Cloud Computing with InduSoft

2,213 views

Published on

Powerpoint for the InduSoft Cloud Computing webinar on Dec. 14, 2011

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
2,213
On SlideShare
0
From Embeds
0
Number of Embeds
1,154
Actions
Shares
0
Downloads
53
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Cloud Computing with InduSoft

  1. 1. Cloud Computing Defined Convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction
  2. 2. Essential Characteristics • On-demand Self-service • Broad Network Access • Resource Pooling • Rapid Elasticity • Measured Service
  3. 3. On-demand Self-service • Unilaterally provision computing resources, as needed • Does not requiring human interaction with service provider.
  4. 4. Broad Network Access • Capabilities are available over the network and accessed through standard mechanisms (e.g., mobile phones, tablets, laptops, and workstations).
  5. 5. Resource Pooling • Provider’s computing resources are pooled with different physical and virtual resources dynamically assigned and reassigned according to consumer demand. • Location independence in that the consumer generally has no control or knowledge over the exact location of the provided resources, but may be able to specify location at a higher level of abstraction (e.g., country, state, or datacenter).
  6. 6. Rapid Elasticity • Capabilities can be elastically provisioned and released, in some cases automatically, to scale rapidly outward and inward commensurate with demand. • The capabilities available for provisioning appear to be unlimited and can be provisioned in any quantity at any time.
  7. 7. Measured Service • Pay-per-use model appropriate to the type of resource or service (e.g., storage, processing, bandwidth, and active user accounts). • Usage can be monitored, controlled, and reported, providing transparency for both the provider and consumer of the utilized service.
  8. 8. Deployment Models • Private Cloud • Public Cloud • Hybrid Cloud
  9. 9. Private Cloud • Provisioned for exclusive use by a single organization • May be owned, managed, and operated by the organization, a third party, or some combination of them • May exist on or off premises
  10. 10. Public Cloud • Provisioned for open use by the general public • Owned, managed, and operated by a business, academic, or government organization, or some combination of them • Exists on the premises of the cloud provider
  11. 11. Hybrid Cloud • Combination of Public and Private clouds • Remain unique entities, but are bound together by standardized or proprietary technology • Enables data and application portability
  12. 12. Service Models • Infrastructure as a Service (IaaS) • Platform as a Service (PaaS) • Software as a Service (SaaS)
  13. 13. Infrastructure as a Service • Allows the consumer to deploy and run off-the-shelf software just like they would on their own IT infrastructure. • Provides on-demand provisioning of computing resources allowing a company to pay for only as much capacity as is needed, and bring more online as soon as required. • Consumer does not manage or control the underlying cloud infrastructure but has control over operating systems, storage, deployed applications, and select networking components (e.g., host firewalls). • Amazon Web Services, Rackspace Cloud Servers
  14. 14. Platform as a Service • A set of software and product development tools hosted on the providers infrastructure that developers use to create applications over the Internet. • The consumer of the service does not manage or control the underlying cloud infrastructure, but has control over the deployed applications and application hosting environment configurations. • Used by consumers who develop their own software and desire a common off-the-shelf development and runtime platform. • Microsoft Azure, Google App Engine
  15. 15. Software as a Service • Consumer uses a provider’s applications running on a cloud infrastructure from through a thin client interface such as a web browser. • Consumer does not manage or control the underlying cloud infrastructure. • Consumer pays a fee for use of the application. • Hotmail.com, Google Apps
  16. 16. Benefits • Economic Benefits • Better Agility • Greater Accessibility • Improved Reliability • Superior Security
  17. 17. Economic Benefits • Instead of using capital budget to purchase machines, storage, and networking equipment, companies can expense the monthly costs of only the resources that they actually need and use. • Cloud computing provides access to almost unlimited processing power and storage. Companies can provision large data servers for online historical databases, but only pay for the actual storage that they are using. • Companies do not have to purchase redundant hardware and software licenses, or set-up disaster recovery sites that they pay for and may never use. Instead they can provision new resources on demand when and if they need them. Add in the costs that a company would otherwise incur to manage an IT infrastructure and the savings of moving to a cloud infrastructure can be huge.
