Your SlideShare is downloading. ×
Building and Operating Clouds
Building and Operating Clouds
Building and Operating Clouds
Building and Operating Clouds
Building and Operating Clouds
Building and Operating Clouds
Building and Operating Clouds
Building and Operating Clouds
Building and Operating Clouds
Building and Operating Clouds
Building and Operating Clouds
Building and Operating Clouds
Building and Operating Clouds
Building and Operating Clouds
Building and Operating Clouds
Building and Operating Clouds
Building and Operating Clouds
Building and Operating Clouds
Building and Operating Clouds
Building and Operating Clouds
Building and Operating Clouds
Building and Operating Clouds
Building and Operating Clouds
Building and Operating Clouds
Building and Operating Clouds
Building and Operating Clouds
Building and Operating Clouds
Building and Operating Clouds
Building and Operating Clouds
Building and Operating Clouds
Building and Operating Clouds
Building and Operating Clouds
Building and Operating Clouds
Building and Operating Clouds
Building and Operating Clouds
Building and Operating Clouds
Building and Operating Clouds
Building and Operating Clouds
Building and Operating Clouds
Building and Operating Clouds
Building and Operating Clouds
Building and Operating Clouds
Building and Operating Clouds
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Building and Operating Clouds

1,539

Published on

Building and Operating Clouds: What to Do Once You Hit The On Switch …

Building and Operating Clouds: What to Do Once You Hit The On Switch

Webinar presented by:
Roy Ritthaler, Sr. Director Product Marketing, BMC

Rich Plane, Director, Solution Development and Delivery, Harris Corp.


Attendees discovered:

Building and operating cloud environments is a known science

There are commercially viable software and solution provider opportunities in the market today for cloud

Leveraging out-of-the-box software, it’s now possible to achieve an enterprise-level, fully operational cloud

