEncryption designed to secure the cloud,[object Object],Cloud Service Provider,[object Object],Enterprise Datacenter or SaaS Offering,[object Object],VM,[object Object],CorporateApp,[object Object],Hypervisor,[object Object],Enterprise Key,[object Object],SharedStorage,[object Object],Cloud SecurityConsole,[object Object],MyEnterprise Data,[object Object]
1 sur 20

Recommandé

Cloud summit demystifying cloud security par
Cloud summit   demystifying cloud securityCloud summit   demystifying cloud security
Cloud summit demystifying cloud securityDavid De Vos
148 vues29 diapositives
Security As A Service In Cloud(SECaaS) par
Security As A Service In Cloud(SECaaS)Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)أحلام انصارى
11.4K vues14 diapositives
Securing Servers in Public and Hybrid Clouds par
Securing Servers in Public and Hybrid CloudsSecuring Servers in Public and Hybrid Clouds
Securing Servers in Public and Hybrid CloudsRightScale
940 vues44 diapositives
The Top Cloud Security Issues par
The Top Cloud Security IssuesThe Top Cloud Security Issues
The Top Cloud Security IssuesHTS Hosting
151 vues20 diapositives
Secaa s cat_10_network_security_implementation_guidance par
Secaa s cat_10_network_security_implementation_guidanceSecaa s cat_10_network_security_implementation_guidance
Secaa s cat_10_network_security_implementation_guidancedrewz lin
1K vues40 diapositives
Virtualization security for the cloud computing technology par
Virtualization security for the cloud computing technologyVirtualization security for the cloud computing technology
Virtualization security for the cloud computing technologyDeep Ranjan Deb
1.7K vues23 diapositives

Contenu connexe

Tendances

Security as a Service Model for Cloud Environment par
Security as   a Service Model   for   Cloud   EnvironmentSecurity as   a Service Model   for   Cloud   Environment
Security as a Service Model for Cloud EnvironmentKaashivInfoTech Company
947 vues6 diapositives
Cloud Security: Limitations of Cloud Security Groups and Flow Logs par
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsPriyanka Aash
1.8K vues49 diapositives
Can Cloud Solutions Transform Network Security par
Can Cloud Solutions Transform Network SecurityCan Cloud Solutions Transform Network Security
Can Cloud Solutions Transform Network SecurityEC-Council
97 vues13 diapositives
Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform... par
Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform...Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform...
Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform...Priyanka Aash
367 vues86 diapositives
Cloud Native Security: New Approach for a New Reality par
Cloud Native Security: New Approach for a New RealityCloud Native Security: New Approach for a New Reality
Cloud Native Security: New Approach for a New RealityCarlos Andrés García
221 vues30 diapositives
Security in the Cloud: Tips on How to Protect Your Data par
Security in the Cloud: Tips on How to Protect Your DataSecurity in the Cloud: Tips on How to Protect Your Data
Security in the Cloud: Tips on How to Protect Your DataProcore Technologies
3.6K vues15 diapositives

Tendances(19)

Cloud Security: Limitations of Cloud Security Groups and Flow Logs par Priyanka Aash
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Priyanka Aash1.8K vues
Can Cloud Solutions Transform Network Security par EC-Council
Can Cloud Solutions Transform Network SecurityCan Cloud Solutions Transform Network Security
Can Cloud Solutions Transform Network Security
EC-Council97 vues
Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform... par Priyanka Aash
Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform...Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform...
Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform...
Priyanka Aash367 vues
Security in the Cloud: Tips on How to Protect Your Data par Procore Technologies
Security in the Cloud: Tips on How to Protect Your DataSecurity in the Cloud: Tips on How to Protect Your Data
Security in the Cloud: Tips on How to Protect Your Data
Security automation in virtual and cloud environments v2 par rpark31
Security automation in virtual and cloud environments v2Security automation in virtual and cloud environments v2
Security automation in virtual and cloud environments v2
rpark31538 vues
Msft cloud architecture_security_commonattacks par Akram Qureshi
Msft cloud architecture_security_commonattacksMsft cloud architecture_security_commonattacks
Msft cloud architecture_security_commonattacks
Akram Qureshi50 vues
Where to Store the Cloud Encryption Keys - InterOp 2012 par Trend Micro
Where to Store the Cloud Encryption Keys - InterOp 2012Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012
Trend Micro1.2K vues
Transforming cloud security into an advantage par Moshe Ferber
Transforming cloud security into an advantageTransforming cloud security into an advantage
Transforming cloud security into an advantage
Moshe Ferber732 vues
Cloud Security Guide - Ref Architecture and Gov. Model par Vishal Sharma
Cloud Security Guide -  Ref Architecture and Gov. ModelCloud Security Guide -  Ref Architecture and Gov. Model
Cloud Security Guide - Ref Architecture and Gov. Model
Vishal Sharma3.7K vues
Vmug birmingham mar2013 trendmicro par dvmug1
Vmug birmingham mar2013 trendmicroVmug birmingham mar2013 trendmicro
Vmug birmingham mar2013 trendmicro
dvmug1373 vues
Qualys Corporate Brochure par Qualys
Qualys Corporate BrochureQualys Corporate Brochure
Qualys Corporate Brochure
Qualys12K vues
TechWiseTV Workshop: Cisco Stealthwatch and ISE par Robb Boyd
TechWiseTV Workshop: Cisco Stealthwatch and ISETechWiseTV Workshop: Cisco Stealthwatch and ISE
TechWiseTV Workshop: Cisco Stealthwatch and ISE
Robb Boyd2K vues
Microsoft threat protection + wdatp+ aatp overview par Allessandra Negri
Microsoft threat protection + wdatp+ aatp  overviewMicrosoft threat protection + wdatp+ aatp  overview
Microsoft threat protection + wdatp+ aatp overview
Qualys Brochure for CISOs par Qualys
Qualys Brochure for CISOsQualys Brochure for CISOs
Qualys Brochure for CISOs
Qualys11.8K vues

