Presentation wsta


Published on

Published in: Technology
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide
  • What is Network Virtualization? Network Virtualization is the abstraction and automation of the Network so that a user or application can make simple requests (ie Ensure premium customers get the highest quality service) and the relevant Network devices are automatically configured and synchronized to meet the request. All the complexity of different vendors, different Operating Systems, compliance, security, best practices, command sequencing, device discovery and config validation all happen under the covers. If any of these components are missing, the solution is incomplete and won’t be able to reliably automate and synchronize the Network. How does Network Virtualization relate to Server Virtualization? Server Virtualization promised cost savings through consolidation, automation and simplification - The realization of these benefits require dynamic resource allocation through flexible capacity scaling and VM migration which in turn requires a dynamic, automated Network. Network Virtualization is the logical next step to complete the Virtual Stack. Today in Enterprises, when VMs are deployed or have to be moved, a highly skilled Network Engineer or team of Engineers has to configure each device manually or by “cut and paste” script. The 5-10 minutes it takes to fire up a new VM , has just taken days to weeks to connect to the user. Network Virtualization takes minutes to get the user securely connected and can do so fully autonomously or through a high-level self-service portal.
  • Network Virtualization bridges Virtual and physical environments, acting as the glue between different components in a heterogeneous environment. Security: The Network is the first line of defense. Unifying and standardizing the Network through Network Virtualization ensures that Security Best Practice gets implemented automatically. 3. Efficiency: Network Virtualization aligns complex, specialized Network sequences to Application and user level decisions, allowing users without Network Expertise to safely configure network customizations from a self-service portal. 5. Revenue Network Virtualization exposes the Bells and Whistles you’ve already paid for in your Network Devices as allocatable resources and services that can be repackaged and resold as premium services to consumers, B2B partners and vendors.
  • Solution leverages best-in-breed Network Virtualization technology and products and integrates the solution with existing virtualization and management environments for comprehensive solution with measurable returns across the data center. In the Virtualization Resource paradigm, This solution delivers the Security Resource and the Connect Resource to existing Compute and Storage Resources. The Security Resource layers security throughout the infrastructure and application to enforce the security paradigms and best practices of the Cloud or data center operator, as well as implementing and mitigating conflicts with user-selected Business Rules and Security policies. The Connect Resource simplifies and automates the connections both within the infrastructure (eg between application tiers) and to the outside world. As Connect and Security Resources are so tightly dependent on each other (two-sides of the same coin), a successful Network Virtualization solution must address both and integrate both within the context of the whole management environment.
  • m2mi Products and Technology because m2mi is the only Network Virtualization Vendor to address both Security and Connect Resource virtualization in a single product offering and is the only vendor to directly configure multiple device vendors equipment.
  • The number one concern of potential Cloud adopters is SECURITY. There are a number of vendors offering point solutions, from new hardware devices to management schemes. m2mi’s products knit the considerable Security assets already in the data center, along with new Cloud-specific solutions, together and abstract them into a Virtual, easy to manage Resource that is then available to users and applications for robust resilient protection. This slide shows just some of the components of that security.
  • In addition to realizing the benefits of Server Virtualization and Cloud Computing, Network Virtualization delivers ROI of its own.
  • Demo Text to Follow.