Published in: Technology, Business
0 Comments
2 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
1,539
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
97
Comments
0
Likes
2
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • Rich PlaneArchitected and built the Harris Trusted Enterprise Cloud and the Harris Cyber Integration Center30-year history as a developer and enterprise consumer of information technologyC-level IT executive and thought leader in cloud computing and enterprise ITReference advisor for BMC, VCE, EMC, Cisco, and HP
  • We know that availability is important to IT, but how important is service availability in the cloud? If we look at recent history, the evidence is clear – availability matters in the cloud. There is no magic to the cloud, and it’s not a given that you can simply turn your cloud on and expect it to work flawlessly. Hardware fails. Networks fail. Even software fails! The cloud must be managed just like anything else in IT. There have recently been several high profile outages of public clouds recently. In some cases, there was no recourse for companies that relied on it to run their business. This represented a huge risk to these businesses, which went unmanaged until it caused damage. There are numerous other examples of cloud services experiencing severe challenges with availability. How can businesses trust their critical workloads to cloud environments? Sticking your head in the sand is not an option as the increased agility and cost benefits that cloud the cloud provides are increasingly leveraged as a competitive advantage.
  • How can I quickly identify issues with my cloud infrastructure to avoid outages?Before – “Silo’d cloud resource monitoring”After - Holistic Cloud Resource Monitoring & AnalyticsWhy BMC (differentiators)Single platform of analytics, events management, service impact management Tightly integrated with BSM Sophisticated analytics engine. Heterogeneous environmentHow do I enforce end-user service levels for services delivered through cloud platforms?Before – “No view of end-user experience”After – End User Service Level AssuranceWhy BMC (differentiators) Single platform to automate operation processes and help make holistic decisionsSelf-learning Analysis and Predictive Root CauseIntegration with BSMHow do I manage service availability of unpredictable real-time workloads in the cloud?Before – “Lack of visibility into cloud capacity”After – Cloud Capacity OptimizationWhy BMC (differentiators)Automated – optimal placement of cloud workloadsHolistic capacity mgmt. (server, storage, network, etc)Automated, exception-based analysis & reportingBusiness-aware capacity mgmt.BSM integrationHow can I improve service quality leveraging hybrid cloud?Before – “Unable to track app. Performance & capacity in hybrid cloud”After – Elastic cloud application service level assuranceWhy BMC (differentiators)Comprehensive coverage from end user experience to cloud resources from private, public, and hybrid cloudMap, monitor & dynamically track elastic cloud resourcesSingle platform of analytics, events management, service impact management in hybrid cloudBusiness-aware capacity optimizationHow do I ensure quality of cloud services when they are transient in nature?Before – “Unable to track movement of cloud resources and services“After – Dynamic Cloud ServicesReal-Time Predictive Service ImpactContinuous deep-dive diagnosticsUnified BSM architecture integrates operations, automation , ITSM and financial processes
  • With real-time global dashboards, you can quickly assess user impact -- you can determine where users are coming from when they access your application, and where any problems are occurring right now
  • Self Explanatory
  • Presenter’s note: The remainder of this discussion will focus in more detail on the CLOUD2 recommendations on trustThe commission’s work focused on the four “T’s”Transnational data flowsNeed for collaboration & standardization of data access across national bordersTransparencyRequire vendors to share relevant information about their capabilities, offerings and service levelsTransformationRecommendations in policy, infrastructure, and training to help facilitate broader adoption of the cloudTrustEnsuring the combination of factors that allows consumers of cloud services to be confident that the services are meeting their computing needsThe remainder of this discussion will focus in more detail on the CLOUD2 recommendations on trustCommission also generated a buyer’s guide:Buyer’s GuideAdvises the government on how to be smart adopters of cloud services
  • Security and assurance framework – specifically mentioned collaboration with NIST to develop best practices and standards and endorsed the work being done on SCAP and FedRAMP
