Your SlideShare is downloading. ×
0
Building and Operating Clouds
Building and Operating Clouds
Building and Operating Clouds
Building and Operating Clouds
Building and Operating Clouds
Building and Operating Clouds
Building and Operating Clouds
Building and Operating Clouds
Building and Operating Clouds
Building and Operating Clouds
Building and Operating Clouds
Building and Operating Clouds
Building and Operating Clouds
Building and Operating Clouds
Building and Operating Clouds
Building and Operating Clouds
Building and Operating Clouds
Building and Operating Clouds
Building and Operating Clouds
Building and Operating Clouds
Building and Operating Clouds
Building and Operating Clouds
Building and Operating Clouds
Building and Operating Clouds
Building and Operating Clouds
Building and Operating Clouds
Building and Operating Clouds
Building and Operating Clouds
Building and Operating Clouds
Building and Operating Clouds
Building and Operating Clouds
Building and Operating Clouds
Building and Operating Clouds
Building and Operating Clouds
Building and Operating Clouds
Building and Operating Clouds
Building and Operating Clouds
Building and Operating Clouds
Building and Operating Clouds
Building and Operating Clouds
Building and Operating Clouds
Building and Operating Clouds
Building and Operating Clouds
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Building and Operating Clouds

1,557

Published on

Building and Operating Clouds: What to Do Once You Hit The On Switch …

Building and Operating Clouds: What to Do Once You Hit The On Switch

Webinar presented by:
Roy Ritthaler, Sr. Director Product Marketing, BMC

Rich Plane, Director, Solution Development and Delivery, Harris Corp.


Attendees discovered:

Building and operating cloud environments is a known science

There are commercially viable software and solution provider opportunities in the market today for cloud

Leveraging out-of-the-box software, it’s now possible to achieve an enterprise-level, fully operational cloud

