SlideShare une entreprise Scribd logo
1  sur  15
Business Perspectives on
                Cloud Computing
                       John Rhoton
                  Digital Trends 2011, Athens
                Green ICT and Cloud Computing


30/11/2011            John Rhoton – Digital Trends 2011   1
Agenda
 • Assessment
      – Financial, Risk, Strategic
 • Adoption
 • Challenges
 • Guidance



30/11/2011             John Rhoton – Digital Trends 2011   2
Business Perspective on Definition
Cloud Computing is a set of technologies that
help to achieve three business objectives:
 • Cost reduction
      – Virtualization, Multi-tenancy, Automation, ...
 • Business flexibility
      – On-demand, Utility-pricing, Elasticity, ...
 • Focus on core competency
      – Internet delivery, Off-premise execution, Outsourced
        operation, ...

30/11/2011               John Rhoton – Digital Trends 2011     3
Two views of technology evolution
 No pivotal innovation                 vs.         Very disruptive impact
                                                               Network effects
                                                                                   Competitive
 THEN                                  Economy                                        Price
 • Application Service Provider         of Scale
 • Web Hosting Service
 • Managed Hosting Service
 NOW                                                                               Accelerated
 • Software-as-a-Service                   Improved                                development
 • Platform-as-a-Service                 functionality
 • Infrastructure-as-a-Service

 Multi-tenancy. Virtualization.
 Utility billing. These aren’t new –                          Increased Adoption
 just a gradual evolution.                   The right conditions can create market
                                             disruption for evolutionary improvements.
30/11/2011                     John Rhoton – Digital Trends 2011                            4
Financial Assessment
•   Software
•   Hardware
•   Facilities
•   Operations




30/11/2011        John Rhoton – Digital Trends 2011   5
Risk Assessment
 •    Data leakage                         • Rogue clouds
 •    Data loss                                   – Employee dissatisfaction
 •    Service loss                                – Unmanaged applications
                                                  – Insecure data
 •    Compliance
 •    Lock-in                              • Competitive disadvantage
                                           • Internal risks
     Many organizations greatly underestimate the capability and
     motivation of the cloud providers to address these risks.
     They also overestimate their own ability to eliminate these risks
     from internal implementations.
30/11/2011                   John Rhoton – Digital Trends 2011                 6
Strategic Assessment
 • IT Support
      – Intellectual Property
      – Knowledge Management
      – Service Delivery
 • Agile Enterprise
      – Core competency
      – Modular services
      – Ecosystem
30/11/2011           John Rhoton – Digital Trends 2011   7
Private to hybrid evolution


 • Resource Efficiencies
 • Operational Efficiencies
 • Sourcing Efficiencies



30/11/2011           John Rhoton – Digital Trends 2011   8
Candidate applications
 Low risk, high return
 • Test and Development
 • Externalised applications
      – Isolate threats, malware
 • Redundancy
      – Geographical
      – Organizational
      – Technological

30/11/2011               John Rhoton – Digital Trends 2011   9
Design challenges
 •   Integration
 •   User management
 •   Reliability
 •   Governance / SLAs
 •   Security
              The most common cause of failure
             is underestimating these challenges

30/11/2011        John Rhoton – Digital Trends 2011   10
Concerns and risk mitigation
      Risk           Mitigation
      Data leakage   Encryption
      Data loss      Multi-source, backup
      Vendor         Standards, multi-source,
      lock-in        backup, exit strategy
      Service loss   SLA, audit, certifications
      Compliance     SLA, audit, certifications

30/11/2011           John Rhoton – Digital Trends 2011   11
New trust basis
                               Employees                      Contractors

  • Personal observation                                                    Physical
  • Personal experience                                                       Segmentation
                                                                            Access controls
  • Human Insight
                                   Partners             Suppliers