  • Our patented trusted reference technology is comprised of two major components:The Enterprise Trust Server sits inside your infrastructure to provide detailed auditing and configuration information on demand. It can provide reports on the IT inventory, report changes in software load or configuration and assess compliance against a number of different compliance templates. It compares its measurements against known good reference configurations.The enterprise trust server communicates with the second component, the global trust repository. The global trust repository is database of cryptographically derived signatures of over 2.8B unique code components. Because of the partner relationships we have in place, most of these signatures are derived directly from the sources and we have the largest database of known provenance software signatures available.These two components work together to provide complete and high fidelity visibility and control of your platform. You know what is running on your systems, where it came from, how it’s configured and if it’s been modified since it was deployed.This provides an extra layer of protection beyond traditional security tools, but also goes beyond security to provide you with explicit evidence and trust that your platforms are configured to your expectations.Protection against zero day attacks and advanced persistent threats.Some additional stats on the GTR & ETS:The Global Trust Repository is the largest collection of reference images provided directly from the vendor and continuously updated. The GTR is a cloud service providing known-provenance whitelist measurements of commercially available and open source software. The measurements are obtained via direct partnerships with many software vendors covering a broad range of operating systems, device drivers, third-party applications, and many other types of data representing the desired state of systems comprising IT business services. The GTR statistics as of June 2011:Current Product Count ~760,000Number of Vendors over 2,000+Microsoft Windows Platform Count ~100,000 packagesUnique Signature Count over 2.8 billion +Growing at ~5 million Signatures / DayThe Enterprise Trust Server (ETS) continuously monitors all active computing devices (network devices, servers, etc.) in the IT infrastructure, comparing the signatures for all the software and firmware installed in the devices to their reference configuration to the applicable signatures in the GTR and performs change detection to provide alerts of any unauthorized, unintended, or malicious, changes to the environment.
  • 1. World Class Purpose Built InfrasturctureInfrastructure built specifically for the cloudUptime Institute Tier III reliabilityTwo physically diverse telecom pathways Two water sources used for coolingDual power sources from two separate substationsPhysical Security100’ perimeter security fence with intrusion detectionInterior and exterior motion-activated video monitoringBiometric access scanners and man-trap portal4/7/365 on-site security guardsGREEN IT:LEED Certified Silver for designA total of 39,000 registered as LEED facilities, various certifications / worldwide (LEED public directory list)13,500 of these are registered at or over 100,000 square feet / world wideTotal 2,300 certified at LEED Silver in USA / various sizesOnly 17 were certified LEED Silver thru design in USA / various sizesOnly 11 centers listed at 100k sq. ft. or larger / in USA – we are one of them.2. Green construction3. High efficiency centrifugal chillers4. Cooling water reuseMulti-zone water containment allows us to repurpose chemical-free water to use as irrigation water….which allows us to conserve water and conserve energy2. Best of Breed Systems and Processes  ITIL v3 ISO 2000024/7/365 COSC3. Trust Enablement technologyThe Global Trust Repository is the largest collection of reference images provided directly from the vendor and continuously updated. The GTR is a cloud service providing known-provenance whitelist measurements of commercially available and open source software. The measurements are obtained via direct partnerships with many software vendors covering a broad range of operating systems, device drivers, third-party applications, and many other types of data representing the desired state of systems comprising IT business services. The GTR statistics as of June 2011:Current Product Count ~760,000Number of Vendors over 2,000+Microsoft Windows Platform Count ~100,000 packagesUnique Signature Count over 2.8 billion +Growing at ~5 million Signatures / DayThe Enterprise Trust Server (ETS) continuously monitors all active computing devices (network devices, servers, etc.) in the IT infrastructure, comparing the signatures for all the software and firmware installed in the devices to their reference configuration to the applicable signatures in the GTR and performs change detection to provide alerts of any unauthorized, unintended, or malicious, changes to the environment.“We’re not building a better network ‘mousetrap’. We’re creating a new cyber delivery model for business and government enterprises.”…..…..The industry’s first enterprise-grade, high-assurance cloud computing solution