  • Presentation wsta

    1. 1. Will Albert May 12, 2011 Wall Street Technology Association
    2. 2. Network Virtualization Overview Network Virtualization Solution Solution Differentiation Solution Impact & ROI m2mi Demo: Secure Cloud Provisioning
    3. 3. <ul><li>A Cloud Requires Network Virtualization to Realize Dynamic Computing </li></ul><ul><li>Server Virtualization consolidates server or Compute resources and enables dynamic capacity allocation and optimization. </li></ul><ul><li>Network Virtualization completes this for the Network or Connect and Security resources, realizing the expected cost, flexibility and resilience ROI of virtualization. </li></ul>STORAGE COMPUTE CONNECT and SECURITY Virtualized Physical Layer Logical Resource Layer Security Connect Storage Compute Interface Layer Self Service Management Portal
    4. 4. <ul><li>Why Virtualize the Network? </li></ul><ul><li>Security: The Network is the Gateway to your Data, but Network Security is labor intensive and complicated. Virtualizing the Network properly, integrates security best practices into every Configuration and every change or action in the Cloud. </li></ul><ul><li>Agility: With Server Virtualization, consolidation and Cloud computing comes an increasing rate of change in the data center. Without secure automation and multi-vendor synchronization, the Network cannot keep up and your users cannot get access. </li></ul><ul><li>Efficiency & Cost: Network Virtualization allows non-expert Cloud Application owners and admins to safely allocate Network resources, limiting the repetitive tasks required of highly skilled Network Experts. Saving time and money on costly limited resources. </li></ul><ul><li>Reduction of Errors: On the Network, mistakes are critical, resulting in outages, security vulnerabilities and lost revenue. Network Virtualization standardizes all changes and is constantly validating configurations to identify vulnerabilities and previous errors. </li></ul><ul><li>Revenue: Virtualizing advanced Network features like Quality of Service, Traffic Prioritization and Data Encryption provides the opportunity to meter, bill and resell these Premium services to customers with greater application needs. </li></ul>
    5. 5. <ul><li>What does it take to Virtualize the Network? </li></ul><ul><li>MULTI-VENDOR Automation: A Network Virtualization solution MUST support multi-vendor network device automation, ie direct interactions on hardware/software devices. This unifies the Network into a single resource and prevents vendor lock-in. </li></ul><ul><li>Orchestration: To abstract Network configuration and best practices and to align Network change to higher level Cloud Resource tasks, Network Virtualization must synchronize and orchestrate Network automation and Roll Back any incomplete changes. </li></ul><ul><li>Intelligence & Fault Tolerance: Customers rarely know their Network. Network Virtualization must efficiently autodiscover relevant devices, must validate configuration prior to changes and be smart enough to accomplish safe tasks even if the Network is not as expected. </li></ul><ul><li>Interoperability & Universal Open Standard Interfaces: Every Network owner has invested in Management, Workflow, ID Management, Virtualization, etc. Network Virtualization must integrate with all of these systems both to grab information from and pass feedback to. </li></ul><ul><li>End-to-End Security: In abstracting and synchronizing the Network, Network Virtualization has the opportunity to layer levels of security across the infrastructure, seamlessly integrating disparate approaches into a unified, orchestrated defense. </li></ul><ul><li>Change Management & Compliance: Automating critical changes to the Network necessitates auditable change logging and compliance reporting. Advanced systems can be leveraged as After Action Reports and efficiency metrics. </li></ul>
    6. 6. <ul><li>Integrates existing Server and Storage Virtualization with m2mi Network Virtualization technology to disable vendor lock-in, reduce current budgets and provide resilient dependable services </li></ul><ul><li>SECURITY: Synchronizes and Automates Global Security Policies and Best Practices across All Resources </li></ul><ul><ul><li>Implements Multi-level Security, Layering Application and Network Security with Traffic, Access Control and Resource Security </li></ul></ul><ul><ul><li>Provides Auditable Change Logs and Compliance Tools </li></ul></ul><ul><li>CONNECT: Orchestrates Connections for Virtual or Physical Resources </li></ul><ul><ul><li>Integrates with existing management systems, applications & automation tools </li></ul></ul><ul><ul><li>Interoperates with multi-vendor, multi-tenant environments networking: </li></ul></ul><ul><ul><ul><li>Application Components </li></ul></ul></ul><ul><ul><ul><li>End User and Administration User Access </li></ul></ul></ul><ul><ul><ul><li>Federated Global Resources (example: ID Management, Financial reconciliation tools, Regional data storage) </li></ul></ul></ul><ul><ul><ul><li>Corporate Partner and/or Public Clouds </li></ul></ul></ul>