                                        Auditors
  • Public verification                                                      Virtual
                                        Public Scrutiny                        Segmentation
  • Contracts
                                                                             Encryption
  • Compensation                   Experts                                   Access controls
                                   Legal Counsel
30/11/2011                John Rhoton – Digital Trends 2011                               12
Words of Advice
 • Start early
 • Engage everyone
      – Users, HR, Legal, Procurement,…
 • Be skeptical of the skeptics
 • Find Quick wins
      – Cheap, low-risk
 • Prepare for the long term
30/11/2011            John Rhoton – Digital Trends 2011   13
Summary
 • Assess cloud computing from financial, risk
   and strategic perspectives
 • Be prepared for disruption
      – Requires new trust strategy
 • Don’t underestimate the challenges
 • Accept the inevitable


30/11/2011            John Rhoton – Digital Trends 2011   14
Thank you!

      John Rhoton

      john_rhoton@symantec.com, john.rhoton@gmail.com
      xing.com/profile/John_Rhoton
      linkedin.com/in/rhoton
      amazon.com/John-Rhoton/e/B001K8TFW0
      slideshare.net/rhoton


30/11/2011                  John Rhoton – Digital Trends 2011   15

Contenu connexe

Tendances

Privacy in cloud computing
Privacy in cloud computingPrivacy in cloud computing
Privacy in cloud computingAhmed Nour
 
Cloud computing and Cloud Enabling Technologies
Cloud computing and Cloud Enabling TechnologiesCloud computing and Cloud Enabling Technologies
Cloud computing and Cloud Enabling TechnologiesAbdelkhalik Mosa
 
CLOUD ENABLING TECHNOLOGIES.pptx
 CLOUD ENABLING TECHNOLOGIES.pptx CLOUD ENABLING TECHNOLOGIES.pptx
CLOUD ENABLING TECHNOLOGIES.pptxDr Geetha Mohan
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security conceptsG Prachi
 
Datawarehousing and Business Intelligence
Datawarehousing and Business IntelligenceDatawarehousing and Business Intelligence
Datawarehousing and Business IntelligencePrithwis Mukerjee
 
Cloud Computing Principles and Paradigms: 6 on the management of virtual mach...
Cloud Computing Principles and Paradigms: 6 on the management of virtual mach...Cloud Computing Principles and Paradigms: 6 on the management of virtual mach...
Cloud Computing Principles and Paradigms: 6 on the management of virtual mach...Majid Hajibaba
 
Fundamentals of Database ppt ch02
Fundamentals of Database ppt ch02Fundamentals of Database ppt ch02
Fundamentals of Database ppt ch02Jotham Gadot
 
Multi Tenancy In The Cloud
Multi Tenancy In The CloudMulti Tenancy In The Cloud
Multi Tenancy In The Cloudrohit_ainapure
 
Introduction to Distributed System
Introduction to Distributed SystemIntroduction to Distributed System
Introduction to Distributed SystemSunita Sahu
 
Cloud security Presentation
Cloud security PresentationCloud security Presentation
Cloud security PresentationAjay p
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing SecurityNinh Nguyen
 
Overview of computing paradigm
Overview of computing paradigmOverview of computing paradigm
Overview of computing paradigmRipal Ranpara
 
2 business and it perspective
2 business and it perspective2 business and it perspective
2 business and it perspectiveVaibhav Khanna
 
Cloud-Computing-ppt.pptx
Cloud-Computing-ppt.pptxCloud-Computing-ppt.pptx
Cloud-Computing-ppt.pptxMiltonMolla1
 

Tendances (20)

Privacy in cloud computing
Privacy in cloud computingPrivacy in cloud computing
Privacy in cloud computing
 
Cloud computing and Cloud Enabling Technologies
Cloud computing and Cloud Enabling TechnologiesCloud computing and Cloud Enabling Technologies
Cloud computing and Cloud Enabling Technologies
 
Cloud Computing Essentials
Cloud Computing EssentialsCloud Computing Essentials
Cloud Computing Essentials
 
CLOUD ENABLING TECHNOLOGIES.pptx
 CLOUD ENABLING TECHNOLOGIES.pptx CLOUD ENABLING TECHNOLOGIES.pptx
CLOUD ENABLING TECHNOLOGIES.pptx
 