Published in: Technology, Business
0 Comments
2 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
1,557
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
100
Comments
0
Likes
2
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • Rich PlaneArchitected and built the Harris Trusted Enterprise Cloud and the Harris Cyber Integration Center30-year history as a developer and enterprise consumer of information technologyC-level IT executive and thought leader in cloud computing and enterprise ITReference advisor for BMC, VCE, EMC, Cisco, and HP
  • We know that availability is important to IT, but how important is service availability in the cloud? If we look at recent history, the evidence is clear – availability matters in the cloud. There is no magic to the cloud, and it’s not a given that you can simply turn your cloud on and expect it to work flawlessly. Hardware fails. Networks fail. Even software fails! The cloud must be managed just like anything else in IT. There have recently been several high profile outages of public clouds recently. In some cases, there was no recourse for companies that relied on it to run their business. This represented a huge risk to these businesses, which went unmanaged until it caused damage. There are numerous other examples of cloud services experiencing severe challenges with availability. How can businesses trust their critical workloads to cloud environments? Sticking your head in the sand is not an option as the increased agility and cost benefits that cloud the cloud provides are increasingly leveraged as a competitive advantage.
  • How can I quickly identify issues with my cloud infrastructure to avoid outages?Before – “Silo’d cloud resource monitoring”After - Holistic Cloud Resource Monitoring & AnalyticsWhy BMC (differentiators)Single platform of analytics, events management, service impact management Tightly integrated with BSM Sophisticated analytics engine. Heterogeneous environmentHow do I enforce end-user service levels for services delivered through cloud platforms?Before – “No view of end-user experience”After – End User Service Level AssuranceWhy BMC (differentiators) Single platform to automate operation processes and help make holistic decisionsSelf-learning Analysis and Predictive Root CauseIntegration with BSMHow do I manage service availability of unpredictable real-time workloads in the cloud?Before – “Lack of visibility into cloud capacity”After – Cloud Capacity OptimizationWhy BMC (differentiators)Automated – optimal placement of cloud workloadsHolistic capacity mgmt. (server, storage, network, etc)Automated, exception-based analysis & reportingBusiness-aware capacity mgmt.BSM integrationHow can I improve service quality leveraging hybrid cloud?Before – “Unable to track app. Performance & capacity in hybrid cloud”After – Elastic cloud application service level assuranceWhy BMC (differentiators)Comprehensive coverage from end user experience to cloud resources from private, public, and hybrid cloudMap, monitor & dynamically track elastic cloud resourcesSingle platform of analytics, events management, service impact management in hybrid cloudBusiness-aware capacity optimizationHow do I ensure quality of cloud services when they are transient in nature?Before – “Unable to track movement of cloud resources and services“After – Dynamic Cloud ServicesReal-Time Predictive Service ImpactContinuous deep-dive diagnosticsUnified BSM architecture integrates operations, automation , ITSM and financial processes
  • With real-time global dashboards, you can quickly assess user impact -- you can determine where users are coming from when they access your application, and where any problems are occurring right now
  • Self Explanatory
  • Presenter’s note: The remainder of this discussion will focus in more detail on the CLOUD2 recommendations on trustThe commission’s work focused on the four “T’s”Transnational data flowsNeed for collaboration & standardization of data access across national bordersTransparencyRequire vendors to share relevant information about their capabilities, offerings and service levelsTransformationRecommendations in policy, infrastructure, and training to help facilitate broader adoption of the cloudTrustEnsuring the combination of factors that allows consumers of cloud services to be confident that the services are meeting their computing needsThe remainder of this discussion will focus in more detail on the CLOUD2 recommendations on trustCommission also generated a buyer’s guide:Buyer’s GuideAdvises the government on how to be smart adopters of cloud services
  • Security and assurance framework – specifically mentioned collaboration with NIST to develop best practices and standards and endorsed the work being done on SCAP and FedRAMP
