SlideShare une entreprise Scribd logo
1  sur  25
Securing the Un-securable? Technology Convergence/Divergence and the Changing Face of Security Jon Collins, Managing Director Freeform Dynamics Ltd [email_address] www.freeformdynamics.com
Agenda ,[object Object],[object Object],[object Object],[object Object]
Market remains turbulent...
Meanwhile, fragmentation is within...
What business drivers are having the most impact on how you architect and operate your server estate?
Same old, same old? VIRUSES AND TROJANS INTRUSION AND DENIAL SPAMMING AND PHISHING
How prominent are the following threats to [IT] security and how is this changing?
In fact, most organisations look more like this...
Have risk concerns held you back from taking advantage of the following?
What’s going on in technology?
What technical/operational drivers are having an impact?
No one size fits all for virtualisation Servers Storage Desktops
Adopters starting to appreciate architectural impact SERVER 1 SERVER 2 SERVER 3 STORAGE A STORAGE B STORAGE C VIRTUALISED SERVER WORKLOAD 1 WORKLOAD 2 WORKLOAD 3 INTERFACE STORAGE A STORAGE B STORAGE C
Meanwhile, what about Cloud?
Technological convergence is means to end
The new computing – back to the future? Web Servers Messaging Servers Security Server Directory. Servers ID Server Proxy Server App Servers Integration Servers Transaction Servers File Servers Database Servers Media Servers Portal Server Presentation Processing Data
Moving from technologies to services   Email Internet Application Desktop Server Network VS TECHNOLOGY COMPONENTS SERVICES
Bottom-up vs Top-down Making everything “just work” Making a real difference to business IT as bottleneck IT as foundation IT as differentiator INCREASED EFFICIENCY INCREASED EFFECTIVENESS
What pot-holes to expect? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],Reality check
On fire fighting and fire extinguishers
Risk sensitivity/Management & technology capability
Integration and Co-ordination are Key – but there’s still a way to go!
So, where to start? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Thank You Jon Collins, Managing Director Freeform Dynamics Ltd [email_address] March 2010 www.freeformdynamics.com

Contenu connexe

Tendances

MISO L002 it concepts and management
MISO L002 it concepts and managementMISO L002 it concepts and management
MISO L002 it concepts and management
Jan Wong
 
More Flexibility And Productivity With Cloud Services Attendee Copy
More Flexibility And Productivity With Cloud Services   Attendee CopyMore Flexibility And Productivity With Cloud Services   Attendee Copy
More Flexibility And Productivity With Cloud Services Attendee Copy
Anita Y. Mathis
 
Organizational Behavior Question#3
Organizational Behavior Question#3Organizational Behavior Question#3
Organizational Behavior Question#3
Waseem Saeed
 
Smart phone presentation rodney
Smart phone presentation rodneySmart phone presentation rodney
Smart phone presentation rodney
krmub1
 

Tendances (20)

MISO L002 it concepts and management
MISO L002 it concepts and managementMISO L002 it concepts and management
MISO L002 it concepts and management
 
More Flexibility And Productivity With Cloud Services Attendee Copy
More Flexibility And Productivity With Cloud Services   Attendee CopyMore Flexibility And Productivity With Cloud Services   Attendee Copy
More Flexibility And Productivity With Cloud Services Attendee Copy
 
Crossing the Mashup Chasm. Enterprise Mashup Requirements
Crossing the Mashup Chasm. Enterprise Mashup RequirementsCrossing the Mashup Chasm. Enterprise Mashup Requirements
Crossing the Mashup Chasm. Enterprise Mashup Requirements
 
Peopleware. Introduction to Enterprise DataMashups
Peopleware. Introduction to Enterprise DataMashupsPeopleware. Introduction to Enterprise DataMashups
Peopleware. Introduction to Enterprise DataMashups
 
Public Sector Information Reuse: What to Expect
Public Sector Information Reuse: What to ExpectPublic Sector Information Reuse: What to Expect
Public Sector Information Reuse: What to Expect
 
Form/Document Challenges
Form/Document ChallengesForm/Document Challenges
Form/Document Challenges
 
Forms/Documents Dependencies - Knowledge Management
Forms/Documents Dependencies - Knowledge ManagementForms/Documents Dependencies - Knowledge Management
Forms/Documents Dependencies - Knowledge Management
 
The New Workplace
The New WorkplaceThe New Workplace
The New Workplace
 
Organizational Behavior Question#3
Organizational Behavior Question#3Organizational Behavior Question#3
Organizational Behavior Question#3
 