DBMS Bascis
DBMS BascisDBMS Bascis
DBMS Bascis
 
Big data security
Big data securityBig data security
Big data security
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
 
system development life cycle
system development life cyclesystem development life cycle
system development life cycle
 
Datawarehousing and Business Intelligence
Datawarehousing and Business IntelligenceDatawarehousing and Business Intelligence
Datawarehousing and Business Intelligence
 
Cloud Computing Principles and Paradigms: 6 on the management of virtual mach...
Cloud Computing Principles and Paradigms: 6 on the management of virtual mach...Cloud Computing Principles and Paradigms: 6 on the management of virtual mach...
Cloud Computing Principles and Paradigms: 6 on the management of virtual mach...
 
Fundamentals of Database ppt ch02
Fundamentals of Database ppt ch02Fundamentals of Database ppt ch02
Fundamentals of Database ppt ch02
 
Multi Tenancy In The Cloud
Multi Tenancy In The CloudMulti Tenancy In The Cloud
Multi Tenancy In The Cloud
 
Introduction to Distributed System
Introduction to Distributed SystemIntroduction to Distributed System
Introduction to Distributed System
 
Cloud security Presentation
Cloud security PresentationCloud security Presentation
Cloud security Presentation
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
Overview of computing paradigm
Overview of computing paradigmOverview of computing paradigm
Overview of computing paradigm
 
Introduction to RDBMS
Introduction to RDBMSIntroduction to RDBMS
Introduction to RDBMS
 
2 business and it perspective
2 business and it perspective2 business and it perspective
2 business and it perspective
 
Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
 
Cloud-Computing-ppt.pptx
Cloud-Computing-ppt.pptxCloud-Computing-ppt.pptx
Cloud-Computing-ppt.pptx
 

En vedette

AMD 2011 Global Cloud Computing Adoption, Attitudes and Approaches Study
AMD 2011 Global Cloud Computing  Adoption, Attitudes and Approaches StudyAMD 2011 Global Cloud Computing  Adoption, Attitudes and Approaches Study
AMD 2011 Global Cloud Computing Adoption, Attitudes and Approaches StudyAMD
 
Lorraine Morgan: Factors affecting the adoption of cloud computing
Lorraine Morgan: Factors affecting the adoption of cloud computingLorraine Morgan: Factors affecting the adoption of cloud computing
Lorraine Morgan: Factors affecting the adoption of cloud computingCBOD ANR project U-PSUD
 
Cloud computing and SME
Cloud computing and SMECloud computing and SME
Cloud computing and SMEDhayis A.abdul
 
Cloud computing adoption in sap technologies
Cloud computing adoption in sap technologiesCloud computing adoption in sap technologies
Cloud computing adoption in sap technologiessveldanda
 
Cloud Computing for the SME
Cloud Computing for the SMECloud Computing for the SME
Cloud Computing for the SMEhyther
 
MDEC CLOUD SME ADOPTION PROGRAM
MDEC CLOUD SME ADOPTION PROGRAMMDEC CLOUD SME ADOPTION PROGRAM
MDEC CLOUD SME ADOPTION PROGRAMPoh Lee
 
AFCEA C4I Symposium: The 4th C in C4I Stands for Cloud:Factors Driving Adopti...
AFCEA C4I Symposium: The 4th C in C4I Stands for Cloud:Factors Driving Adopti...AFCEA C4I Symposium: The 4th C in C4I Stands for Cloud:Factors Driving Adopti...
AFCEA C4I Symposium: The 4th C in C4I Stands for Cloud:Factors Driving Adopti...Patrick Chanezon
 
A Cloud Decision making Framework
A Cloud Decision making FrameworkA Cloud Decision making Framework
A Cloud Decision making FrameworkAndy Marshall
 

En vedette (8)

AMD 2011 Global Cloud Computing Adoption, Attitudes and Approaches Study
AMD 2011 Global Cloud Computing  Adoption, Attitudes and Approaches StudyAMD 2011 Global Cloud Computing  Adoption, Attitudes and Approaches Study
AMD 2011 Global Cloud Computing Adoption, Attitudes and Approaches Study
 