  • Our patented trusted reference technology is comprised of two major components:The Enterprise Trust Server sits inside your infrastructure to provide detailed auditing and configuration information on demand. It can provide reports on the IT inventory, report changes in software load or configuration and assess compliance against a number of different compliance templates. It compares its measurements against known good reference configurations.The enterprise trust server communicates with the second component, the global trust repository. The global trust repository is database of cryptographically derived signatures of over 2.8B unique code components. Because of the partner relationships we have in place, most of these signatures are derived directly from the sources and we have the largest database of known provenance software signatures available.These two components work together to provide complete and high fidelity visibility and control of your platform. You know what is running on your systems, where it came from, how it’s configured and if it’s been modified since it was deployed.This provides an extra layer of protection beyond traditional security tools, but also goes beyond security to provide you with explicit evidence and trust that your platforms are configured to your expectations.Protection against zero day attacks and advanced persistent threats.Some additional stats on the GTR & ETS:The Global Trust Repository is the largest collection of reference images provided directly from the vendor and continuously updated. The GTR is a cloud service providing known-provenance whitelist measurements of commercially available and open source software. The measurements are obtained via direct partnerships with many software vendors covering a broad range of operating systems, device drivers, third-party applications, and many other types of data representing the desired state of systems comprising IT business services. The GTR statistics as of June 2011:Current Product Count ~760,000Number of Vendors over 2,000+Microsoft Windows Platform Count ~100,000 packagesUnique Signature Count over 2.8 billion +Growing at ~5 million Signatures / DayThe Enterprise Trust Server (ETS) continuously monitors all active computing devices (network devices, servers, etc.) in the IT infrastructure, comparing the signatures for all the software and firmware installed in the devices to their reference configuration to the applicable signatures in the GTR and performs change detection to provide alerts of any unauthorized, unintended, or malicious, changes to the environment.
  • 1. World Class Purpose Built InfrasturctureInfrastructure built specifically for the cloudUptime Institute Tier III reliabilityTwo physically diverse telecom pathways Two water sources used for coolingDual power sources from two separate substationsPhysical Security100’ perimeter security fence with intrusion detectionInterior and exterior motion-activated video monitoringBiometric access scanners and man-trap portal4/7/365 on-site security guardsGREEN IT:LEED Certified Silver for designA total of 39,000 registered as LEED facilities, various certifications / worldwide (LEED public directory list)13,500 of these are registered at or over 100,000 square feet / world wideTotal 2,300 certified at LEED Silver in USA / various sizesOnly 17 were certified LEED Silver thru design in USA / various sizesOnly 11 centers listed at 100k sq. ft. or larger / in USA – we are one of them.2. Green construction3. High efficiency centrifugal chillers4. Cooling water reuseMulti-zone water containment allows us to repurpose chemical-free water to use as irrigation water….which allows us to conserve water and conserve energy2. Best of Breed Systems and Processes  ITIL v3 ISO 2000024/7/365 COSC3. Trust Enablement technologyThe Global Trust Repository is the largest collection of reference images provided directly from the vendor and continuously updated. The GTR is a cloud service providing known-provenance whitelist measurements of commercially available and open source software. The measurements are obtained via direct partnerships with many software vendors covering a broad range of operating systems, device drivers, third-party applications, and many other types of data representing the desired state of systems comprising IT business services. The GTR statistics as of June 2011:Current Product Count ~760,000Number of Vendors over 2,000+Microsoft Windows Platform Count ~100,000 packagesUnique Signature Count over 2.8 billion +Growing at ~5 million Signatures / DayThe Enterprise Trust Server (ETS) continuously monitors all active computing devices (network devices, servers, etc.) in the IT infrastructure, comparing the signatures for all the software and firmware installed in the devices to their reference configuration to the applicable signatures in the GTR and performs change detection to provide alerts of any unauthorized, unintended, or malicious, changes to the environment.“We’re not building a better network ‘mousetrap’. We’re creating a new cyber delivery model for business and government enterprises.”…..…..The industry’s first enterprise-grade, high-assurance cloud computing solution
