A Cloud to Call Your Own  11 Areas of FocusPeter Silva – Technical Marketing Manager
2     What’s the Risk? Where’s the Threat?What steps is Kiplinger taking to protect against future breaches?We continue to...
3    Dynamic Control Plane Architecture               UsersApplication and Data Delivery Network                       Ava...
4 Critical Security IssuesMobilityAccidental or intentional unauthorized access to dataCompliance            “Network secu...
5Always about being Secure•   Security a Big Concern for Cloud Computing•   Security Is Stunting Adoption of Cloud Computi...
6AuthenticationDigital Identity81%:multi-factor authentication vital to securing the cloudAccess Management based on Ident...
7   Breaches $6.7 Million = data breach ave cost  (Ponemon Institute) Gartner est. $500M+ total costs 2011: 368 2010: 5...
8   ComplianceFull responsibilitywho can access datawho sees ithow it is storedfederated reportingIntegrity and securi...
9    Data Center   Power/Cooling   Cost Control   Fewer Sites   Improved Design   Virtualization                     ...
10  Encryption84%:Encryption vital to securing the cloud100% of TJX, Hannaford, HeartlandRecent breaches preventablePolicy...
11   Guests & Insiders77% felt that their strategic partners had been weakened50%+ organization isnt aware of all the clou...
12  Management71% want a tool that managed all their infrastructure Avoidance: eliminate conditions that allow the risk to...
13   NetworksBurst up/down bandwidth on demandConnect servers for auto movement of VMsProvide visibility in a dynamic envi...
14Personal DevicesMobile Workforce2008: 919 Million2013: 1.2 Billion – 35% Worldwide Workforce                            ...
15   ReliabilityAvailability is a key metricCloud performance issues costing firms €600,000 a yearCompanies struggling wit...
16You, the user                © F5 Networks, Inc.
17   ZzzzzzzzzzzzzzzzzzData Security (24%)Hardware and/or OS upgrades (13%)Heavy workloads (10%)Sufficient budgets to fund...
18Dynamic Datacenter NeedsStrategic Points of ControlEach “user” has more and more                                        ...
19     Summary     • Lots to consider when Securing a Dynamic Environment     • Security = Risk Management     • Plan care...
20More Reading• The F5 Powered Cloud• Data Centre Consolidation: Know Where You’re Going  and Why• F5 iApps: Moving Applic...
21See These Solutions in ActionF5 Technology Centers• Seattle• London (Q1)                                © F5 Networks, I...
Peter Silva – psilva@f5.com© 2011 F5 Networks, Inc. All rights reserved. F5, F5 Networks, the F5 logo, BIG-IP, ARX, FirePa...
YOUR YEAR-ROUND  IT RESOURCE – access to everything  you’ll need to know
THE WHOLETECHNOLOGY   STACKfrom start to finish
COMMENT &  ANALYSISInsights, interviews and the latest thinking on technology solutions
VIDEOYour source of live information – all the presentations from         our live events
TECHNOLOGY     LIBRARY   Over 3,000 whitepapers,case studies, product overviews and press releases from all the       lead...
EVENTS, WEBINARS &    PRESENTATIONS           Missed the event?   Download the presentations thatinterest you. Catch up wi...
DirectoryA comprehensive A-Z listing     providing in-depth    company overviews
ALL FREE TO ACCESS    24/7
online.ipexpo.co.uk
A Cloud to Call Your Own
A Cloud to Call Your Own
A Cloud to Call Your Own
A Cloud to Call Your Own
A Cloud to Call Your Own
A Cloud to Call Your Own
A Cloud to Call Your Own
A Cloud to Call Your Own
Upcoming SlideShare
Loading in...5
×

A Cloud to Call Your Own

340

Published on

The dynamic nature of Virtualization and Cloud initiatives are a blessing and a curse, since most people have overlooked the impact that the real-time changes have on the static network infrastructure.When your virtual infrastructure is changing at machine speed, your network team cannot possibly keep up using existing manual processes. Without automation, the net effect will be increased network outages, and increased MTTR, as network visibility retreats.

This presentation outlines why an automated network infrastructure directly affects the time to value of your virtualization & cloud strategy.

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
340
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