Lorraine Morgan: Factors affecting the adoption of cloud computing
Lorraine Morgan: Factors affecting the adoption of cloud computingLorraine Morgan: Factors affecting the adoption of cloud computing
Lorraine Morgan: Factors affecting the adoption of cloud computing
 
Cloud computing and SME
Cloud computing and SMECloud computing and SME
Cloud computing and SME
 
Cloud computing adoption in sap technologies
Cloud computing adoption in sap technologiesCloud computing adoption in sap technologies
Cloud computing adoption in sap technologies
 
Cloud Computing for the SME
Cloud Computing for the SMECloud Computing for the SME
Cloud Computing for the SME
 
MDEC CLOUD SME ADOPTION PROGRAM
MDEC CLOUD SME ADOPTION PROGRAMMDEC CLOUD SME ADOPTION PROGRAM
MDEC CLOUD SME ADOPTION PROGRAM
 
AFCEA C4I Symposium: The 4th C in C4I Stands for Cloud:Factors Driving Adopti...
AFCEA C4I Symposium: The 4th C in C4I Stands for Cloud:Factors Driving Adopti...AFCEA C4I Symposium: The 4th C in C4I Stands for Cloud:Factors Driving Adopti...
AFCEA C4I Symposium: The 4th C in C4I Stands for Cloud:Factors Driving Adopti...
 
A Cloud Decision making Framework
A Cloud Decision making FrameworkA Cloud Decision making Framework
A Cloud Decision making Framework
 

Similaire à Business Perspectives on Cloud Computing

Cloud Computing Challenges - Beamap
Cloud Computing Challenges - BeamapCloud Computing Challenges - Beamap
Cloud Computing Challenges - BeamapJohn Rhoton
 
A future history of content management
A future history of content managementA future history of content management
A future history of content managementJohn Mancini
 
Remote Deposit Capture Risk Management, May 2010 Update
Remote Deposit Capture Risk Management, May 2010 UpdateRemote Deposit Capture Risk Management, May 2010 Update
Remote Deposit Capture Risk Management, May 2010 UpdateJTLeekley
 
Guiding Principles for Mobile Payment Readiness
Guiding Principles for Mobile Payment ReadinessGuiding Principles for Mobile Payment Readiness
Guiding Principles for Mobile Payment ReadinessPerficient, Inc.
 
Cloud Deployment Strategy: Challenges to consider
Cloud Deployment Strategy: Challenges to considerCloud Deployment Strategy: Challenges to consider
Cloud Deployment Strategy: Challenges to considerJohn Rhoton
 
Isys40051 12 is suppliers & outsourcing v2
Isys40051 12 is suppliers & outsourcing v2Isys40051 12 is suppliers & outsourcing v2
Isys40051 12 is suppliers & outsourcing v2Grenville Lannon
 
Trends in the commoditisation of information technology and the need for stra...
Trends in the commoditisation of information technology and the need for stra...Trends in the commoditisation of information technology and the need for stra...
Trends in the commoditisation of information technology and the need for stra...Alan McSweeney
 
Cloud Computing 2013: Status and Trends
Cloud Computing 2013: Status and TrendsCloud Computing 2013: Status and Trends
Cloud Computing 2013: Status and TrendsJohn Rhoton
 
Monitor activity dashboard and georrefered analysis
Monitor activity dashboard and georrefered analysisMonitor activity dashboard and georrefered analysis
Monitor activity dashboard and georrefered analysisEsri
 
2012 04-27%20%20 mobile%20security%20ppt%20presentation[1]
2012 04-27%20%20 mobile%20security%20ppt%20presentation[1]2012 04-27%20%20 mobile%20security%20ppt%20presentation[1]
2012 04-27%20%20 mobile%20security%20ppt%20presentation[1]kgbacdd
 
Cw13 cloud computing 2013-status and trends by john rhoton
Cw13 cloud computing 2013-status and trends by john rhotonCw13 cloud computing 2013-status and trends by john rhoton
Cw13 cloud computing 2013-status and trends by john rhotoninevitablecloud
 