En vedette

CCI Brochure par
CCI BrochureCCI Brochure
CCI BrochureCCIRealEstate
123 vues7 diapositives
It’s for your health nutrition par
It’s for your health nutritionIt’s for your health nutrition
It’s for your health nutritionJodi Dingman
290 vues7 diapositives
CCI Brochure par
CCI BrochureCCI Brochure
CCI BrochureCCIRealEstate
81 vues7 diapositives
Mundo In tacto par
Mundo In tactoMundo In tacto
Mundo In tactoLuis Oswaldo Bernal Correa
209 vues77 diapositives
Presentyxa par
PresentyxaPresentyxa
Presentyxababbetic
168 vues4 diapositives
Understanding Brand par
Understanding BrandUnderstanding Brand
Understanding Brandmanumaxnanda
369 vues9 diapositives

Similaire à Rik Ferguson

Can You Trust Cloud Security In Public Cloud? par
Can You Trust Cloud Security In Public Cloud?Can You Trust Cloud Security In Public Cloud?
Can You Trust Cloud Security In Public Cloud?Intelligentia IT Systems Pvt. Ltd.
873 vues24 diapositives
Vmug birmingham mar2013 trendmicro par
Vmug birmingham mar2013 trendmicroVmug birmingham mar2013 trendmicro
Vmug birmingham mar2013 trendmicrodvmug1
479 vues25 diapositives
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env... par
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...Cyxtera Technologies
1.6K vues53 diapositives
Crush Cloud Complexity, Simplify Security - Shield X par
Crush Cloud Complexity, Simplify Security - Shield XCrush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield XPrime Infoserv
160 vues29 diapositives
CloudPassage Best Practices for Automatic Security Scaling par
CloudPassage Best Practices for Automatic Security ScalingCloudPassage Best Practices for Automatic Security Scaling
CloudPassage Best Practices for Automatic Security ScalingAmazon Web Services
3.6K vues37 diapositives
SSL VPN Evaluation Guide par
SSL VPN Evaluation GuideSSL VPN Evaluation Guide
SSL VPN Evaluation Guide Array Networks
588 vues14 diapositives

Similaire à Rik Ferguson(20)

Vmug birmingham mar2013 trendmicro par dvmug1
Vmug birmingham mar2013 trendmicroVmug birmingham mar2013 trendmicro
Vmug birmingham mar2013 trendmicro
dvmug1479 vues
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env... par Cyxtera Technologies
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
Crush Cloud Complexity, Simplify Security - Shield X par Prime Infoserv
Crush Cloud Complexity, Simplify Security - Shield XCrush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield X
Prime Infoserv160 vues
CloudPassage Best Practices for Automatic Security Scaling par Amazon Web Services
CloudPassage Best Practices for Automatic Security ScalingCloudPassage Best Practices for Automatic Security Scaling
CloudPassage Best Practices for Automatic Security Scaling
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks. par Scalar Decisions
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Scalar Decisions2.4K vues
Operational Complexity: The Biggest Security Threat to Your AWS Environment par Cryptzone
Operational Complexity: The Biggest Security Threat to Your AWS EnvironmentOperational Complexity: The Biggest Security Threat to Your AWS Environment
Operational Complexity: The Biggest Security Threat to Your AWS Environment
Cryptzone1.5K vues
Effectively and Securely Using the Cloud Computing Paradigm par fanc1985
Effectively and Securely Using the Cloud Computing ParadigmEffectively and Securely Using the Cloud Computing Paradigm
Effectively and Securely Using the Cloud Computing Paradigm
fanc19851.2K vues
Cloud security and services par Jas Preet
Cloud security and servicesCloud security and services
Cloud security and services
Jas Preet320 vues
Chap 6 cloud security par Raj Sarode
Chap 6 cloud securityChap 6 cloud security
Chap 6 cloud security
Raj Sarode5.5K vues
Steve Porter : cloud Computing Security par Gurbir Singh
Steve Porter : cloud Computing SecuritySteve Porter : cloud Computing Security
Steve Porter : cloud Computing Security
Gurbir Singh1.2K vues
Whitepaper: Security of the Cloud par CloudSmartz
Whitepaper: Security of the CloudWhitepaper: Security of the Cloud
Whitepaper: Security of the Cloud
CloudSmartz543 vues
MT17_Building Integrated and Secure Networks with limited IT Support par Dell EMC World
MT17_Building Integrated and Secure Networks with limited IT SupportMT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT Support
Dell EMC World594 vues
Palo Alto Networks: Protection for Security & Compliance par Amazon Web Services
Palo Alto Networks: Protection for Security & CompliancePalo Alto Networks: Protection for Security & Compliance
Palo Alto Networks: Protection for Security & Compliance

