Whether or not you believe that IT is experiencing a
revolution, it is clear that a number the fundamentals of how
the IT infrastructure is built are changing. Server and storage
virtualisation, cloud-based delivery models, data centre
convergence onto 10 Gigabit Ethernet and the unification of
voice communications mechanisms are all symptomatic of
this. But IT is a two-edged sword: with every innovation
come a new set of risks to be mitigated, holes to be filled,
policies to be set and compliance objectives to be stuck to. In
the face of such rapid change, how exactly should
organizations large and small be thinking about security?
What are the pot-holes along the road, and how can they be
avoided?
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Securing Technologies in a Converging Landscape
1. Securing the Un-securable? Technology Convergence/Divergence and the Changing Face of Security Jon Collins, Managing Director Freeform Dynamics Ltd [email_address] www.freeformdynamics.com
12. No one size fits all for virtualisation Servers Storage Desktops
13. Adopters starting to appreciate architectural impact SERVER 1 SERVER 2 SERVER 3 STORAGE A STORAGE B STORAGE C VIRTUALISED SERVER WORKLOAD 1 WORKLOAD 2 WORKLOAD 3 INTERFACE STORAGE A STORAGE B STORAGE C
16. The new computing – back to the future? Web Servers Messaging Servers Security Server Directory. Servers ID Server Proxy Server App Servers Integration Servers Transaction Servers File Servers Database Servers Media Servers Portal Server Presentation Processing Data
17. Moving from technologies to services Email Internet Application Desktop Server Network VS TECHNOLOGY COMPONENTS SERVICES
18. Bottom-up vs Top-down Making everything “just work” Making a real difference to business IT as bottleneck IT as foundation IT as differentiator INCREASED EFFICIENCY INCREASED EFFECTIVENESS
25. Thank You Jon Collins, Managing Director Freeform Dynamics Ltd [email_address] March 2010 www.freeformdynamics.com
Editor's Notes
Technology Convergence/Divergence and the Changing Face of Security Whether or not you believe that IT is experiencing a revolution, it is clear that a number the fundamentals of how the IT infrastructure is built are changing. Server and storage virtualisation, cloud-based delivery models, data centre convergence onto 10 Gigabit Ethernet and the unification of voice communications mechanisms are all symptomatic of this. But IT is a two-edged sword: with every innovation come a new set of risks to be mitigated, holes to be filled, policies to be set and compliance objectives to be stuck to. In the face of such rapid change, how exactly should organizations large and small be thinking about security? What are the pot-holes along the road, and how can they be avoided?
This presentation is aimed at Emulex channel partners. Understand that the theme is convergence and what it enables – so this presentation takes the top-down view of what’s driving needs. First thing that needs to be mentioned is the downturn.
That’ll be a storage issue then
Introduce Fortress IT Attack vectors are evolving from individual targets to more complex ways of getting round protection At same time. Attackers are moving to a more organised state – criminal activity driven BUT Organisations are looking to deperimeterise – how to square that?
Are we really any better off when we respond to technology hype?
Note however that while many organisations may be deploying virtualisation, that may only be for a minority of servers. We’re still in the pilot phase, and knowledge levels are low.
Early adopter experiences are not that common for broader use of server virtualisation. But what’s clear is that scaling is a big issue – storage and networking bottlenecks are quickly reached.
In practical terms – this means the adoption of 10GBaseT. It solves the problems – or acts as a catalyst to do so
Bluntly, are we recreating the mainframe? Ideally, the answer would be yes – as the mainframe had plenty of good things. However one thing it didn’t bring was the kind of flexibility we have grown used to in distributed architectures. IT therefore becomes more and more about dealing with the white space between the components
Services lead to service delivery, service contracts etc
Perhaps the answer lies in a more integrated view of security