  • This slide is designed to be an opening or closing slide. This will allow the presenter to have a presentation cued up in slideshow mode without being on the title slide. The audience can take their seats, leave, or have open discussion with this slide up.
  • BMC CLM provides the foundation for cloud operations. CLM ensures that services run on the cloud can be managed and monitored against service level agreements.Key Cloud Ops features:1. Automatically install, deploy, and configure monitoring as part of CLM installation2. Guided monitoring configuration in CLM Planner3. Intelligent policy-based placement and ongoing operations with the industry’s first Service Governor4. Support for heterogeneity, from physical to virtual, multi-hypervisor, public cloud integrations and more5. Easy-to-use cloud administration and user self-service portal6. Ongoing operations with integrated ITIL operational processes, performance and capacity management Lets take a closer look at CLM. (try to tie these features to what the customer cares about)Industry-first Service Governor – for policy-based placement and ongoing managementIndustry-first multi-tier configurable Service Blueprints – for design and provisioning of cloud services, from functional model to configurable options to deployment modelsEntirely new architecture – creating the foundation for multi-datacenter and cloud-scaling applicationsEnhanced cloud administration – for both cloud service design and resource on-boarding and managementEnhanced My Services portal for request and management of cloud servicesIntegrated performance monitoring of resources and cloud servicesExpanded multi-platform support – Citrix XenServer, NetApp storage, Amazon EC2, and OVF importTighter integration with BSM portfolio – CMDB, SRM and ITSMSouthbound and northbound APIs for integrations with portals and additional resource sourcesAnd… NEW Capacity Management integrations!If the customer has existing BMC technologies, this would be a good time to highlight the role of those solutions in this cloud environment.If not, this is a time to emphasize that this is an integrated, end to end solution
  • To ensure service levels are met, Operations must ensure the availability and performance of mission critical applications running in increasingly complex, hybrid data centers – to include enterprise, SaaS, and cloud applications. Where there is continuous change due to virtualization and cloud technologies, as well as business directives to rapidly deploy new features or applications, it’s critical to proactively monitor and assess the end user experience for critical user scenarios, and to assess the impact application and infrastructure changes may have on end user performance. You need the ability to actively monitor the end-user experience to establish a normal baseline of performance over time, so that you can quickly determine when changes adversely impact performance. BMC End User Experience Mgmt (EUEM) provides both real and synthetic end user monitoring. Real User Experience – The solution monitors real user performance and behavior in real-time, providing insight into how, from where, and when users access the application so that you can be aware of and effectively manage fluctuating user demands. Synthetic – The solution deploys a software ‘robot’, physically located at or near a service consumer population center or end-user site, which periodically runs simple interactive scripts (i.e., "synthetic transactions") against the application interface and records simple statistics, such as availability, response time, and accuracy. These transactions establish a performance baseline for critical transaction flows so that you can evaluate performance over time and quickly assess the impact of application changes on the performance of those key transactions.Thomson Reuters - Quickly interrogated TrueSight’s stored transaction data and drilled down to identify the root cause, well ahead of calls coming to the help deskFull set of widgetsReal-time gauges, A/B bar graphs, etcManage on aggregate, by location, by delivery network, by audience or by user. User-defined dashboardsFocus vertical (application) or horizontal (load)Import web contentSecure export to external portals
  • In the world of hybrid clouds, it’s not enough to simply manage performance within the datacenter. It’s critical to understand and manage the end-user’s experience with services that are provisioned to the public cloud. BMC ProactiveNet Performance Management can run in the data center, in a private cloud, or in the public cloud and provides a single pane of glass to manage the performance of business services coming from outside-in or inside-out.
  • Self-explanatorySpend some time highlighting the challenges in your customer’s IT environment – or in other customers you’ve seen. This is a chance to make this a personal discussion and open up any issues they might be experiencing
  • With real-time global dashboards, you can quickly assess user impact -- you can determine where users are coming from when they access your application, and where any problems are occurring right now
  • Transcript