  • This slide is designed to be an opening or closing slide. This will allow the presenter to have a presentation cued up in slideshow mode without being on the title slide. The audience can take their seats, leave, or have open discussion with this slide up.
  • BMC CLM provides the foundation for cloud operations. CLM ensures that services run on the cloud can be managed and monitored against service level agreements.Key Cloud Ops features:1. Automatically install, deploy, and configure monitoring as part of CLM installation2. Guided monitoring configuration in CLM Planner3. Intelligent policy-based placement and ongoing operations with the industry’s first Service Governor4. Support for heterogeneity, from physical to virtual, multi-hypervisor, public cloud integrations and more5. Easy-to-use cloud administration and user self-service portal6. Ongoing operations with integrated ITIL operational processes, performance and capacity management Lets take a closer look at CLM. (try to tie these features to what the customer cares about)Industry-first Service Governor – for policy-based placement and ongoing managementIndustry-first multi-tier configurable Service Blueprints – for design and provisioning of cloud services, from functional model to configurable options to deployment modelsEntirely new architecture – creating the foundation for multi-datacenter and cloud-scaling applicationsEnhanced cloud administration – for both cloud service design and resource on-boarding and managementEnhanced My Services portal for request and management of cloud servicesIntegrated performance monitoring of resources and cloud servicesExpanded multi-platform support – Citrix XenServer, NetApp storage, Amazon EC2, and OVF importTighter integration with BSM portfolio – CMDB, SRM and ITSMSouthbound and northbound APIs for integrations with portals and additional resource sourcesAnd… NEW Capacity Management integrations!If the customer has existing BMC technologies, this would be a good time to highlight the role of those solutions in this cloud environment.If not, this is a time to emphasize that this is an integrated, end to end solution
  • To ensure service levels are met, Operations must ensure the availability and performance of mission critical applications running in increasingly complex, hybrid data centers – to include enterprise, SaaS, and cloud applications. Where there is continuous change due to virtualization and cloud technologies, as well as business directives to rapidly deploy new features or applications, it’s critical to proactively monitor and assess the end user experience for critical user scenarios, and to assess the impact application and infrastructure changes may have on end user performance. You need the ability to actively monitor the end-user experience to establish a normal baseline of performance over time, so that you can quickly determine when changes adversely impact performance. BMC End User Experience Mgmt (EUEM) provides both real and synthetic end user monitoring. Real User Experience – The solution monitors real user performance and behavior in real-time, providing insight into how, from where, and when users access the application so that you can be aware of and effectively manage fluctuating user demands. Synthetic – The solution deploys a software ‘robot’, physically located at or near a service consumer population center or end-user site, which periodically runs simple interactive scripts (i.e., "synthetic transactions") against the application interface and records simple statistics, such as availability, response time, and accuracy. These transactions establish a performance baseline for critical transaction flows so that you can evaluate performance over time and quickly assess the impact of application changes on the performance of those key transactions.Thomson Reuters - Quickly interrogated TrueSight’s stored transaction data and drilled down to identify the root cause, well ahead of calls coming to the help deskFull set of widgetsReal-time gauges, A/B bar graphs, etcManage on aggregate, by location, by delivery network, by audience or by user. User-defined dashboardsFocus vertical (application) or horizontal (load)Import web contentSecure export to external portals
  • In the world of hybrid clouds, it’s not enough to simply manage performance within the datacenter. It’s critical to understand and manage the end-user’s experience with services that are provisioned to the public cloud. BMC ProactiveNet Performance Management can run in the data center, in a private cloud, or in the public cloud and provides a single pane of glass to manage the performance of business services coming from outside-in or inside-out.
  • Self-explanatorySpend some time highlighting the challenges in your customer’s IT environment – or in other customers you’ve seen. This is a chance to make this a personal discussion and open up any issues they might be experiencing
  • With real-time global dashboards, you can quickly assess user impact -- you can determine where users are coming from when they access your application, and where any problems are occurring right now
  • Transcript

