technology trends today l.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
Technology Trends Today PowerPoint Presentation
Download Presentation
Technology Trends Today

Loading in 2 Seconds...

  share
play fullscreen
1 / 28
minty

Technology Trends Today - PowerPoint PPT Presentation

146 Views
Download Presentation
Technology Trends Today
An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.

- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

  1. Technology Trends Today Nicklous Combs, EMC Federal Chief Technology Officer

  2. Megatrends: Move to the Next Generation Data Center • Deployment of ubiquitous IP networks • Expansion of networked consumer electronics • Explosion of digital content • Movement to unified communications • Advancement of highly scalable, low cost compute • Convergence of networks, compute and storage • Recovery of the economy yields technology refresh • Desirability of a IT utility model • Appetite for new applications

  3. Information Today 1.8 Zb Information Growth 95% Mostly unstructured 85% Mostly unmanaged 85% Responsibility of organizations ▲ Becoming more regulated Information

  4. Waves of Information Technology Mainframe Mini PC / Micro-processor Networked/ Distributed Computing Next Cloud Mid-’60s -’70s 70s-80s Late 70s-’90s Mid-’90s-Today IBM Burroughs Univac NCR Control Data Honeywell NEC … DEC IBM DG Wang Prime Apollo … Microsoft Intel Apple IBM Sun HP Compaq … Cisco Netscape Google Microsoft Oracle EMC Salesforce.com . . .

  5. What Cloud Computing Needs to Solve: IT Infrastructure is Too Hard to Manage Where IT Energy is Spent Today 5%InfrastructureInvestment IT Budgets: >70% just maintaining the status quo 23%ApplicationInvestment <30% 42%InfrastructureMaintenance goes to innovation andcompetitive advantage 30%ApplicationMaintenance Mission Execution DEPENDS ON IT Agility Source: VMware Fortune 100 Customers

  6. Market Forces • The Economy • Administration priority • Anytime, anywhere IT • Tectonic shift in technology • Business Forces • Information Growth • Defer and avoid costs • Fix the IT bottleneck • Map supply and demand more effectively • De-capitalize IT CLOUDCOMPUTING • Perceived barriers to a new approach • Security • Compliance issues: Transparency, citizenship, data location regulations • Interoperability: Vendor lock in, Integration, Application rewrites Forces driving change

  7. Build the Bridge to the Private Cloud THE Bridge wherecustomers are ThePrivate Cloud Today’sIT World THE Journey Increasing complexity,inflexibility, and cost oftraditional IT environments of fully automatedand virtualizeddata centers Unprecedented levelsof efficiency, control, choice

  8. What’s the Promise of Cloud Computing? Data Center Customers Will Realize Unparalleled Savings Dynamic pools of virtualized resources 1 It's built differently Highly automated low-touch and zero-touch models 2 It's operated differently Convenient consumption, sometimes pay-as-you-go 3 It's consumed differently CloudComputing

  9. Rapid deployment model of virtualized infrastructure Preintegrated and validated solutions reduce total cost of ownership (TCO) Service level driven through predictable performance and operational characteristics Improved compliance/security and reduced risk Converged Infrastructure: A New Way to Deliver IT Solution Packages Rich APIs ResourceManagement Security Network Compute Virtualization Storage Accelerate Time to Results – Reduce TCO

  10. Impact: Converged Infrastructure Customer Example Server Provision Cycle Cut from 46 days to 35 minutes Server Costs Reduced by 40% Hardware Deployment Time Decreased by 40% Overall Hardware Utilization From less than 10% to more than 40%

  11. Policy-driven Infrastructure enables Private Cloud Business Requirements Application Operating System # Users SLA (Gold, Silver, Bronze) Etc… IT Requirements # VMs Disk Capacity (MB) SynchronousReplication Fault Tolerant Security Policy Etc… Enable choice and flexibility, retain control Define Translate Map Deploy • Enables business requirements to translate to IT resources • Business owner inputs application, uptime, number of users, business continuity, backup, and security requirements • Resources are rapidly assigned according to user specification reducing time to application availability Storage Template Compute Template Fabric Template Application Template

  12. Security Architecture for the Cloud

  13. Multi-INT Fusion in an Agile Operation Center Scenario Overview Case Management Collaboration Content Security Media WorkSpace TaskSpace FTP SOAP .KML Media Transformation Services Transform Images Extract Metadata Assemble Content Integration Services Content Store Single-INT Application Media Delivery Services Business Process Management MPP Data Warehouse Queries (Big Data) Populate Virtual Case File with supporting content Private Cloud

  14. Journey to the Cloud 85% 95% Broad adoption of service model Virtualized, proven solutions 50% Cloud operating system and model 30% Virtual data center-centric systems management 15% Private cloud-enabled infrastructure

  15. Architect for the Future

  16. Conclusion • Cloud evolution has launched • Adoption will accelerate and last 24-36 months • Converged infrastructure is the foundation • Innovation will be led by market leaders • Cost matters but the need is speed 1 2 3 4 5

  17. Security challenges in today’s virtualized and cloud environments

  18. The Challenge • Cyber security is major national and economic security issue • Protecting assets and managing access to IT resources has never been more important • Cloud computing is expanding the attack surface and breaking traditional network boundaries. • Do our current security architectures meet the threats?