How to Better Manage Your IT Infrastructure
How to Better Manage Your IT InfrastructureHow to Better Manage Your IT Infrastructure
How to Better Manage Your IT Infrastructure
 
How IT can Choose the Right Technologies
How IT can Choose the Right TechnologiesHow IT can Choose the Right Technologies
How IT can Choose the Right Technologies
 
THE IMPACT OF INFORMATION TECHNOLOGY BEST PRACTICES ON PROJECT SUCCESS RATES ...
THE IMPACT OF INFORMATION TECHNOLOGY BEST PRACTICES ON PROJECT SUCCESS RATES ...THE IMPACT OF INFORMATION TECHNOLOGY BEST PRACTICES ON PROJECT SUCCESS RATES ...
THE IMPACT OF INFORMATION TECHNOLOGY BEST PRACTICES ON PROJECT SUCCESS RATES ...
 
Six principles of The Technology Garden
Six principles of The Technology GardenSix principles of The Technology Garden
Six principles of The Technology Garden
 
Smart phone presentation rodney
Smart phone presentation rodneySmart phone presentation rodney
Smart phone presentation rodney
 
Intergen Think! Event: Modern Applications for a Modern Enterprise
Intergen Think! Event: Modern Applications for a Modern EnterpriseIntergen Think! Event: Modern Applications for a Modern Enterprise
Intergen Think! Event: Modern Applications for a Modern Enterprise
 
Four Trends of Next Generation ECM
Four Trends of Next Generation ECMFour Trends of Next Generation ECM
Four Trends of Next Generation ECM
 
The Dangers of Shadow IT
The Dangers of Shadow ITThe Dangers of Shadow IT
The Dangers of Shadow IT
 
12 Game Changing Ways to Mobilize Teaching and Learning
12 Game Changing Ways to Mobilize Teaching and Learning12 Game Changing Ways to Mobilize Teaching and Learning
12 Game Changing Ways to Mobilize Teaching and Learning
 
Current State of Cloud Computing (Jan 2016)
Current State of Cloud Computing (Jan 2016)Current State of Cloud Computing (Jan 2016)
Current State of Cloud Computing (Jan 2016)
 
Transform 2014: Aligning to Your Customer's Systems of Engagement
Transform 2014: Aligning to Your Customer's Systems of Engagement Transform 2014: Aligning to Your Customer's Systems of Engagement
Transform 2014: Aligning to Your Customer's Systems of Engagement
 

En vedette

The Energy Bus - First Grade
The Energy Bus - First GradeThe Energy Bus - First Grade
The Energy Bus - First Grade
PrincipalLangston
 
Quà tết cho bạn gái
Quà tết cho bạn gáiQuà tết cho bạn gái
Quà tết cho bạn gái
Bibiyeu Qx
 
Building Opportunity with an Open Cloud Architecture
Building Opportunity with an Open Cloud ArchitectureBuilding Opportunity with an Open Cloud Architecture
Building Opportunity with an Open Cloud Architecture
Platform CF
 
Cloud Computing and Open Source
Cloud Computing and Open SourceCloud Computing and Open Source
Cloud Computing and Open Source
John Willis
 
Application Considerations for Power System Grounding
Application Considerations for Power System GroundingApplication Considerations for Power System Grounding
Application Considerations for Power System Grounding
michaeljmack
 

En vedette (18)

Delta ia pq-afe2000_c_en_20160323_web
Delta ia pq-afe2000_c_en_20160323_webDelta ia pq-afe2000_c_en_20160323_web
Delta ia pq-afe2000_c_en_20160323_web
 
Análisis estratégico de coviran
Análisis estratégico de coviranAnálisis estratégico de coviran
Análisis estratégico de coviran
 
The Energy Bus - First Grade
The Energy Bus - First GradeThe Energy Bus - First Grade
The Energy Bus - First Grade
 
Typewriter - by Vanesa
Typewriter - by VanesaTypewriter - by Vanesa
Typewriter - by Vanesa
 
Quà tết cho bạn gái
Quà tết cho bạn gáiQuà tết cho bạn gái
Quà tết cho bạn gái
 
Harvard Club of Silicon Valley: Watching the Alpha Geeks
Harvard Club of Silicon Valley: Watching the Alpha GeeksHarvard Club of Silicon Valley: Watching the Alpha Geeks
Harvard Club of Silicon Valley: Watching the Alpha Geeks
 