Visualization, Mobility and Analytical Reporting
Visualization, Mobility and Analytical ReportingVisualization, Mobility and Analytical Reporting
Visualization, Mobility and Analytical ReportingPatrick Spedding
 
Big Data Journeys: Review of roadmaps taken by early adopters to achieve thei...
Big Data Journeys: Review of roadmaps taken by early adopters to achieve thei...Big Data Journeys: Review of roadmaps taken by early adopters to achieve thei...
Big Data Journeys: Review of roadmaps taken by early adopters to achieve thei...Krishnan Parasuraman
 
The Postdigital Enterprise: Harnessing Change, Managing Disruption
The Postdigital Enterprise: Harnessing Change, Managing DisruptionThe Postdigital Enterprise: Harnessing Change, Managing Disruption
The Postdigital Enterprise: Harnessing Change, Managing DisruptionCorey O'Neal
 
Internet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for valueInternet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for valueDeloitte United States
 
Identity Insights: Social, Local and Mobile Identity
Identity Insights: Social, Local and Mobile IdentityIdentity Insights: Social, Local and Mobile Identity
Identity Insights: Social, Local and Mobile IdentityJon Bultmeyer
 
Concerned About Vendor Management 10 30 12
Concerned About Vendor Management 10 30 12Concerned About Vendor Management 10 30 12
Concerned About Vendor Management 10 30 12wstippich
 
Keynote oracle entitlement-driven idm
Keynote oracle   entitlement-driven idmKeynote oracle   entitlement-driven idm
Keynote oracle entitlement-driven idmNormand Sauve
 

Similaire à Business Perspectives on Cloud Computing (20)

Digital trends rhoton-20111205
Digital trends rhoton-20111205Digital trends rhoton-20111205
Digital trends rhoton-20111205
 
Cloud Computing Challenges - Beamap
Cloud Computing Challenges - BeamapCloud Computing Challenges - Beamap
Cloud Computing Challenges - Beamap
 
A future history of content management
A future history of content managementA future history of content management
A future history of content management
 
Remote Deposit Capture Risk Management, May 2010 Update
Remote Deposit Capture Risk Management, May 2010 UpdateRemote Deposit Capture Risk Management, May 2010 Update
Remote Deposit Capture Risk Management, May 2010 Update
 
Guiding Principles for Mobile Payment Readiness
Guiding Principles for Mobile Payment ReadinessGuiding Principles for Mobile Payment Readiness
Guiding Principles for Mobile Payment Readiness
 
Cloud Deployment Strategy: Challenges to consider
Cloud Deployment Strategy: Challenges to considerCloud Deployment Strategy: Challenges to consider
Cloud Deployment Strategy: Challenges to consider
 
Isys40051 12 is suppliers & outsourcing v2
Isys40051 12 is suppliers & outsourcing v2Isys40051 12 is suppliers & outsourcing v2
Isys40051 12 is suppliers & outsourcing v2
 
Trends in the commoditisation of information technology and the need for stra...
Trends in the commoditisation of information technology and the need for stra...Trends in the commoditisation of information technology and the need for stra...
Trends in the commoditisation of information technology and the need for stra...
 
Cloud Computing 2013: Status and Trends
Cloud Computing 2013: Status and TrendsCloud Computing 2013: Status and Trends
Cloud Computing 2013: Status and Trends
 
Monitor activity dashboard and georrefered analysis
Monitor activity dashboard and georrefered analysisMonitor activity dashboard and georrefered analysis
Monitor activity dashboard and georrefered analysis
 
2012 04-27%20%20 mobile%20security%20ppt%20presentation[1]
2012 04-27%20%20 mobile%20security%20ppt%20presentation[1]2012 04-27%20%20 mobile%20security%20ppt%20presentation[1]
2012 04-27%20%20 mobile%20security%20ppt%20presentation[1]
 