Plus de CloudExpoEurope

VMwareAidan Dalgleish par
VMwareAidan DalgleishVMwareAidan Dalgleish
VMwareAidan DalgleishCloudExpoEurope
572 vues19 diapositives
Data storage for the cloud ce11 par
Data storage for the cloud ce11Data storage for the cloud ce11
Data storage for the cloud ce11CloudExpoEurope
379 vues13 diapositives
Peter judge - Is the Cloud Green? par
Peter judge - Is the Cloud Green?Peter judge - Is the Cloud Green?
Peter judge - Is the Cloud Green?CloudExpoEurope
761 vues9 diapositives
J miller cloud expo europe 3 feb 11 par
J miller cloud expo europe 3 feb 11J miller cloud expo europe 3 feb 11
J miller cloud expo europe 3 feb 11CloudExpoEurope
244 vues26 diapositives
David king logica - cloud expo europe 2011 public par
David king   logica - cloud expo europe 2011 publicDavid king   logica - cloud expo europe 2011 public
David king logica - cloud expo europe 2011 publicCloudExpoEurope
575 vues25 diapositives
Cloud expo emer coleman par
Cloud expo   emer colemanCloud expo   emer coleman
Cloud expo emer colemanCloudExpoEurope
267 vues26 diapositives

Plus de CloudExpoEurope(18)

David king logica - cloud expo europe 2011 public par CloudExpoEurope
David king   logica - cloud expo europe 2011 publicDavid king   logica - cloud expo europe 2011 public
David king logica - cloud expo europe 2011 public
CloudExpoEurope575 vues
Constantino vazquez open nebula cloud case studies par CloudExpoEurope
Constantino vazquez   open nebula cloud case studiesConstantino vazquez   open nebula cloud case studies
Constantino vazquez open nebula cloud case studies
CloudExpoEurope1.7K vues
Parting the mists of cloud computing 030211 print par CloudExpoEurope
Parting the mists of cloud computing 030211 printParting the mists of cloud computing 030211 print
Parting the mists of cloud computing 030211 print
CloudExpoEurope409 vues
Cloud security and cyber security v 3.1 par CloudExpoEurope
Cloud security and cyber security v 3.1Cloud security and cyber security v 3.1
Cloud security and cyber security v 3.1
CloudExpoEurope402 vues
Cloud expo John Darlington - Imperial College par CloudExpoEurope
Cloud expo   John Darlington - Imperial CollegeCloud expo   John Darlington - Imperial College
Cloud expo John Darlington - Imperial College
CloudExpoEurope518 vues
Open source engagement – best practices_v0.5 par CloudExpoEurope
Open source engagement – best practices_v0.5Open source engagement – best practices_v0.5
Open source engagement – best practices_v0.5
CloudExpoEurope606 vues

Dernier

VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue par
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlueVNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlueShapeBlue
163 vues54 diapositives
DRBD Deep Dive - Philipp Reisner - LINBIT par
DRBD Deep Dive - Philipp Reisner - LINBITDRBD Deep Dive - Philipp Reisner - LINBIT
DRBD Deep Dive - Philipp Reisner - LINBITShapeBlue
140 vues21 diapositives
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive par
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLiveAutomating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLiveNetwork Automation Forum
50 vues35 diapositives
Business Analyst Series 2023 - Week 4 Session 7 par
Business Analyst Series 2023 -  Week 4 Session 7Business Analyst Series 2023 -  Week 4 Session 7
Business Analyst Series 2023 - Week 4 Session 7DianaGray10
126 vues31 diapositives
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or... par
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...ShapeBlue
158 vues20 diapositives
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ... par
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...ShapeBlue
79 vues17 diapositives