    7. 7. <ul><li>m2mi  Network Virtualization Differentiators </li></ul><ul><ul><li>Multi-Vendor Support & Abstraction - m2mi handles the differences between Vendors, Operating System and Versions under the covers </li></ul></ul><ul><ul><li>Multi-level Security - m2mi Secures all layers of abstraction & services </li></ul></ul><ul><ul><li>Simplified Advanced Feature Implementation - m2mi coordinates & synchronizes complex advanced Network features into simple standard services (ex. QoS, VLANs, SSL, Etherchannel) </li></ul></ul><ul><ul><li>Robust Mixed Environment Operation - m2mi Automation validates all network configurations prior to changes ensuring stability even with other network tools </li></ul></ul><ul><ul><li>Scalability - Single Customer Environment support 5.5M Enterprise Cloud Users, over 90,000 employees in 145 countries, involves 15,000 Network Devices </li></ul></ul><ul><ul><li>Standard Web Service Interface for integration with existing Management Tools and Network-Aware Applications - Rich UI for Standalone operation </li></ul></ul><ul><ul><li>Auditable Logging and Compliance Tracking of all Network Changes & Queries </li></ul></ul><ul><ul><li>End-to-End Support and Maintenance </li></ul></ul>
    8. 8. <ul><li>m2mi Security Differentiators </li></ul><ul><ul><li>Patent Protection: m2mi’s Security technology is backed up by a granted patent </li></ul></ul><ul><ul><li>Multi-level Security: m2mi extends Global Security Rules and paradigms through Applications to the Network </li></ul></ul><ul><ul><li>Multi-Vendor Support: m2mi coordinates security across existing and new Cloud resources </li></ul></ul><ul><ul><li>Secure, Robust Automation: m2mi automates security to greatly simplify implementation and maintenance </li></ul></ul><ul><ul><li>Global Policy Alignment: As m2mi’s Network Virtualization is integrated into every change made in the Cloud, Security is automatically applied according to business and security rules and validated with every Cloud process. </li></ul></ul><ul><ul><li>Compliance and Audit: m2mi provides Audit Logs and reporting of all changes and enforces Compliance Rules along side Security Rules. </li></ul></ul>Cloud Security gets complicated as virtual resources become dynamic and conceptual. To cover the complexity, a secure Cloud must have a holistic end-to-end Security Solution.
    9. 9. <ul><li>Network Virtualization Saves Customers Money </li></ul><ul><ul><li>Enterprise Cloud Customer realized total provisioning and management costs as little as 30 ¢ per user per year </li></ul></ul><ul><ul><li>Network Virtualization customers have saved up to 70% in provisioning & integration costs </li></ul></ul><ul><li>m2mi Runs Some the Largest Enterprise Clouds </li></ul><ul><ul><li>m2mi handles provisioning and security for 5.5 Million users for a single Customer’s Cloud </li></ul></ul><ul><ul><li>m2mi manages a single federated Global Customer Cloud Network with operational assets in 22 different countries </li></ul></ul><ul><ul><li>m2mi supports Customer’s Cloud End Users in 145 countries </li></ul></ul><ul><ul><li>Enterprise End Users include: GE, BT, PepsiCo, JDSU, Equifax, The Warranty Group, Genworth Financial, Agilent, Iron Mountain, Minerals Technologies, Essilor of America (eye glass lenses), Exterran (natural gas), Arcor SAIC, Phibro Animal Health Corp., OGIO International (SMB), Mercury Computer Systems (SMB) </li></ul></ul>
    10. 10. <ul><li>Decrease in Time to Market: New Application Environment configuration and deployment time is reduced to hours or minutes with minimal Network or Security expertise required </li></ul><ul><li>Faster Revenue Realization: On-boarding new Customers with secure access is highly automated and takes only a few minutes, enabling end-of-quarter Cloud sales </li></ul><ul><li>Low Cost of Ownership: Annual costs are 0.05-1% of original device costs (over the lifetime of the device this equates to 3-7%) </li></ul><ul><li>Fixed Cloud Provisioning and Security Costs: Known Costs keep Cloud Costs accountable and measurable, allowing for accurate forecasting and pricing </li></ul><ul><li>Reduced Dependence on Limited Network/Security Resources: Frees highly skilled Network and Security resources from mundane, repeated tasks to focus on higher value tasks. </li></ul>Network Virtualization ROI
    11. 11. <ul><li>Technology Demo: Secure Cloud Provisioning </li></ul><ul><li>Questions and Answers </li></ul>Contact: Will Albert [email_address]