  19. Security: A Core Component of the Cloud Federation Virtualization Information CloudComputing Security Flexible Dynamic On-demand Efficient Trusted Control Reliable Secure PrivateCloud Virtualized Data Center Internal cloud External cloud 19

  20. Provide Cybercrime Intelligence Based on Feeds from the Dark Cloud Dark Cloud Dark Cloud Malware Infection Point Botnet Herders eFraudNetwork Hacker Forum Discussion Trojan Mothership USER 4 Corp 5 USER 3 Stolen Files Repository Corp 6 USER 2 Stolen Credentials Database Corp 7 USER 1 First level of defense: Cybercrime intelligence Second level of defense: Strong authentication Third level of defense: Information rights management GSA

  21. Traditional Computing: The Network Security Perimeter is Aligned with Policy Boundaries APP APP APP APP APP APP OS OS OS OS OS OS APP APP OS OS Physical Infrastructure Physical Infrastructure Attackers Infor-mation Identity Infor-mation Identity Enterprise #2 Enterprise #1

  22. Adoption of Cloud Computing is Expanding the Enterprise Attack Surface Remote Employees Partners Customers IP Sent to non trusted user Stolen IP App, DB or Encryption Key Hack Fraud Stolen Credentials Channels Channels Channels Partner Entry Points Partner Entry Points VPN Endpoint theft/loss Privileged User Breach Inappropriate Access Tapes lost or stolen Data Leak Via USB/Print Public Infrastructure Access Hack Unintentional Distribution (Semi) Trusted User Misuse Discarded disk exploited Internal Employees Network Leak Email-IM-HTTP-FTP-etc. Storage Network Endpoint Apps/DB FS/CMS Privileged Users Contractors Privileged Users Privileged Users Privileged Users Backup Tape File Server Production Database Enterprise Applications SharePoint eRoom, etc. Backup Disk Disk Arrays Business Analytics Replica

  23. Private Clouds demand a Policy-aware “Trusted Zone” for Data, VMs, and Identities APP APP APP APP APP APP OS OS OS OS OS OS APP APP OS OS Physical Infrastructure Physical Infrastructure Attackers Information Information Virtual Infrastructure Virtual Infrastructure Identity Identity Physical Infrastructure Cloud Provider Tenant #1 Tenant #2

  24. Trusted Zones Key Capabilities APP APP APP OS OS OS APP OS Cloud Provider Physical Infrastructure Anti-malware Isolate infrastructure from Malware, Trojans and cybercriminals Cybercrime intelligence Federate identities with public clouds Identity federation Tenant #2 Strong authentication Virtual Infrastructure Control and isolate VM in the virtual infrastructure Virtual network security Isolate information among tenants Tenant #1 Data loss prevention Virtual Infrastructure Segregate and control user access Isolate information from cloud providers’ employees Access Mgmt Encryption & key mgmt Tokenization Physical Infrastructure Security Info. & Event Mgmt Enable end to end view of security events and compliance across infrastructures GRC

  25. Pushing information security enforcement in the virtualization and cloud infrastructure ensures consistency, simplifies security management and enables customers to surpass the levels of security possible in today’s physical infrastructures Virtualization Enables More Effective Security by Pushing Enforcement Down the Stack vApp and VM layer APP APP OS OS Virtual and cloudinfrastructure APP APP OS OS Today most security is enforced by the OS and application stack making it ineffective, inconsistent and complex Physical infrastructure

  26. Monitoring and Managing Corporate Policy Compliance Tenant #2 Virtual Infrastructure APP APP APP OS OS OS Tenant #1 APP Virtual Infrastructure OS Cloud Provider Physical Infrastructure Across virtual, physical, internal and external infrastructures Virtual infrastructure management GRC Compliance Dashboard:End-to-end compliance reporting End-to-end security event management Security configuration and vulnerability management for physical and virtual infrastructures

  27. Securing the Cloud Securing the private cloud Securing the public cloud Delivering products as cloud services Securing the virtual datacenter Federation between internal and external clouds Security-aware cloud infrastructures Strong authentication Access management Identity protection Cybercrime monitoring Adaptive Authentication, FraudNetwork Delivered by MSSP or other cloud providers

  28. Thank you!