    • 1. Building and Operating Clouds:<br />What to Do Once You Hit The On Switch<br />Roy Ritthaler, Sr. Director Product Marketing, BMC<br />Rich Plane, Director, Solution Development and Delivery, Harris Corp.<br />
    • 2. Objectives<br />You should leave today’s session knowing….<br />Building and operating cloud environments is a known science<br />There are commercially viable software and solution provider opportunities in the market today for cloud<br />Leveraging out-of-the-box software, it’s now possible to achieve an enterprise-level, fully operational cloud<br />
    • 3. Agenda<br />Cloud Operations – Delivering Highly Available Clouds<br />Roy Ritthaler, Sr. Director, Product Marketing<br />Trust in the Cloud – From Definition to Delivery<br />Rich Plane, Director, Solution Development and Delivery, Harris Corporation<br />Question & Answers<br />
    • 4. Cloud availability is business critical<br />So far, cloud projects have focused on automated provisioning<br />…but availability and cloud operations are usually an after thought<br />
    • 5. Clouds are difficult to manage <br />…With new cloud complexity:<br /><ul><li>Incredible, global scale
    • 6. Local and public resources
    • 7. Highly movable workloads
    • 8. Ongoing new/ retired services
    • 9. End-user expectations</li></ul>Traditional challenges remain:<br /><ul><li>Complex IT infrastructures
    • 10. End-to-End application monitoring
    • 11. Multiple data sources
    • 12. Security considerations</li></ul>The result, a loss of business reputation<br />Frustrated Customers<br />Long Recovery Times<br />Cost and Efficiency Overruns<br />
    • 13. Cloud Operations use cases<br />Enforce service levels for services delivered through cloud<br />Improve service quality with hybrid cloud<br />Identify issues with cloud infrastructure to avoid outages<br />Ensure quality of transient cloud services<br />Optimally balance workload distribution in the cloud<br />Ensure service availability of unpredictable workloads<br />
    • 14. Operations is asking for three key capabilities<br />Meet the user’s ongoing expectations for service quality<br />Service Level Enforcement<br />Proactive Service Performance Management<br />Ensure the performance of services and infrastructure<br />Continuous Resource Optimization<br />Right-size capacity of individual services and the entire cloud<br />Cloud Operations Solution<br />Incorporate all three capabilities into a unified, modular solution<br />
    • 15. Meet the user’s ongoing expectations for service qualityBMC End User Experience Management<br />Cloud Operations<br />Service Level Enforcement<br />Proactive Service Performance Management<br />Continuous Resource Optimization<br />
    • 16. Ensuring Infrastructure PerformanceBMC ProactiveNet Performance Management<br />Cloud Operations<br />Service Level Enforcement<br />Proactive Service Performance Management<br />Continuous Resource Optimization<br />Predictive analytics and prioritization based on business impact<br />Extend service views into cloud, virtual and physical infrastructure<br />Single platform to monitor private and public (Harris, AWS, Azure) clouds<br />
    • 17. Right-size capacity of cloud services and the entire cloudBMC Capacity Optimization<br />Cloud Operations<br />Cloud Infrastructure Planning<br />Intelligent Placement<br />Service Level Enforcement<br />Proactive Service Performance Management<br />Assess overall health and performance of your cloud environment<br />Cross-cloud visibility of resource capacity utilization and efficiency<br />Provide intelligent placement advisory to Cloud Lifecycle Management<br />Optimally allocate workload according to performance and policy constraints<br />Continuous Resource Optimization<br />
    • 18. Cloud Operations – The Critical Capabilities<br />End User Behavior Monitoring<br />Real-time business and end user impact analysis<br />Predictive Service Impact<br />Proactive identification of service performance problems<br />Business-Aware Capacity Planning<br />Continuously alignment of Cloud capacity with business demand<br />Open, Heterogeneous Design<br />Prevention of vendor lock-in and protection of long term business value<br />Integrated Operating Model<br />Integration with existing IT processes to maintain cloud services<br />
    • 19. Harris builds a trusted cloud using BMC Software<br />Harris Corp.<br /><ul><li>More than 16,000 employees including nearly 7,000 engineers and scientists
    • 20. $6 billion annual revenue
    • 21. Industry leader in mission critical networked systems</li></ul>Cloud Goals<br /><ul><li>Delivering secure services in the cloud to their customers</li></ul>Key Use Cases<br /><ul><li>Rapidly provision new services for customers
    • 22. Ensure customer service levels are met
    • 23. Automated event identification & remediation</li></ul>Implementation Highlights<br /><ul><li>Greenfield implementation, building a new business from the ground up</li></li></ul><li>Trust in the Cloud – From Definition to Delivery<br />Trust – The Industry Perspective<br />Harris Perspectives on Trust<br />Implementing Trust<br />You Can Trust the Cloud!<br />
    • 24. About the TechAmerica CLOUD2 Commission<br />Formed to provide recommendations to Obama Administration <br /><ul><li>Government deployment of cloud technologies
    • 25. Public policies that will help drive US innovation in the cloud</li></ul>Participation from 71 experts across industry and academia<br />Commissioned in April 2011 and final recommendations presented July 26, 2011<br />Deliverables<br /><ul><li>Final Report of recommendations
