Ce diaporama a bien été signalé.
Nous utilisons votre profil LinkedIn et vos données d’activité pour vous proposer des publicités personnalisées et pertinentes. Vous pouvez changer vos préférences de publicités à tout moment.
How to make the move to the hybrid
cloud
David Strom
Techtarget/Dimension Data event
February 2016
My background
• Contributor to SearchSecurity
since 2000
• Former Editor-in-Chief at Network
Computing, Tom’s Hardware.com...
Agenda
• The different ways IT shops are moving to the
cloud
• The evolution of the enterprise application
• 4 key decisio...
The evolution of the cloud
4
Yesterday’s on-premises data center
5
Initial server virtualization
6
Moving your apps to the public cloud
7
8
Building hybrid clouds
9
Managed or colocated facilities
10
4 key infrastructure choices
11
1. Can your current internal apps be converted into something
with a Web front end?
12
2. Can your business logic be hosted elsewhere and scale?
13
3. Can you provide security as a service layer for your apps?
14
4. Can you virtualize each of your servers without losing
performance, security and reliability?
15
The evolution of the enterprise app
16
File sharing in the cloud
17
18
19
4 key decision points in moving to the hybrid cloud
20
1. What is your response time for issue resolution and other
internal support needs?
21
2. Can you calculate your app-level return on investment?
22
23
3. What is your end-to-end app latency?
• Endpoints aren't fixed like they are for most
on-premise situations
• The cloud ...
Latency (more)
25
• Applications are becoming more virtualized
• Users are becoming more distributed too
• IT may not be c...
4. What is the frequency of overall infrastructure outages?
26
Consider these three issues
• How your servers are configured,
• What kinds of monitoring tools you are using
to ensure th...
Cloud misperceptions
• The cloud isn’t as secure as on-premises
servers
• Data can easily be stolen from clouds, so
person...
29
Things you can’t blame on the cloud
• Insecure Web applications
• Lax network intrusion detection and
monitoring
• Bad pas...
Case studies
• Engagency.com
• American Red Cross
• CrazyforEducation.com
• Missouri Delta Dental
• Unisys and ING
• Beth ...
Engagency.com: scaling up
32
33
CrazyForEducation.com: incremental cloud
34
Missouri Delta Dental: encryption management
35
Unisys and ING: Data center consolidation
36
Beth Israel: The accidental cloud
37
Motley Fool: Provisioning issues
38
39
Takeaways
• It is all about speed of app delivery
• The rate of evolution varies tremendously for each
business, and for d...
More takeaways
41
• Mobile devices have become the defacto computing
endpoint
• IT staffs will have to evolve and become m...
Changing nature of today’s IT world
42
43
44
45
It is all about the apps
46
47
Solutions
• Use a cloud mgmt platform
• Tighten access controls
• Find and eliminate link redundancies
• Secure your web a...
1. Employ a cloud management platform
49
2. Understand your access controls to
all cloud-based resources
50
3. Test your cloud infrastructure continually
51
4. Make your Web-based applications more secure
52
53
Exploits haven’t changed much over the years!
54
“Blind” SQL Injection!
55
5. Use stronger authentication
56
The reality
Cloud environments can be more or less secure:
• How they are configured
• Who has access to them
• What kinds...
Wrapping up
58
Thanks for listening to our seminar, and do share
your own experiences about your own hybrid cloud
migratio...
Prochain SlideShare
Chargement dans…5
×

How to make the move towards hybrid cloud computing

844 vues

Publié le

This is a slide deck from a series of talks that I gave for TechTarget's events group Feb-June 2016 in various cities.