Overview of Enterprise Risk Management (ERM)
Overview of Enterprise Risk Management (ERM)Overview of Enterprise Risk Management (ERM)
Overview of Enterprise Risk Management (ERM)
 
Building Opportunity with an Open Cloud Architecture
Building Opportunity with an Open Cloud ArchitectureBuilding Opportunity with an Open Cloud Architecture
Building Opportunity with an Open Cloud Architecture
 
Auditoría de comunicación Interna (ACI)
Auditoría de comunicación Interna (ACI)Auditoría de comunicación Interna (ACI)
Auditoría de comunicación Interna (ACI)
 
Cloud Computing and Open Source
Cloud Computing and Open SourceCloud Computing and Open Source
Cloud Computing and Open Source
 
Leadership in changing times
Leadership in changing timesLeadership in changing times
Leadership in changing times
 
Accounting study guide
Accounting study guide Accounting study guide
Accounting study guide
 
Discriminación auditiva14 01 17
Discriminación  auditiva14 01 17Discriminación  auditiva14 01 17
Discriminación auditiva14 01 17
 
Application Considerations for Power System Grounding
Application Considerations for Power System GroundingApplication Considerations for Power System Grounding
Application Considerations for Power System Grounding
 
Historia y evolución de facebook
Historia y evolución de facebookHistoria y evolución de facebook
Historia y evolución de facebook
 
eBay Final Case
eBay Final CaseeBay Final Case
eBay Final Case
 
MARIBEL PATIÑO LINDADO
MARIBEL PATIÑO LINDADOMARIBEL PATIÑO LINDADO
MARIBEL PATIÑO LINDADO
 
Make Your Move with CenturyLink
Make Your Move with CenturyLinkMake Your Move with CenturyLink
Make Your Move with CenturyLink
 

Similaire à Securing the Un-securable?

Game Changing IT Solutions
Game Changing IT SolutionsGame Changing IT Solutions
Game Changing IT Solutions
DMIMarketing
 
NH Bankers 10 08 07 Kamens
NH Bankers 10 08 07 KamensNH Bankers 10 08 07 Kamens
NH Bankers 10 08 07 Kamens
kamensm02
 

Similaire à Securing the Un-securable? (20)

Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11
 
IEEE PHM Cloud Computing
IEEE PHM Cloud ComputingIEEE PHM Cloud Computing
IEEE PHM Cloud Computing
 
Game Changing IT Solutions
Game Changing IT SolutionsGame Changing IT Solutions
Game Changing IT Solutions
 
Shadow IT
Shadow ITShadow IT
Shadow IT
 
Case study
Case studyCase study
Case study
 
Cloud computing in context
Cloud computing in contextCloud computing in context
Cloud computing in context
 
SPC18 - Getting Started with Office 365 Advanced Threat Protection for ShareP...
SPC18 - Getting Started with Office 365 Advanced Threat Protection for ShareP...SPC18 - Getting Started with Office 365 Advanced Threat Protection for ShareP...
SPC18 - Getting Started with Office 365 Advanced Threat Protection for ShareP...
 
Cloud Computing Security Needs & Problems Alon Refaeli
Cloud Computing Security Needs & Problems   Alon RefaeliCloud Computing Security Needs & Problems   Alon Refaeli
Cloud Computing Security Needs & Problems Alon Refaeli
 
B Hkorba
B HkorbaB Hkorba
B Hkorba
 
Cybersecurity Improvement eBook
Cybersecurity Improvement eBookCybersecurity Improvement eBook
Cybersecurity Improvement eBook
 
Business Continuity and Disaster Recovery for the Modern Office
Business Continuity and Disaster Recovery for the Modern Office Business Continuity and Disaster Recovery for the Modern Office
Business Continuity and Disaster Recovery for the Modern Office
 
Know the Cloud ERP and safety in your business.pdf
Know the Cloud ERP and safety in your business.pdfKnow the Cloud ERP and safety in your business.pdf
Know the Cloud ERP and safety in your business.pdf
 
Major Cloud Security Challenges concerning the Enterprises | Sysfore
Major Cloud Security Challenges concerning the Enterprises | SysforeMajor Cloud Security Challenges concerning the Enterprises | Sysfore
Major Cloud Security Challenges concerning the Enterprises | Sysfore
 
The evolving CIO|CISO relationship
The evolving CIO|CISO relationship  The evolving CIO|CISO relationship
The evolving CIO|CISO relationship
 
Information Security and your Business
Information Security and your BusinessInformation Security and your Business
Information Security and your Business
 
Information security trends and concerns
Information security trends and concernsInformation security trends and concerns
Information security trends and concerns
 