    • 1. Building and Operating Clouds:
      What to Do Once You Hit The On Switch
      Roy Ritthaler, Sr. Director Product Marketing, BMC
      Rich Plane, Director, Solution Development and Delivery, Harris Corp.
    • 2. Objectives
      You should leave today’s session knowing….
      Building and operating cloud environments is a known science
      There are commercially viable software and solution provider opportunities in the market today for cloud
      Leveraging out-of-the-box software, it’s now possible to achieve an enterprise-level, fully operational cloud
    • 3. Agenda
      Cloud Operations – Delivering Highly Available Clouds
      Roy Ritthaler, Sr. Director, Product Marketing
      Trust in the Cloud – From Definition to Delivery
      Rich Plane, Director, Solution Development and Delivery, Harris Corporation
      Question & Answers
    • 4. Cloud availability is business critical
      So far, cloud projects have focused on automated provisioning
      …but availability and cloud operations are usually an after thought
    • 5. Clouds are difficult to manage
      …With new cloud complexity:
      • Incredible, global scale
      • 6. Local and public resources
      • 7. Highly movable workloads
      • 8. Ongoing new/ retired services
      • 9. End-user expectations
      Traditional challenges remain:
      • Complex IT infrastructures
      • 10. End-to-End application monitoring
      • 11. Multiple data sources
      • 12. Security considerations
      The result, a loss of business reputation
      Frustrated Customers
      Long Recovery Times
      Cost and Efficiency Overruns
    • 13. Cloud Operations use cases
      Enforce service levels for services delivered through cloud
      Improve service quality with hybrid cloud
      Identify issues with cloud infrastructure to avoid outages
      Ensure quality of transient cloud services
      Optimally balance workload distribution in the cloud
      Ensure service availability of unpredictable workloads
    • 14. Operations is asking for three key capabilities
      Meet the user’s ongoing expectations for service quality
      Service Level Enforcement
      Proactive Service Performance Management
      Ensure the performance of services and infrastructure
      Continuous Resource Optimization
      Right-size capacity of individual services and the entire cloud
      Cloud Operations Solution
      Incorporate all three capabilities into a unified, modular solution
    • 15. Meet the user’s ongoing expectations for service qualityBMC End User Experience Management
      Cloud Operations
      Service Level Enforcement
      Proactive Service Performance Management
      Continuous Resource Optimization
    • 16. Ensuring Infrastructure PerformanceBMC ProactiveNet Performance Management
      Cloud Operations
      Service Level Enforcement
      Proactive Service Performance Management
      Continuous Resource Optimization
      Predictive analytics and prioritization based on business impact
      Extend service views into cloud, virtual and physical infrastructure
      Single platform to monitor private and public (Harris, AWS, Azure) clouds
    • 17. Right-size capacity of cloud services and the entire cloudBMC Capacity Optimization
      Cloud Operations
      Cloud Infrastructure Planning
      Intelligent Placement
      Service Level Enforcement
      Proactive Service Performance Management
      Assess overall health and performance of your cloud environment
      Cross-cloud visibility of resource capacity utilization and efficiency
      Provide intelligent placement advisory to Cloud Lifecycle Management
      Optimally allocate workload according to performance and policy constraints
      Continuous Resource Optimization
    • 18. Cloud Operations – The Critical Capabilities
      End User Behavior Monitoring
      Real-time business and end user impact analysis
      Predictive Service Impact
      Proactive identification of service performance problems
      Business-Aware Capacity Planning
      Continuously alignment of Cloud capacity with business demand
      Open, Heterogeneous Design
      Prevention of vendor lock-in and protection of long term business value
      Integrated Operating Model
      Integration with existing IT processes to maintain cloud services
    • 19. Harris builds a trusted cloud using BMC Software
      Harris Corp.
      • More than 16,000 employees including nearly 7,000 engineers and scientists
      • 20. $6 billion annual revenue
      • 21. Industry leader in mission critical networked systems
      Cloud Goals
      • Delivering secure services in the cloud to their customers
      Key Use Cases
      • Rapidly provision new services for customers
      • 22. Ensure customer service levels are met
      • 23. Automated event identification & remediation
      Implementation Highlights
      • Greenfield implementation, building a new business from the ground up
    • Trust in the Cloud – From Definition to Delivery
      Trust – The Industry Perspective
      Harris Perspectives on Trust
      Implementing Trust
      You Can Trust the Cloud!
    • 24. About the TechAmerica CLOUD2 Commission
      Formed to provide recommendations to Obama Administration
      • Government deployment of cloud technologies
      • 25. Public policies that will help drive US innovation in the cloud
      Participation from 71 experts across industry and academia
      Commissioned in April 2011 and final recommendations presented July 26, 2011