Cw13 cloud computing 2013-status and trends by john rhoton
Cw13 cloud computing 2013-status and trends by john rhotonCw13 cloud computing 2013-status and trends by john rhoton
Cw13 cloud computing 2013-status and trends by john rhoton
 
Query at Speed of Thought
Query at Speed of ThoughtQuery at Speed of Thought
Query at Speed of Thought
 
Visualization, Mobility and Analytical Reporting
Visualization, Mobility and Analytical ReportingVisualization, Mobility and Analytical Reporting
Visualization, Mobility and Analytical Reporting
 
Big Data Journeys: Review of roadmaps taken by early adopters to achieve thei...
Big Data Journeys: Review of roadmaps taken by early adopters to achieve thei...Big Data Journeys: Review of roadmaps taken by early adopters to achieve thei...
Big Data Journeys: Review of roadmaps taken by early adopters to achieve thei...
 
The Postdigital Enterprise: Harnessing Change, Managing Disruption
The Postdigital Enterprise: Harnessing Change, Managing DisruptionThe Postdigital Enterprise: Harnessing Change, Managing Disruption
The Postdigital Enterprise: Harnessing Change, Managing Disruption
 
Internet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for valueInternet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for value
 
Identity Insights: Social, Local and Mobile Identity
Identity Insights: Social, Local and Mobile IdentityIdentity Insights: Social, Local and Mobile Identity
Identity Insights: Social, Local and Mobile Identity
 
Concerned About Vendor Management 10 30 12
Concerned About Vendor Management 10 30 12Concerned About Vendor Management 10 30 12
Concerned About Vendor Management 10 30 12
 
Keynote oracle entitlement-driven idm
Keynote oracle   entitlement-driven idmKeynote oracle   entitlement-driven idm
Keynote oracle entitlement-driven idm
 

Plus de John Rhoton

Cloud Computing: New Approaches for Security
Cloud Computing: New Approaches for SecurityCloud Computing: New Approaches for Security
Cloud Computing: New Approaches for SecurityJohn Rhoton
 
Cloud Computing Explained: Guide to Enterprise Implementation
Cloud Computing Explained: Guide to Enterprise ImplementationCloud Computing Explained: Guide to Enterprise Implementation
Cloud Computing Explained: Guide to Enterprise ImplementationJohn Rhoton
 
Optimizing Cloud Computing with IPv6
Optimizing Cloud Computing with IPv6Optimizing Cloud Computing with IPv6
Optimizing Cloud Computing with IPv6John Rhoton
 
Securing Cloud Services
Securing Cloud ServicesSecuring Cloud Services
Securing Cloud ServicesJohn Rhoton
 
Clouds in the Enterprise
Clouds in the EnterpriseClouds in the Enterprise
Clouds in the EnterpriseJohn Rhoton
 
Enterprise Preparation for IPv6
Enterprise Preparation for IPv6Enterprise Preparation for IPv6
Enterprise Preparation for IPv6John Rhoton
 
Unauthorized Wireless Network Connections
Unauthorized Wireless Network ConnectionsUnauthorized Wireless Network Connections
Unauthorized Wireless Network ConnectionsJohn Rhoton
 
ISSE Mobile Device Policy Enforcement
ISSE Mobile Device Policy EnforcementISSE Mobile Device Policy Enforcement
ISSE Mobile Device Policy EnforcementJohn Rhoton
 
RSA - WLAN Hacking
RSA - WLAN HackingRSA - WLAN Hacking
RSA - WLAN HackingJohn Rhoton
 
Cloud Computing: Hindernisse und Chancen für Großunternehmen
Cloud Computing: Hindernisse und Chancen für GroßunternehmenCloud Computing: Hindernisse und Chancen für Großunternehmen
Cloud Computing: Hindernisse und Chancen für GroßunternehmenJohn Rhoton
 
Peer-based Enterprise Document Workflow
Peer-based EnterpriseDocument WorkflowPeer-based EnterpriseDocument Workflow
Peer-based Enterprise Document WorkflowJohn Rhoton
 