Publié dans : Technologie
  • Identifiez-vous pour voir les commentaires

How to make the move towards hybrid cloud computing

  1. 1. How to make the move to the hybrid cloud David Strom Techtarget/Dimension Data event February 2016
  2. 2. My background • Contributor to SearchSecurity since 2000 • Former Editor-in-Chief at Network Computing, Tom’s Hardware.com • Toiled in end-user computing since the 1980s • Written two computer network technology books, thousands of articles 2
  3. 3. Agenda • The different ways IT shops are moving to the cloud • The evolution of the enterprise application • 4 key decision points to ponder • Misperceptions and the security blame game • Case studies • Key takeaways, suggestions and lessons learned 3
  4. 4. The evolution of the cloud 4
  5. 5. Yesterday’s on-premises data center 5
  6. 6. Initial server virtualization 6
  7. 7. Moving your apps to the public cloud 7
  8. 8. 8
  9. 9. Building hybrid clouds 9
  10. 10. Managed or colocated facilities 10
  11. 11. 4 key infrastructure choices 11
  12. 12. 1. Can your current internal apps be converted into something with a Web front end? 12
  13. 13. 2. Can your business logic be hosted elsewhere and scale? 13
  14. 14. 3. Can you provide security as a service layer for your apps? 14
  15. 15. 4. Can you virtualize each of your servers without losing performance, security and reliability? 15
  16. 16. The evolution of the enterprise app 16
  17. 17. File sharing in the cloud 17
  18. 18. 18
  19. 19. 19
  20. 20. 4 key decision points in moving to the hybrid cloud 20
  21. 21. 1. What is your response time for issue resolution and other internal support needs? 21
  22. 22. 2. Can you calculate your app-level return on investment? 22
  23. 23. 23
  24. 24. 3. What is your end-to-end app latency? • Endpoints aren't fixed like they are for most on-premise situations • The cloud infrastructure may not be optimally connected to your own 24
  25. 25. Latency (more) 25 • Applications are becoming more virtualized • Users are becoming more distributed too • IT may not be completely aware of the ultimate end users and application owners
  26. 26. 4. What is the frequency of overall infrastructure outages? 26
  27. 27. Consider these three issues • How your servers are configured, • What kinds of monitoring tools you are using to ensure that they aren’t breeched, • Whether your applications have built-in security or not 27
  28. 28. Cloud misperceptions • The cloud isn’t as secure as on-premises servers • Data can easily be stolen from clouds, so personal info shouldn’t reside there 28
  29. 29. 29
  30. 30. Things you can’t blame on the cloud • Insecure Web applications • Lax network intrusion detection and monitoring • Bad password policies  30
  31. 31. Case studies • Engagency.com • American Red Cross • CrazyforEducation.com • Missouri Delta Dental • Unisys and ING • Beth Israel Medical Center • MotleyFool.com • Boeing’s cloud evaluation matrix 31
  32. 32. Engagency.com: scaling up 32
  33. 33. 33
  34. 34. CrazyForEducation.com: incremental cloud 34
  35. 35. Missouri Delta Dental: encryption management 35
  36. 36. Unisys and ING: Data center consolidation 36
  37. 37. Beth Israel: The accidental cloud 37
  38. 38. Motley Fool: Provisioning issues 38
  39. 39. 39
  40. 40. Takeaways • It is all about speed of app delivery • The rate of evolution varies tremendously for each business, and for departments within each business • There is no single monolithic app • There is also no single cloud situation 40
  41. 41. More takeaways 41 • Mobile devices have become the defacto computing endpoint • IT staffs will have to evolve and become more collaborative • Everything becomes browser-based, even mainframe apps • Availability and disaster recovery needs to be baked into everything • Self-service portals become more important
  42. 42. Changing nature of today’s IT world 42
  43. 43. 43
  44. 44. 44
  45. 45. 45
  46. 46. It is all about the apps 46
  47. 47. 47
  48. 48. Solutions • Use a cloud mgmt platform • Tighten access controls • Find and eliminate link redundancies • Secure your web apps – all of them! • Use stronger authentications 48
  49. 49. 1. Employ a cloud management platform 49
  50. 50. 2. Understand your access controls to all cloud-based resources 50
  51. 51. 3. Test your cloud infrastructure continually 51
  52. 52. 4. Make your Web-based applications more secure 52
  53. 53. 53
  54. 54. Exploits haven’t changed much over the years! 54
  55. 55. “Blind” SQL Injection! 55
  56. 56. 5. Use stronger authentication 56
  57. 57. The reality Cloud environments can be more or less secure: • How they are configured • Who has access to them • What kinds of encryption methods are used to protect their data and • The sensitivity of the data itself 57
  58. 58. Wrapping up 58 Thanks for listening to our seminar, and do share your own experiences about your own hybrid cloud migration strategies. Presentation slides available: • http://slideshare.net/davidstrom Feel free to contact me at: • david@strom.com • http://strominator.com • @dstrom on Twitter

×