Date post: | 21-Dec-2015 |
Category: |
Documents |
View: | 214 times |
Download: | 0 times |
Best moves to surf a virtual future
Max PetersonWaves of the futureNASA IT Summit 2011
2 Confidential
$440B2011 IT spending in
emerging markets - an increase of 10.4% over 2010
35 ZBBy 2020, the Digital Universe will be 44 times as big as it was in 2009
3B
People will connect electronically via mobile or Internet technology by 2014
$42BWorldwide spendingon Cloud Servicesby 2012
7B
The confluence of connected devices, predicted to be reached by 2017s
Welcome to the Virtual Era
Drivers of transformation for the Virtual Era
2010sVIRTUAL ERA
Virtualization
Consolidation + Abstraction
Unprecedented Data Growth
Manage, optimize, and monetize data
Cloud
Step-function increases in efficiencyand flexibility.
Convergence
From network through systems management
Mobility
Billions of end-points
3
4
Navigating the Virtual Era to help NASA meet the needs of
today andtomorrow
Architecting IT for the Mission
5
1.Information over process
2.IT embedded in business services
3.Externalized service delivery
4.Greater business partner responsibility
5.Diminished standalone IT role
6
Cloud
A Few Hyperscale CloudsCarr “Big Switch” Theory
Many Smaller Clouds“ SaaS Builders” & Corporate CloudsWhite Labels on Hyperscale Clouds
Clo
ud S
ize
Evolution of the cloud ecosystem
Number of Clouds Servicing Demand10’s 1000’s
S
L
7
Platform as a Service
Application Components as a Service
How IT will evolve towards ITaaSReal TimeInfrastructure
IntelligentCapacity
OptimizeSeparate Consolidate Contain
Data CenterAutomation
Server Consolidation
Test and Development
Computing Clouds
Leading Edge Today
Abstraction
Virtual Infrastructure
ManagementMonitoringCompliance
Orchestration(internal)Choreography(external)
Self-Service
On-DemandScalability
Policy-BasedWorkloads
Federation
Abstraction
Virtual Infrastructure
ManagementMonitoringCompliance
Orchestration(internal)
Self-Service
Abstraction
Virtual Infrastructure
ManagementMonitoringCompliance
Abstraction
Virtual Infrastructure
Abstraction
Private Cloud Model
8
Key innovations and trends are enabling solutions
9
IT
Transforming how they build, manage
& deliver
DEVELOPERS
Transforming how they consume IT
END USERS
Transforming how they use IT services
Increased Mobility Multi-Device Virtualization Convergence
Flexible Sourcing
Platform Oriented
Programming
Web-Based Applications
New App Frameworks
and Platforms
Web-based App Delivery Self-Service Self-Service
SaaSClient
Virtualization
Mobile Device Mgmt
Mobile Applications
Server Virtualization
Private Cloud (IaaS)
Public Cloud Services (IaaS)
Private Cloud (PaaS)
Public Cloud Services (PaaS)
Key trends enabling and/or driving the transformation
Current Market Embodiments of Cloud
10
Fluid Data(Credit: NOAA/GFDL)
11
Organizations are frustrated with the rigid boundaries of their existing storage systems.
Data has gone from super scarce to super abundant
…is Fluid Data.
The right data in the right place at the right time at the right cost
12
Storage pain points
Data growth is out of control, waste capacity with inefficient utilization
80% of data is inactive
$
$$
$$$
System complex and inflexible to manage
Data recovery is difficult, slow
12:1512:00
11:45
Replication is costly, unreliable
Forklift upgrades, risk of technology obsolescence
13
Strategic storage visionSeamless, automated, optimized data movement across the infrastructure
CloudRemoteoffsite
storage
Object-based
archiveBackupto tape
Backupto disk
Appservers
Primarystorage
ONSITE
NETWORK
14
Getting started today with a Fluid Data Architecture
Storage consolidation and virtualizationTiering, dedupe, automate, data movement
Application optimizationPreserve
Data protectionSecurity, classify, archive, preserve/maintain, automate
Disaster recoverySearch, restore, preserve, protect
Data retention and governanceArchive, classify, search, protect, preserve/maintain, security
15
1616
Consumerization of IT
Consumerization of IT isinevitable…
Greater worker choiceMore mobility
More devices with fewer restrictionsEnablement of new applications
Blending of work and personal devicesCultural enablement through technology
enablement
Rise of social media and newtech-focused
business models
Blurring of work
and home
The emergence
of new mobile devices
Changing employee
expectations of IT
17
…in today’s changing workplace
1. Source: Gartner, http://www.itbusinessedge.com/cm/blogs/all/no-surprise-google-at-forefront-of-consumerization-of-it/?cs=113732. Source: IDC, Impact of the Dramatic Increase in Devices on the Cost to Support, January 2009 3. Source: Gartner: Predicts 2010: PC End-User Issues, December 4, 20094. Source: Facebook, http://www.facebook.com/press/info.php?statistics5. Source: Unisys, Unisys Consumerization of IT Benchmark Study, 2010
Technology Workforce#1Consumerization of IT will make the
biggest impact on enterprise IT in thenext decade (Gartner 1)
Active users on Facebook. If it were a country, it would be 3rd largest in the
world (Facebook and world population data 4)
610M+
Percentage growth in the numberof devices IT is expected to support
by 2012 (IDC 2)
66% Workers that ranked technology
tools provided as critical in choosingan employer(Unisys 5 )
>50%
Percentage of enterprise PC configurations that will use at least one desktop virtualization technology by the
end of 2012 (Gartner 3)
60% Number of workers using smartphones
for work between 2009 & 2014(IDC via Unisys 5)
2x
Percentage of enterprises still running Windows XP71.7%
18
The power to do more
Analysis
Security
Back-End
BYOD
What’s behind the device is what’s important
19
Enterprise-class security
Enterprise-class management
Cross-platform app automation
=
Security20
Who wants to guess the date of the first publicly disclosed
hypervisor exploit?
21
What do you worry about?
COO“We need a better flow of security information into our development
cycles”
VP or Director of IT
“We need to comply with the PCI DSS
6.6 application security requirement”
CSO, CISO“I need visibility into my network so I can sleep better at night and fast response in the event of attack”
CIO“I need to effectively manage application risk with the same headcount”
22
23
Recommendations
Assess security
of cloud services providers
Assess security of any 3rd party virtual appliance images
Impact of a violation
at various layers / in various components
security trade-offs
between Public, Private and Hybrid cloud service delivery
modelsManage cloud
provider’s network access controls
Investigate new cloud-based security
solutions
Monitor Logs from cloud deployments
Trade-off of direct operational control vs. need to increase visibility and transparency
Proactively address securityThe most effective security services requires a strong combination of the right technology, people and processes.
Focus on the core threats not the noise
• Use advanced correlation in real time, to eliminate false alarms• Get filtered, prioritized, and customized threat and vulnerability
information with actionable remediation guidance• Utilize un-metered, un-tiered access to certified security
professionals that resolve issues on the first call 80% of the time
Security is more than just
compliance
• Focus on being secure, and compliance will follow• Use a security services foundation with compliance expertise for
assessment, gap analysis, remediation and reporting
Security must be
more expert & 24/7/365
• Processes 13B security events and 30k malware instances every day
• Apply knowledge from elite security researchers and global real-time visibility across thousands of client networks
• Use malware analysis and reverse engineering to develop countermeasures to active and potential threats
24
25
Surfing the Virtual Era
Not about what IT can do it’s about how you
accomplish your mission
26
Q&A:Thank you foryour time