A Critical Analysis of Microsoft Data Protection Solutions
A Critical Analysis of Microsoft Data Protection SolutionsA Critical Analysis of Microsoft Data Protection Solutions
A Critical Analysis of Microsoft Data Protection SolutionsJohn Rhoton
 
IPv6 for the Enterprise
IPv6 for the EnterpriseIPv6 for the Enterprise
IPv6 for the EnterpriseJohn Rhoton
 
Windows Mobile Enterprise Security Best Practices
Windows Mobile Enterprise Security Best PracticesWindows Mobile Enterprise Security Best Practices
Windows Mobile Enterprise Security Best PracticesJohn Rhoton
 
System Center Mobile Device Manager
System Center Mobile Device ManagerSystem Center Mobile Device Manager
System Center Mobile Device ManagerJohn Rhoton
 
Mobile Device Management
Mobile Device ManagementMobile Device Management
Mobile Device ManagementJohn Rhoton
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device SecurityJohn Rhoton
 

Plus de John Rhoton (17)

Cloud Computing: New Approaches for Security
Cloud Computing: New Approaches for SecurityCloud Computing: New Approaches for Security
Cloud Computing: New Approaches for Security
 
Cloud Computing Explained: Guide to Enterprise Implementation
Cloud Computing Explained: Guide to Enterprise ImplementationCloud Computing Explained: Guide to Enterprise Implementation
Cloud Computing Explained: Guide to Enterprise Implementation
 
Optimizing Cloud Computing with IPv6
Optimizing Cloud Computing with IPv6Optimizing Cloud Computing with IPv6
Optimizing Cloud Computing with IPv6
 
Securing Cloud Services
Securing Cloud ServicesSecuring Cloud Services
Securing Cloud Services
 
Clouds in the Enterprise
Clouds in the EnterpriseClouds in the Enterprise
Clouds in the Enterprise
 
Enterprise Preparation for IPv6
Enterprise Preparation for IPv6Enterprise Preparation for IPv6
Enterprise Preparation for IPv6
 
Unauthorized Wireless Network Connections
Unauthorized Wireless Network ConnectionsUnauthorized Wireless Network Connections
Unauthorized Wireless Network Connections
 
ISSE Mobile Device Policy Enforcement
ISSE Mobile Device Policy EnforcementISSE Mobile Device Policy Enforcement
ISSE Mobile Device Policy Enforcement
 
RSA - WLAN Hacking
RSA - WLAN HackingRSA - WLAN Hacking
RSA - WLAN Hacking
 
Cloud Computing: Hindernisse und Chancen für Großunternehmen
Cloud Computing: Hindernisse und Chancen für GroßunternehmenCloud Computing: Hindernisse und Chancen für Großunternehmen
Cloud Computing: Hindernisse und Chancen für Großunternehmen
 
Peer-based Enterprise Document Workflow
Peer-based EnterpriseDocument WorkflowPeer-based EnterpriseDocument Workflow
Peer-based Enterprise Document Workflow
 
A Critical Analysis of Microsoft Data Protection Solutions
A Critical Analysis of Microsoft Data Protection SolutionsA Critical Analysis of Microsoft Data Protection Solutions
A Critical Analysis of Microsoft Data Protection Solutions
 
IPv6 for the Enterprise
IPv6 for the EnterpriseIPv6 for the Enterprise
IPv6 for the Enterprise
 
Windows Mobile Enterprise Security Best Practices
Windows Mobile Enterprise Security Best PracticesWindows Mobile Enterprise Security Best Practices
Windows Mobile Enterprise Security Best Practices
 
System Center Mobile Device Manager
System Center Mobile Device ManagerSystem Center Mobile Device Manager
System Center Mobile Device Manager
 
Mobile Device Management
Mobile Device ManagementMobile Device Management
Mobile Device Management
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 

Dernier

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 

Dernier (20)