      Deliverables
      • Final Report of recommendations
      • 26. Cloud Buyer’s Guide
    • Summary of CLOUD2 Recommendations
      Trust
      Transparency
      Ensuring the combination of factors that allows consumers of cloud services to be confident that the services are meeting their computing needs
      Require vendors to share relevant information about their capabilities, offerings and service levels
      Transnational Data Flows
      Transformation
      Recommendations in policy, infrastructure, and training to help facilitate broader adoption of the cloud
      Need for collaboration & standardization of data access across national borders
      Committee activities were structured around the four T’s
    • 27. CLOUD2 Recommendations on Trust
      Ensuring that the cloud is meeting consumer’s needs for security, privacy, availability
      Factors Contributing to Trust
      Specific Recommendations
      • International standards for security and assurance Frameworks
      • 35. Accelerate the development of an identity management ecosystem
      • 36. Enact and improve legislation related to data breaches
      • 37. Develop a joint research agenda for cloud technology
    • Contents
      Trust – The Industry Perspective
      Harris Perspectives on Trust
      Implementing Trust
      You Can Trust the Cloud!
    • 38. The Pillars of Trust
    • 39. Barriers to the Cloud are Real
      Trust
      Cost & Control
    • 40. Defining Cyber Trust
      Assumed Trust:
      Perimeter-Centric, Heuristic and/or Blacklist-based, used for both Data in Motion and Data at Rest
      Explicit Trust:
      Infrastructure and Information-Centric with a focus on specific positive image and software reference measurement and attestation
      Intrinsic Trust:
      Building explicit, positive and immutable trust methods into the hardware and software systems, for example Root of Trust for Measurement (RTM) and Trusted Platform Modules (TPM’s), along with supply chain-anchored hardware and software provenance and attestation
    • 41. Contents
      Trust – The Industry Perspective
      Harris Perspectives on Trust
      Implementing Trust
      You Can Trust the Cloud!
    • 42. Trusted Reference Technology
      > 2.8B code component signatures as deployed directly from the source
      Firmware and software on all active network (switches, routers, firewalls) and computing components continuously monitored
      Beyond Security – Explicit Trust
      Control over your IT
      Compliance posture delivered on demand
      Software supply chain integrity
      Application Data and Signature Database
      +2000 other vendors
      Global Trust Repository
      (GTR)
      Enterprise Trust Server
      Reference
      Configurations
      Compliance Assessment
      Reporting
      Compliance Reports
      Inventory Reports
      Change Reports
      Notifications
      IT Infrastructure
    • Trust and Supply Chain
      Do I know that the software elements that I am loading and running on my platform ARE what they say they are?
      What proof do I have that the code I am using was actually built by the named vendor?
      Is an increasing concern for software & hardware vendors and users in all sectors
      Proof that the code was actually built by the named supplier is a
      crucial element of software and device validation or attestation
    • 49. Delivering Cyber Assurance Through Continuous Monitoring and Control
    • 50. Contents
      Trust – The Industry Perspective
      Harris Perspectives on Trust
      Implementing Trust
      You Can Trust the Cloud!
    • 51. The Trusted Enterprise Cloud
      World-class and purpose-built infrastructure – the Cyber Integration Center and Harris’ network of cyber facilities and operations centers
      Best-of-breed systems and processes – focused on virtualization, automation, a unique end-to-end service model, and customized control through the client portal
      Trust Enablement Technology – continuous monitoring and assessment of the device and software supply chain using our Global Trust Repository of industry standard reference images and external vulnerability feeds
      Application Data and Signature Database
      +2000 other vendors
      Global Trust Repository
      (GTR)
      Enterprise Trust Server
      Compliance Assessment
      Reference
      Configurations
      Reporting
      Compliance Reports
      Inventory Reports
      Change Reports
      Notifications
      IT Infrastructure
      The industry’s first enterprise-grade, high-assurance cloud computing solution
    • 58. Trust In The Cloud
      The industry’s first enterprise-grade, high-assurance cloud computing solution
      World class partners providing best of breed technology
      Cyber integration expertise to cost effectively meet the unique needs of your business
      Trust enablement technology that goes beyond security to unprecedented visibility and control of your infrastructure
      www.cyber.harris.com
    • 59. Q & A
      To ask a question,
      Follow Operator Instructions
      Or use the webex chat window
    • 60.
    • 61. Security ≠ Trust
    • 62. Delivering Explicit Trust: Positive Assurance Methods
      When the system needs to prove its integrity, it sends the collected measurements in a process called attestation.
      Before each subsequent level of the stack is loaded, it is measured by the preceding level and the result is stored in trusted hardware.