Dernier(20)

VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue par ShapeBlue
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlueVNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue
ShapeBlue163 vues
DRBD Deep Dive - Philipp Reisner - LINBIT par ShapeBlue
DRBD Deep Dive - Philipp Reisner - LINBITDRBD Deep Dive - Philipp Reisner - LINBIT
DRBD Deep Dive - Philipp Reisner - LINBIT
ShapeBlue140 vues
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive par Network Automation Forum
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLiveAutomating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Business Analyst Series 2023 - Week 4 Session 7 par DianaGray10
Business Analyst Series 2023 -  Week 4 Session 7Business Analyst Series 2023 -  Week 4 Session 7
Business Analyst Series 2023 - Week 4 Session 7
DianaGray10126 vues
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or... par ShapeBlue
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
ShapeBlue158 vues
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ... par ShapeBlue
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...
ShapeBlue79 vues
Extending KVM Host HA for Non-NFS Storage - Alex Ivanov - StorPool par ShapeBlue
Extending KVM Host HA for Non-NFS Storage -  Alex Ivanov - StorPoolExtending KVM Host HA for Non-NFS Storage -  Alex Ivanov - StorPool
Extending KVM Host HA for Non-NFS Storage - Alex Ivanov - StorPool
ShapeBlue84 vues
State of the Union - Rohit Yadav - Apache CloudStack par ShapeBlue
State of the Union - Rohit Yadav - Apache CloudStackState of the Union - Rohit Yadav - Apache CloudStack
State of the Union - Rohit Yadav - Apache CloudStack
ShapeBlue253 vues
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas... par Bernd Ruecker
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
Bernd Ruecker50 vues
"Surviving highload with Node.js", Andrii Shumada par Fwdays
"Surviving highload with Node.js", Andrii Shumada "Surviving highload with Node.js", Andrii Shumada
"Surviving highload with Node.js", Andrii Shumada
Fwdays53 vues
Igniting Next Level Productivity with AI-Infused Data Integration Workflows par Safe Software
Igniting Next Level Productivity with AI-Infused Data Integration Workflows Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Safe Software385 vues
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue par ShapeBlue
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlueCloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue
ShapeBlue94 vues
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue par ShapeBlue
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlueElevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue
ShapeBlue179 vues
Migrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlue par ShapeBlue
Migrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlueMigrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlue
Migrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlue
ShapeBlue176 vues
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N... par James Anderson
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
James Anderson156 vues
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ... par ShapeBlue
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...
ShapeBlue123 vues
CloudStack and GitOps at Enterprise Scale - Alex Dometrius, Rene Glover - AT&T par ShapeBlue
CloudStack and GitOps at Enterprise Scale - Alex Dometrius, Rene Glover - AT&TCloudStack and GitOps at Enterprise Scale - Alex Dometrius, Rene Glover - AT&T
CloudStack and GitOps at Enterprise Scale - Alex Dometrius, Rene Glover - AT&T
ShapeBlue112 vues

Rik Ferguson

Notes de l'éditeur

  1. This is a depiction of a customer’s typical virtualization journey put together by Vmware.In stage 1, orgs have begun virtualization all of their low hanging fruit – web servers, file and print servers, some app servers, and begun to realize the hardware consolidation and operational mgmt benefits that result in lower CAPX and OPEX costs.In stage 2, they have begun virtualizing more of their tier 1 apps and mission critical servers now. They are also leveraging some of the more advanced capabilities of virtualization such as automatic live migration, disaster recovery and software fault tolerance. Many stage 2 orgs have also started deploying virtual desktops as well.Benefits in stage 2 are even more cost efficiencies plus also higher QoS from the higher level virtualization capabilities.In stage 3, organizations have started leveraging private and public clouds. The IT dept has transformed itself into acting as a service provider with charge-back type processes where consumers of IT are in effect renting computing space and time from IT. Benefits are further cost efficiencies, QoS and faster business agility.If we now look at security and how it impacts the virtualization journey:As organizations move to stage 1, they typically employ the same technologies and processes as they did in the virtual world. Forrester survey data showed that 88% of N.A. orgs did have a SPECIFIC virtualization security strategy in place. As they move to stage 2, security starts playing more of a dampening role.A CDW study showed that the majority of organizations that considered themselves fully deployed with virtualization had only virtualized a 3rd of their servers. When asked why they stopped virtualizing, security was the primary barrier. (Other barriers were ISV support, performance concerns etc.)As orgs considered their move to stage 3, security was top of mind – IDC survey data shows that it is the #1 issue why orgs will not move to the cloud.