• Save
Secure Cloud Infrastructure and Next-Generation Data Centers – An Interactive Discussion
Upcoming SlideShare
Loading in...5
×
 

Secure Cloud Infrastructure and Next-Generation Data Centers – An Interactive Discussion

on

  • 980 views

 

Statistics

Views

Total Views
980
Views on SlideShare
980
Embed Views
0

Actions

Likes
0
Downloads
0
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Secure Cloud Infrastructure and Next-Generation Data Centers – An Interactive Discussion Secure Cloud Infrastructure and Next-Generation Data Centers – An Interactive Discussion Presentation Transcript

  • Secure Cloud Infrastructure and Next-Generation Data Centers– An Interactive Discussion Get a smarter, more strategic approach to security and cloud scaling in this must-attend, interactive, thought leadership event for enterprise technology and security decision makers. Second in a three-part series for IS and IT management professionals responsible for virtualization and data center security, architecture, management, and optimization © 2012, HyTrust, Inc. www.hytrust.com 1975 W. El Camino Real, Suite 203, Mountain View, CA 94040 Phone: 650-681-8100 / email: info@hytrust.com 1
  • Overview Meet the Experts Discussion topics:  Next-generation data centers, and the future of IT infrastructure  Key business drivers for virtualization security  Proactive, collaborative best-practices to protect your brand, IP, and “real security” Summary Q&A© 2012, HyTrust, Inc. www.hytrust.com 2
  • Meet the Experts Hemma Prafullchandra, CTO/SVP Products, HyTrust, Inc. Janakan Rajendran, CIO, Global Net Access Bob West, CEO, Echelon One Eric Chiu, President/Founder, HyTrust, Inc.© 2012, HyTrust, Inc. www.hytrust.com 3
  • Discussion: Data Center of the Future – 3 year Vision “Rented” Cloud SaaS Application Infrastructure Self-Service Access Identity and UsageConsolidation & IT as a Virtualization Ubiquitous Access Service Data Cost End result of datacenter transformation: IT is delivered as-a-service; Role of Corporate IT is transformed from operational to control / governance © 2012, HyTrust, Inc. www.hytrust.com 4
  • Discussion: Future of IT Infrastructure? Intel Cloud Builders Reference Architecture HyTrust, VMware, and Intel PCI-Compliant Cloud Reference Architecture Cisco, VMware, Trend Micro, HyTrust, Savvis, and Coalfire NIST SP800-125: Guide to Security for Full Virtualization Technologies Cisco Validated Design Cisco, RSA, EMC, VCE, and HyTrust© 2012, HyTrust, Inc. www.hytrust.com 5
  • Audience Poll When are you planning your next server refresh?  Within 12 months as part of a full data center re-architecture  Within 12 months as standalone server refresh  Greater than 12 months as part of a full data center re-architecture  Greater than 12 months as standalone server refresh  No server refresh or data center re-architecture planned  Unknown© 2011, HyTrust, Inc. www.hytrust.com 6
  • Discussion: Key Drivers and Business Trends? Virtualize More… Analyst research shows market is now 52% virtualized, with many organizations goaled to be 75% virtualized by 2014. * Virtualize More Securely… There are now more than 800,000 vSphere admins.** “Virtualization increases security risk by 60%.”****Forrester Research CISO’s Guide to Virtualization Security 2012** VMware, Vmworld presentation with EMC, Vmware, HyTrust 2011***Gartner; “From Secure Virtualization to Secure Private Clouds”; Neil MacDonald & Thomas J. Bittman; 13 October 2010 © 2012, HyTrust, Inc. www.hytrust.com 7
  • Organizations are rapidly adopting virtualization including mission-critical workloads 100% Cost Savings Compliance Risk Enterprise Platform% of Workloads Virtualized Extensive Production Limited Production Mission-Critical Workloads Develop/Test Non-Mission-Critical Workloads 0% Non-Compliant Limited Compliance Compliant Best-Practice Management & Automation Tools Become Necessary 8 © 2012, HyTrust, Inc. www.hytrust.com
  • Discussion: How Best to Align Broader Objectives? Recent VMware Executive Brief CFO CIO Implications for CSOCost Cost transparency Do more with the Limited or no budget same/less budget (Need very compelling event, Forecast accuracy Resource planning or to tightly align to revenue generation)Agility Investment analysis Modernize legacy IT Accountable for security solution that matches agility of Select the right cloud virtualization strategyRisk Mitigate potential Gain control over Accountable for security of corporate risk IT workload leakage to virtual assets that Do Not exist yet. Adhere to security Manage data and and Compliance application securityVMware /CFOWorld , “Aligning CFO and CIO Priorities” 2011 http://www.vmware.com/files/pdf/cloud/VMware_CFOWorld_Aligning_CFO_CIO.pdf © 2012, HyTrust, Inc. www.hytrust.com 9
  • Key Drivers to Protect Brand and Secure IP87% Percentage of companies that have experienced a data breach — IT Compliance Institute48% Percent of all breaches that involved privileged user misuse — Verizon report, 201074% Percentage of breached companies who lost customers as a result of the breach — IT Compliance Institute© 2012, HyTrust, Inc. www.hytrust.com 10
  • Discussion: Future of IT Talent? What does the skillset of future IT professionals look like? Dice.com Survey: Top-ten “Tough-to-fill” IT Skills: #1 Security #2 Virtualization© 2012, HyTrust, Inc. www.hytrust.com 11
  • Audience Poll What security concern ranks highest in importance in your virtualized environments heading into 2012?  Lack of automation (admin is brought in for every update and change)  Self service for line of businesses to access/manage their virtual machines  Strength of security policies and processes around access and change controls  Insider threat – either malicious or errant  Logging and reporting tools for audit and/or forensics purposes  All of the above© 2012, HyTrust, Inc. www.hytrust.com© 2011, HyTrust, Inc. Inc. www.hytrust.com 12 © 2012, HyTrust, www.hytrust.com
  • Best Practices and Guidance – What Can You Do Today?Consider the right access for the right people in your virtual environs Cut back or eliminate access rights for those not on the projects Manage the networks as well Take full inventory on regular basisAutomate to drive scalability Consider management tools to streamline workflow Drive security policy automation to prevent mistakes © 2012, HyTrust, Inc. www.hytrust.com 13
  • Best Practices and Guidance – What Can You Do Today?Create the business case for change Show costs of Not doing it (i.e. 87%) Be proactive and collaborative with IT, Security to understand and identify the business problem Create a planDon’t be scared! © 2012, HyTrust, Inc. www.hytrust.com 14
  •  hemma@hytrust.com jrajendran@gnax.net bob.west@echelonone.net eric@hytrust.com sales@hytrust.com© 2012, HyTrust, Inc. www.hytrust.com 15
  •  hemma@hytrust.com jrajendran@gnax.net bob.west@echelonone.net eric@hytrust.com sales@hytrust.com© 2012, HyTrust, Inc. www.hytrust.com 16
  •  hemma@hytrust.com jrajendran@gnax.net bob.west@echelonone.net eric@hytrust.com sales@hytrust.com© 2012, HyTrust, Inc. www.hytrust.com 17
  •  hemma@hytrust.com jrajendran@gnax.net bob.west@echelonone.net eric@hytrust.com sales@hytrust.com© 2012, HyTrust, Inc. www.hytrust.com 18