A Cloud to Call Your Own

  1. 1. A Cloud to Call Your Own 11 Areas of FocusPeter Silva – Technical Marketing Manager
  2. 2. 2 What’s the Risk? Where’s the Threat?What steps is Kiplinger taking to protect against future breaches?We continue to monitor the situation closely and will adopt procedures and practices to minimize the risk of further incidents. © F5 Networks, Inc.
  3. 3. 3 Dynamic Control Plane Architecture UsersApplication and Data Delivery Network Availability Optimization Security • Scale • Network • Network Management • HA / DR • Application • Application • Integration • Bursting • Storage • Data • Visibility • Load-Balancing • Offload • Access • Orchestration Resources APP APP APP APP OS OS OS OS APP APP APP APP Private OS OS OS OS Public Physical Virtual Multi-Site DCs Cloud © F5 Networks, Inc.
  4. 4. 4 Critical Security IssuesMobilityAccidental or intentional unauthorized access to dataCompliance “Network security continues to top the list of areas of concern”Top Concern as of July 2009 enterprise customersInterview with 151 Fortune 1000 © F5 Networks, Inc.
  5. 5. 5Always about being Secure• Security a Big Concern for Cloud Computing• Security Is Stunting Adoption of Cloud Computing• Survey Finds Cloud Security Lacking• Security experts ponder the cost of cloud computing• 58% said ‘cloud technology does not provide adequate security safeguards’• 60% of the financial services sector felt that cloud computing was not a priority or they were risk-averse to cloud computing.• Identity, data management crucial to cloud success• Security was the top concern with 73% saying such.• 42% said that security concerns have prevented their adoption of cloud computing• Preventing unauthorized access to company data was the biggest hurdle. © F5 Networks, Inc.
  6. 6. 6AuthenticationDigital Identity81%:multi-factor authentication vital to securing the cloudAccess Management based on Identity © F5 Networks, Inc. PhoneFactor
  7. 7. 7 Breaches $6.7 Million = data breach ave cost (Ponemon Institute) Gartner est. $500M+ total costs 2011: 368 2010: 553 2009: 643 Cloud: 25%-40% MORE $152 per record vs $109 in-house 60% Breached - 6% Not 89% of security incidents go unreported $1,000,000,000,000 © F5 Networks, Inc. Identity Theft Resource Center/datalossbd
  8. 8. 8 ComplianceFull responsibilitywho can access datawho sees ithow it is storedfederated reportingIntegrity and securityThe Platform - vulnerabilities that can be exploited?What happens if you stop using a cloud service?How do you know data is really deleted?Who has access to the application and data?What access rights do privileged users have? © F5 Networks, Inc.
  9. 9. 9 Data Center Power/Cooling Cost Control Fewer Sites Improved Design Virtualization © F5 Networks, Inc.
  10. 10. 10 Encryption84%:Encryption vital to securing the cloud100% of TJX, Hannaford, HeartlandRecent breaches preventablePolicy © F5 Networks, Inc.
  11. 11. 11 Guests & Insiders77% felt that their strategic partners had been weakened50%+ organization isnt aware of all the cloud servicesInsiders involved 70% to 80% of all IT crimeEvaluate all cloud activity - Cloud InventoryCreate a catalogue for employeesExamine providers for implications of blending of dataCreate a policy around cloud computing Ponemon Institute Verizon INC.com © F5 Networks, Inc. CSO
  12. 12. 12 Management71% want a tool that managed all their infrastructure Avoidance: eliminate conditions that allow the risk to be present Acceptance: acknowledge the existence but don’t do anything except for a contingency plan Mitigation: minimize the probability or impact of the risk Deflection: transfer the risk somewhere else © F5 Networks, Inc. Zenoss
  13. 13. 13 NetworksBurst up/down bandwidth on demandConnect servers for auto movement of VMsProvide visibility in a dynamic environment Drive Identity into the Network © F5 Networks, Inc.
  14. 14. 14Personal DevicesMobile Workforce2008: 919 Million2013: 1.2 Billion – 35% Worldwide Workforce © F5 Networks, Inc. IDC
  15. 15. 15 ReliabilityAvailability is a key metricCloud performance issues costing firms €600,000 a yearCompanies struggling with cloud performanceCloud apps cost firms £500,000 a year in poor performance © F5 Networks, Inc.
  16. 16. 16You, the user © F5 Networks, Inc.
  17. 17. 17 ZzzzzzzzzzzzzzzzzzData Security (24%)Hardware and/or OS upgrades (13%)Heavy workloads (10%)Sufficient budgets to fund IT projects (10%)Keeping pace with technology innovation (9%) Network World - 1,400 U.S. CIOs © F5 Networks, Inc.
  18. 18. 18Dynamic Datacenter NeedsStrategic Points of ControlEach “user” has more and more Each “application” has increasinglyaccess points distributed components Application Delivery Networking creates virtualized users, applications, resources and data regardless of location or device• Mobile devices • Service-oriented architectures• Laptops • Virtualized servers• Workstations • Cloud-based software or• Virtual Desktops • Unique ability to manage them as objects components• Personal devices with • Ideal location to enforce policies for security, enterprise access access, acceleration © F5 Networks, Inc.
  19. 19. 19 Summary • Lots to consider when Securing a Dynamic Environment • Security = Risk Management • Plan carefully19 © F5 Networks, Inc.
  20. 20. 20More Reading• The F5 Powered Cloud• Data Centre Consolidation: Know Where You’re Going and Why• F5 iApps: Moving Application Delivery Beyond the Network• Using Strategic Points of Control to Optimize the Application Infrastructure © F5 Networks, Inc.
  21. 21. 21See These Solutions in ActionF5 Technology Centers• Seattle• London (Q1) © F5 Networks, Inc.
  22. 22. Peter Silva – psilva@f5.com© 2011 F5 Networks, Inc. All rights reserved. F5, F5 Networks, the F5 logo, BIG-IP, ARX, FirePass, iControl, iRules, TMOS, and VIPRION are registered trademarks of F5 Networks, Inc. in the U.S. and in certain other countries
  23. 23. YOUR YEAR-ROUND IT RESOURCE – access to everything you’ll need to know
  24. 24. THE WHOLETECHNOLOGY STACKfrom start to finish
  25. 25. COMMENT & ANALYSISInsights, interviews and the latest thinking on technology solutions
  26. 26. VIDEOYour source of live information – all the presentations from our live events
  27. 27. TECHNOLOGY LIBRARY Over 3,000 whitepapers,case studies, product overviews and press releases from all the leading IT vendors
  28. 28. EVENTS, WEBINARS & PRESENTATIONS Missed the event? Download the presentations thatinterest you. Catch up with convenient webinars. Plan your next visit.
  29. 29. DirectoryA comprehensive A-Z listing providing in-depth company overviews
  30. 30. ALL FREE TO ACCESS 24/7
  31. 31. online.ipexpo.co.uk

×