Cloud Expo May 09 Richard Britton, Cloud Computing for SMEs
Cloud Expo May 09 Richard Britton, Cloud Computing for SMEsCloud Expo May 09 Richard Britton, Cloud Computing for SMEs
Cloud Expo May 09 Richard Britton, Cloud Computing for SMEs
 
Technology And Enterprise Forum, May 2011
Technology And Enterprise Forum, May 2011Technology And Enterprise Forum, May 2011
Technology And Enterprise Forum, May 2011
 
Security solutions for a smarter planet
Security solutions for a smarter planetSecurity solutions for a smarter planet
Security solutions for a smarter planet
 
NH Bankers 10 08 07 Kamens
NH Bankers 10 08 07 KamensNH Bankers 10 08 07 Kamens
NH Bankers 10 08 07 Kamens
 

Plus de Jon Collins

It looking forward
It looking forwardIt looking forward
It looking forward
Jon Collins
 

Plus de Jon Collins (10)

Boundaries of mobile
Boundaries of mobileBoundaries of mobile
Boundaries of mobile
 
It looking forward
It looking forwardIt looking forward
It looking forward
 
Cloud Computing - from myth to reality
Cloud Computing - from myth to realityCloud Computing - from myth to reality
Cloud Computing - from myth to reality
 
Managing Storage - Cost, Governance, Risk and the Environment
Managing Storage - Cost, Governance, Risk and the EnvironmentManaging Storage - Cost, Governance, Risk and the Environment
Managing Storage - Cost, Governance, Risk and the Environment
 
IT trends and their impact on software licensing
IT trends and their impact on software licensingIT trends and their impact on software licensing
IT trends and their impact on software licensing
 
Content Management and Business Intelligence
Content Management and Business IntelligenceContent Management and Business Intelligence
Content Management and Business Intelligence
 
Threats And Countermeasures
Threats And CountermeasuresThreats And Countermeasures
Threats And Countermeasures
 
Secure Mobile Working 1.0
Secure Mobile Working 1.0Secure Mobile Working 1.0
Secure Mobile Working 1.0
 
Testing Governance And Data Management
Testing Governance And Data ManagementTesting Governance And Data Management
Testing Governance And Data Management
 
Social And Collaborative Aspects Of Virtual Worlds
Social And Collaborative Aspects Of Virtual WorldsSocial And Collaborative Aspects Of Virtual Worlds
Social And Collaborative Aspects Of Virtual Worlds
 

Dernier

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Dernier (20)

FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 

Securing the Un-securable?

Notes de l'éditeur

  1. Technology Convergence/Divergence and the Changing Face of Security Whether or not you believe that IT is experiencing a revolution, it is clear that a number the fundamentals of how the IT infrastructure is built are changing. Server and storage virtualisation, cloud-based delivery models, data centre convergence onto 10 Gigabit Ethernet and the unification of voice communications mechanisms are all symptomatic of this. But IT is a two-edged sword: with every innovation come a new set of risks to be mitigated, holes to be filled, policies to be set and compliance objectives to be stuck to. In the face of such rapid change, how exactly should organizations large and small be thinking about security? What are the pot-holes along the road, and how can they be avoided?
  2. This presentation is aimed at Emulex channel partners. Understand that the theme is convergence and what it enables – so this presentation takes the top-down view of what’s driving needs. First thing that needs to be mentioned is the downturn.
  3. That’ll be a storage issue then 
  4. Introduce Fortress IT Attack vectors are evolving from individual targets to more complex ways of getting round protection At same time. Attackers are moving to a more organised state – criminal activity driven BUT Organisations are looking to deperimeterise – how to square that?
  5. Are we really any better off when we respond to technology hype?
  6. Note however that while many organisations may be deploying virtualisation, that may only be for a minority of servers. We’re still in the pilot phase, and knowledge levels are low.
  7. Early adopter experiences are not that common for broader use of server virtualisation. But what’s clear is that scaling is a big issue – storage and networking bottlenecks are quickly reached.
  8. In practical terms – this means the adoption of 10GBaseT. It solves the problems – or acts as a catalyst to do so
  9. Bluntly, are we recreating the mainframe? Ideally, the answer would be yes – as the mainframe had plenty of good things. However one thing it didn’t bring was the kind of flexibility we have grown used to in distributed architectures. IT therefore becomes more and more about dealing with the white space between the components
  10. Services lead to service delivery, service contracts etc
  11. Perhaps the answer lies in a more integrated view of security