    • 26. Cloud Buyer’s Guide</li></li></ul><li>Summary of CLOUD2 Recommendations<br />Trust<br />Transparency<br />Ensuring the combination of factors that allows consumers of cloud services to be confident that the services are meeting their computing needs<br />Require vendors to share relevant information about their capabilities, offerings and service levels<br />Transnational Data Flows<br />Transformation<br />Recommendations in policy, infrastructure, and training to help facilitate broader adoption of the cloud<br />Need for collaboration & standardization of data access across national borders<br />Committee activities were structured around the four T’s<br />
    • 27. CLOUD2 Recommendations on Trust<br />Ensuring that the cloud is meeting consumer’s needs for security, privacy, availability<br />Factors Contributing to Trust<br /><ul><li>Transparency of practices
    • 28. Accountability
    • 29. Resiliency
    • 30. Redundancy
    • 31. Access and Connectivity
    • 32. Supply chain provenance
    • 33. Life cycle integrity
    • 34. Governance</li></ul>Specific Recommendations<br /><ul><li>International standards for security and assurance Frameworks
    • 35. Accelerate the development of an identity management ecosystem
    • 36. Enact and improve legislation related to data breaches
    • 37. Develop a joint research agenda for cloud technology</li></li></ul><li>Contents<br />Trust – The Industry Perspective<br />Harris Perspectives on Trust<br />Implementing Trust<br />You Can Trust the Cloud!<br />
    • 38. The Pillars of Trust<br />
    • 39. Barriers to the Cloud are Real<br />Trust<br />Cost & Control<br />
    • 40. Defining Cyber Trust<br />Assumed Trust:<br />Perimeter-Centric, Heuristic and/or Blacklist-based, used for both Data in Motion and Data at Rest<br />Explicit Trust:<br />Infrastructure and Information-Centric with a focus on specific positive image and software reference measurement and attestation<br />Intrinsic Trust:<br />Building explicit, positive and immutable trust methods into the hardware and software systems, for example Root of Trust for Measurement (RTM) and Trusted Platform Modules (TPM’s), along with supply chain-anchored hardware and software provenance and attestation<br />
    • 41. Contents<br />Trust – The Industry Perspective<br />Harris Perspectives on Trust<br />Implementing Trust<br />You Can Trust the Cloud!<br />
    • 42. Trusted Reference Technology<br />> 2.8B code component signatures as deployed directly from the source<br />Firmware and software on all active network (switches, routers, firewalls) and computing components continuously monitored<br />Beyond Security – Explicit Trust<br />Control over your IT<br />Compliance posture delivered on demand<br />Software supply chain integrity<br />Application Data and Signature Database<br />+2000 other vendors<br />Global Trust Repository<br />(GTR)<br />Enterprise Trust Server<br />Reference<br />Configurations<br />Compliance Assessment<br />Reporting<br />Compliance Reports<br />Inventory Reports<br />Change Reports<br />Notifications<br />IT Infrastructure<br /><ul><li>Ecommerce Service
    • 43. Trading Service
    • 44. Virtual Infrastructure
    • 45. Web Servers
    • 46. Database Servers
    • 47. File Servers
    • 48. Directory Servers</li></li></ul><li>Trust and Supply Chain<br />Do I know that the software elements that I am loading and running on my platform ARE what they say they are?<br />What proof do I have that the code I am using was actually built by the named vendor?<br />Is an increasing concern for software & hardware vendors and users in all sectors<br />Proof that the code was actually built by the named supplier is a <br />crucial element of software and device validation or attestation<br />
    • 49. Delivering Cyber Assurance Through Continuous Monitoring and Control<br />
    • 50. Contents<br />Trust – The Industry Perspective<br />Harris Perspectives on Trust<br />Implementing Trust<br />You Can Trust the Cloud!<br />
    • 51. The Trusted Enterprise Cloud<br />World-class and purpose-built infrastructure – the Cyber Integration Center and Harris’ network of cyber facilities and operations centers<br />Best-of-breed systems and processes – focused on virtualization, automation, a unique end-to-end service model, and customized control through the client portal<br />Trust Enablement Technology – continuous monitoring and assessment of the device and software supply chain using our Global Trust Repository of industry standard reference images and external vulnerability feeds<br />Application Data and Signature Database<br />+2000 other vendors<br />Global Trust Repository<br />(GTR)<br />Enterprise Trust Server<br />Compliance Assessment<br />Reference<br />Configurations<br />Reporting<br />Compliance Reports<br />Inventory Reports<br />Change Reports<br />Notifications<br />IT Infrastructure<br /><ul><li>Ecommerce Service
    • 52. Trading Service
    • 53. Virtual Infrastructure
    • 54. Web Servers
    • 55. Database Servers
    • 56. File Servers
    • 57. Directory Servers</li></ul>The industry’s first enterprise-grade, high-assurance cloud computing solution<br />
    • 58. Trust In The Cloud<br />The industry’s first enterprise-grade, high-assurance cloud computing solution<br />World class partners providing best of breed technology<br />Cyber integration expertise to cost effectively meet the unique needs of your business<br />Trust enablement technology that goes beyond security to unprecedented visibility and control of your infrastructure<br />www.cyber.harris.com<br />
    • 59. Q & A<br /> To ask a question, <br />Follow Operator Instructions<br />Or use the webex chat window<br />
    • 60.
    • 61. Security ≠ Trust<br />
