More Related Content Similar to Security Considerations on Hybrid Cloud (20) Security Considerations on Hybrid Cloud1. © 2009 IBM Corporation
Davide Sormani
22 September 2014
Security considerations
on Hybrid Cloud
2. IBM Presentation Template Full Version
Hybrid Cloud
On Premise Off Premise
And traditional IT
Source: IBM corporation
Security
Performance
Control
Pay-per-use
Elasticity
Speed
© 2014 2 IBM Corporation
3. Strategic Impact
Shift IT expenditure model:
from capital expenses to operating expenses
Needs adressed
Temporary capacity expansion
Scale with demand
Network optimization
Development lifecycle
© 2014 3 IBM Corporation
4. Market share and expectations
IBM Microsoft HP Cisco Oracle Accenture VMware Dell Google
20%
15%
10%
5%
0%
61% 70% Of Hybrid cloud
users by end of
2014
Source: Technology Business Research Inc.; 2014; IBM Center for applied insights
Of customers
will increase
hybridization
© 2014 4 IBM Corporation
5. Present Scenario
Sensitive and mission-critical resources on a private
cloud and easily accessible ones on public cloud
Adopters
Manufacturing 33%
F&A 18%
Public 2%
Healthcare 4%
Retail 18%
Telco/Media 6%
Other 19%
Source: Technology Business Research Inc., 2014
Do not have
cloud
50%
Not
integrated
adopter
30%
Integrated
cloud
adopter
20%
© 2014 5 IBM Corporation
6. Main challenge
of respondant* claimed that
data security concerns is
the number one inhibitor for
hybrid cloud
50%
* IDC 2013 Global Cloud Track survey
Is it possible to get
all the benefits of
hybrid cloud and
minimize tradeoffs?
© 2014 6 IBM Corporation
7. Softlayer® Security Services
Vulnerability scanning
Antivirus and anti-spyware protection
Host-based intrusion protection
Firewall and network based threat protection (IPS,
DDoS)
Network Gateways
Virtual Private Networking (VPN)
SSL Certificates
© 2014 7 IBM Corporation
8. New Security Agreement
Softlayer® and Intel®
Intel® TXT
on bare metal servers
Hardware monitoring and security at chip level
Chain of trust: integrity from firmware,
software and hypervisor
Every component marked trust or untrust
© 2014 8 IBM Corporation
9. How Intel® TXT meets the challenge
Workloads on a Trusted Compute Platform
Principal Buildings blocks:
Trusted Platform Module (TPM)
Root of trust
Supported Intel® processor:
Intel® Xeon® E5-2600 v2
Intel® Xeon® E3-1200 v3
Intel® Xeon® E5-4600
© 2014 9 IBM Corporation
10. New Perspective
Certify a cloud computing pool is appropriately
secured for workloads
Protection
Visibility
Control
Trust
Governance and enterprise risk
Information and life-cycle
management
Compliance and audit regulations
Application security
Identity and access
management
Incident response
© 2014 10 IBM Corporation