      Trust is established at the hardware level via Trusted Computing Group (TCG) defined standard methodologies (TPM, Integrity Management Model)
    • 63. Proving Trust: Active & Continuous Transparency
    • 64. Key Features & Benefits
    • 65. BMC Cloud Lifecycle ManagementDelivers the foundation of Cloud Operations
      Deliver business services with end-to-end cloud management
      Automatically installs, deploys and configures monitoring
      Guided monitoring configuration in CLM Planner
      Intelligent policy-based placement and ongoing operations with the industry’s first Service Governor
      Support for heterogeneity
      Integrated with key operational processes, performance and capacity management
    • 66. Organizations are waking up to the problemThey are asking for three Cloud Management capabilities ….
      Service Level Enforcement
      Meet the user’s ongoing expectations for service quality
      End-user experience is managed according to business priorities, user identity, workload, location and impact
      Proactive Service Performance Management
      Ensure the performance of services and infrastructure
      Dynamically monitor the cloud by analyzing known behaviors against established KPI’s to anticipate and automate management action
      Continuous Resource Optimization
      Right-size capacity of individual services and the entire cloud
      Optimize the cloud infrastructure capacity for maximum business impact and utilization
      Cloud Operations Solution
      Incorporate all three capabilities into a unified, modular solution
    • 67. Service Level Enforcement End to end visibility for cloud and enterprise services
      Cloud Operations
      Service Level Enforcement
      From the data-center perspective
      DB Tier
      CDN
      Service Level Enforcement
      App Tier
      End to End
      Web Tier
      BMC End User Experience Mgmt
      Deep Diagnostics
      Proactive Service Performance Management
      From the end-user perspective
      Continuous Resource Optimization
    • 68. Service Level EnforcementTurn Visibility into Action
      Cloud Operations
      Service Level Enforcement
      Proactive Service Performance Management
      Continuous Resource Optimization
      Manage horizontally – by site, by location, by customer, by delivery network
      Manage vertically – by application, business priority, audience, high value user, web page
    • 69. Proactive Service Performance ManagementExtend monitoring to public cloud resources
      Single platform to monitor hybrid (public and private) IT services
      Public Cloud monitoring OOTB – Amazon Web Services and Microsoft Azure
      Remote public cloud deployment of agents
      Cloud Operations
      Enterprise Data Center
      BMC ProactiveNet Performance Management
      Real-Time Predictive Analytics
      Service Level Enforcement
      Predictive Service Impact
      Predictive Root Cause
      Predictive Correlation
      Behavior Learning
      Proactive Service Performance Management
      Public Cloud KM
      Cloud Public API
      BPPM Agent
      BPPM Agent
      Secure Connection
      Continuous Resource Optimization
      Public Cloud Resources
      In-house Resources
    • 70. SLAs
      Risk Tolerance
      Business Volume
      Budgets
      TIME
      Continuous Resource OptimizationMaintaining the Right Infrastructure
      Optimize Physical Server Utilization
      Optimize Virtual Machine Density
      Support multi-platform, multi-vendor physical, virtual cloud resources
      Cloud Operations
      Service Level Enforcement
      IT INFRASTRUCTURE
      Proactive Service Performance Management
      vs.
      Continuous Resource Optimization
    • 71. Current Challenges
      Availability
      Reactive management processes struggling in an elastic environment
      Service Performance
      Unmet service expectations
      Risk
      High decision latency caused by information silos
      Operational Efficiency
      Service delivered by underutilized infrastructure and over burdened human resources
    • 72. Meet the user’s ongoing expectations for service qualityBMC End User Experience Management
      Cloud Operations
      Service Level Enforcement
      Proactive Service Performance Management
      Continuous Resource Optimization
    • 73. Ensuring Infrastructure PerformanceBMC ProactiveNet Performance Management
      Cloud Operations
      Service Level Enforcement
      Proactive Service Performance Management
      Continuous Resource Optimization
      Predictive analytics and prioritization based on business impact
      Extend service views into cloud, virtual and physical infrastructure
      Single platform to monitor private and public (AmazonWS, Azure) clouds
    • 74. Right-size capacity of cloud services and the entire cloudBMC Capacity Optimization
      Cloud Operations
      Cloud Infrastructure Planning
      Intelligent Placement
      Service Level Enforcement
      Proactive Service Performance Management
      Assess overall health and performance of your cloud environment
      Cross-cloud visibility of resource capacity utilization and efficiency
      Support for VMWare and Citrix XenServer environments
      Provide intelligent placement advisory to CLM
      Optimally allocate workload according to performance and policy constraints
      Increase the efficiency and utilization level of the entire cloud infrastructure
      Continuous Resource Optimization

    ×