    • 62. Delivering Explicit Trust: Positive Assurance Methods<br />When the system needs to prove its integrity, it sends the collected measurements in a process called attestation.<br />Before each subsequent level of the stack is loaded, it is measured by the preceding level and the result is stored in trusted hardware. <br />Trust is established at the hardware level via Trusted Computing Group (TCG) defined standard methodologies (TPM, Integrity Management Model)<br />
    • 63. Proving Trust: Active & Continuous Transparency<br />
    • 64. Key Features & Benefits<br />
    • 65. BMC Cloud Lifecycle ManagementDelivers the foundation of Cloud Operations<br />Deliver business services with end-to-end cloud management<br />Automatically installs, deploys and configures monitoring<br />Guided monitoring configuration in CLM Planner<br />Intelligent policy-based placement and ongoing operations with the industry’s first Service Governor<br />Support for heterogeneity<br />Integrated with key operational processes, performance and capacity management <br />
    • 66. Organizations are waking up to the problemThey are asking for three Cloud Management capabilities ….<br />Service Level Enforcement<br />Meet the user’s ongoing expectations for service quality<br /> End-user experience is managed according to business priorities, user identity, workload, location and impact<br />Proactive Service Performance Management<br />Ensure the performance of services and infrastructure<br />Dynamically monitor the cloud by analyzing known behaviors against established KPI’s to anticipate and automate management action<br />Continuous Resource Optimization<br />Right-size capacity of individual services and the entire cloud<br />Optimize the cloud infrastructure capacity for maximum business impact and utilization<br />Cloud Operations Solution<br />Incorporate all three capabilities into a unified, modular solution<br />
    • 67. Service Level Enforcement End to end visibility for cloud and enterprise services<br />Cloud Operations<br />Service Level Enforcement<br />From the data-center perspective<br />DB Tier<br />CDN<br />Service Level Enforcement<br />App Tier<br />End to End<br />Web Tier<br />BMC End User Experience Mgmt<br />Deep Diagnostics<br />Proactive Service Performance Management<br />From the end-user perspective<br />Continuous Resource Optimization<br />
    • 68. Service Level EnforcementTurn Visibility into Action<br />Cloud Operations<br />Service Level Enforcement<br />Proactive Service Performance Management<br />Continuous Resource Optimization<br />Manage horizontally – by site, by location, by customer, by delivery network<br />Manage vertically – by application, business priority, audience, high value user, web page<br />
    • 69. Proactive Service Performance ManagementExtend monitoring to public cloud resources <br />Single platform to monitor hybrid (public and private) IT services<br />Public Cloud monitoring OOTB – Amazon Web Services and Microsoft Azure <br />Remote public cloud deployment of agents<br />Cloud Operations<br />Enterprise Data Center <br />BMC ProactiveNet Performance Management<br />Real-Time Predictive Analytics<br />Service Level Enforcement<br />Predictive Service Impact<br />Predictive Root Cause<br />Predictive Correlation<br />Behavior Learning<br />Proactive Service Performance Management<br />Public Cloud KM<br />Cloud Public API<br />BPPM Agent<br />BPPM Agent<br />Secure Connection<br />Continuous Resource Optimization<br />Public Cloud Resources<br />In-house Resources<br />
    • 70. SLAs<br />Risk Tolerance<br />Business Volume<br />Budgets<br />TIME<br />Continuous Resource OptimizationMaintaining the Right Infrastructure<br />Optimize Physical Server Utilization<br />Optimize Virtual Machine Density<br />Support multi-platform, multi-vendor physical, virtual cloud resources<br />Cloud Operations<br />Service Level Enforcement<br />IT INFRASTRUCTURE<br />Proactive Service Performance Management<br />vs.<br />Continuous Resource Optimization<br />
    • 71. Current Challenges<br />Availability <br />Reactive management processes struggling in an elastic environment<br />Service Performance<br />Unmet service expectations<br />Risk<br />High decision latency caused by information silos<br />Operational Efficiency<br />Service delivered by underutilized infrastructure and over burdened human resources<br />
    • 72. Meet the user’s ongoing expectations for service qualityBMC End User Experience Management<br />Cloud Operations<br />Service Level Enforcement<br />Proactive Service Performance Management<br />Continuous Resource Optimization<br />
    • 73. Ensuring Infrastructure PerformanceBMC ProactiveNet Performance Management<br />Cloud Operations<br />Service Level Enforcement<br />Proactive Service Performance Management<br />Continuous Resource Optimization<br />Predictive analytics and prioritization based on business impact<br />Extend service views into cloud, virtual and physical infrastructure<br />Single platform to monitor private and public (AmazonWS, Azure) clouds<br />
    • 74. Right-size capacity of cloud services and the entire cloudBMC Capacity Optimization<br />Cloud Operations<br />Cloud Infrastructure Planning<br />Intelligent Placement<br />Service Level Enforcement<br />Proactive Service Performance Management<br />Assess overall health and performance of your cloud environment<br />Cross-cloud visibility of resource capacity utilization and efficiency<br />Support for VMWare and Citrix XenServer environments<br />Provide intelligent placement advisory to CLM<br />Optimally allocate workload according to performance and policy constraints<br />Increase the efficiency and utilization level of the entire cloud infrastructure<br />Continuous Resource Optimization<br />

    ×