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 

Business Perspectives on Cloud Computing

  • 1. Business Perspectives on Cloud Computing John Rhoton Digital Trends 2011, Athens Green ICT and Cloud Computing 30/11/2011 John Rhoton – Digital Trends 2011 1
  • 2. Agenda • Assessment – Financial, Risk, Strategic • Adoption • Challenges • Guidance 30/11/2011 John Rhoton – Digital Trends 2011 2
  • 3. Business Perspective on Definition Cloud Computing is a set of technologies that help to achieve three business objectives: • Cost reduction – Virtualization, Multi-tenancy, Automation, ... • Business flexibility – On-demand, Utility-pricing, Elasticity, ... • Focus on core competency – Internet delivery, Off-premise execution, Outsourced operation, ... 30/11/2011 John Rhoton – Digital Trends 2011 3
  • 4. Two views of technology evolution No pivotal innovation vs. Very disruptive impact Network effects Competitive THEN Economy Price • Application Service Provider of Scale • Web Hosting Service • Managed Hosting Service NOW Accelerated • Software-as-a-Service Improved development • Platform-as-a-Service functionality • Infrastructure-as-a-Service Multi-tenancy. Virtualization. Utility billing. These aren’t new – Increased Adoption just a gradual evolution. The right conditions can create market disruption for evolutionary improvements. 30/11/2011 John Rhoton – Digital Trends 2011 4
  • 5. Financial Assessment • Software • Hardware • Facilities • Operations 30/11/2011 John Rhoton – Digital Trends 2011 5
  • 6. Risk Assessment • Data leakage • Rogue clouds • Data loss – Employee dissatisfaction • Service loss – Unmanaged applications – Insecure data • Compliance • Lock-in • Competitive disadvantage • Internal risks Many organizations greatly underestimate the capability and motivation of the cloud providers to address these risks. They also overestimate their own ability to eliminate these risks from internal implementations. 30/11/2011 John Rhoton – Digital Trends 2011 6
  • 7. Strategic Assessment • IT Support – Intellectual Property – Knowledge Management – Service Delivery • Agile Enterprise – Core competency – Modular services – Ecosystem 30/11/2011 John Rhoton – Digital Trends 2011 7
  • 8. Private to hybrid evolution • Resource Efficiencies • Operational Efficiencies • Sourcing Efficiencies 30/11/2011 John Rhoton – Digital Trends 2011 8
  • 9. Candidate applications Low risk, high return • Test and Development • Externalised applications – Isolate threats, malware • Redundancy – Geographical – Organizational – Technological 30/11/2011 John Rhoton – Digital Trends 2011 9
  • 10. Design challenges • Integration • User management • Reliability • Governance / SLAs • Security The most common cause of failure is underestimating these challenges 30/11/2011 John Rhoton – Digital Trends 2011 10
  • 11. Concerns and risk mitigation Risk Mitigation Data leakage Encryption Data loss Multi-source, backup Vendor Standards, multi-source, lock-in backup, exit strategy Service loss SLA, audit, certifications Compliance SLA, audit, certifications 30/11/2011 John Rhoton – Digital Trends 2011 11
  • 12. New trust basis Employees Contractors • Personal observation Physical • Personal experience Segmentation Access controls • Human Insight Partners Suppliers Auditors • Public verification Virtual Public Scrutiny Segmentation • Contracts Encryption • Compensation Experts Access controls Legal Counsel 30/11/2011 John Rhoton – Digital Trends 2011 12
  • 13. Words of Advice • Start early • Engage everyone – Users, HR, Legal, Procurement,… • Be skeptical of the skeptics • Find Quick wins – Cheap, low-risk • Prepare for the long term 30/11/2011 John Rhoton – Digital Trends 2011 13
  • 14. Summary • Assess cloud computing from financial, risk and strategic perspectives • Be prepared for disruption – Requires new trust strategy • Don’t underestimate the challenges • Accept the inevitable 30/11/2011 John Rhoton – Digital Trends 2011 14
  • 15. Thank you! John Rhoton john_rhoton@symantec.com, john.rhoton@gmail.com xing.com/profile/John_Rhoton linkedin.com/in/rhoton amazon.com/John-Rhoton/e/B001K8TFW0 slideshare.net/rhoton 30/11/2011 John Rhoton – Digital Trends 2011 15