  18. 18. Better Agility • Building an IT infrastructure is usually a long term commitment and can take months to purchase, install, configure, and test. Equivalent cloud resources can be running in as little as a few minutes, and on- demand allows for trial-and-error. If some resource doesnt fit, simply stop, and start a new one that seems more appropriate. • Projects that involve significant cost, resources, and long timelines include significant risk of project failure. Projects that can be completed in a few hours with little or no financial and resource commitments include much less risk. • The faster a business can change, the faster a business can react to changing requirements. Cloud resources can immediately be scaled up or down to match.
  19. 19. Greater Accessibility • Most companies have a single Internet provider. If that provider experiences an outage, then any users who need remote access applications are out of luck. Cloud computing providers have multiple, redundant internet connections. As long as a user has Internet access, then they have access to their applications.
  20. 20. Improved Reliability • Redundancy and disaster recovery capabilities are built into cloud computing environments and on-demand resource capacity can be used for better resilience when facing increased service demands or distributed denial of service attacks, and for quicker recovery from serious incidents. • The backup and recovery policies and procedures of a cloud service may be superior to those of the organization and, if copies are maintained in diverse geographic locations, may be more robust. • Data maintained within a cloud can be more available, faster to restore, and more reliable in many circumstances than that maintained in a traditional data center.
  21. 21. Superior Security • Cloud providers have dedicated staff that specialize in security, privacy, and other areas of high interest and concern to the organization. • Increases in the scale of computing induce specialization, which in turn allows security staff to shed other duties and concentrate exclusively on security issues. • The structure of cloud computing platforms is typically more uniform than that of most traditional computing centers. Greater uniformity and homogeneity facilitate platform hardening and enable better automation of security management activities like configuration control, vulnerability testing, security audits, and security patching of platform components.
  22. 22. Challenges • System Complexity • Data Protection • Availability • Internet-facing Services • Multi-Tenancy • Loss of Control • Botnets and other threats
  23. 23. System Complexity • A public cloud computing environment is extremely complex compared with that of a traditional data center. • Security depends not only on the correctness and effectiveness of many components, but also on the interactions among them. • The number of possible interactions between components pushes the level of complexity upward. • Complexity typically relates inversely to security, with greater complexity giving rise to vulnerabilities.
  24. 24. Data Protection • Data stored in the cloud typically resides in a shared environment collocated with data from other customers. • Organizations moving sensitive and regulated data into the cloud, therefore, must account for the means by which access to the data is controlled and the data is kept secure.
  25. 25. Availability • In simple terms, availability is the extent to which an organization’s full set of computational resources is accessible and usable. • Availability can be affected temporarily or permanently, and a loss can be partial or complete. • Denial of service attacks, equipment outages, and natural disasters are all threats to availability.
  26. 26. Internet-facing Services • Applications and data that were previously accessed from the confines of an organization’s intranet, but moved to the cloud, now face increased risk from network threats that were previously defended against at the perimeter of the organization’s intranet and from new threats that target the exposed interfaces. • Requiring remote administrative access as the sole means to manage the assets of the organization held by the cloud provider also increases risk, compared with a traditional data center, where administrative access to platforms can be restricted to direct or internal connections.
  27. 27. Multi-Tenancy • Having to share an infrastructure with unknown outside parties can be a major drawback for some applications and requires a high level of assurance for the strength of the security mechanisms used for logical separation. • Access to organizational data and resources could inadvertently be exposed to other subscribers through a configuration or software error. • An attacker could also pose as a subscriber to exploit vulnerabilities from within the cloud environment to gain unauthorized access.
  28. 28. Loss of Control • Migrating to a public cloud requires a transfer of control to the cloud provider over information as well as system components that were previously under the organization’s direct control. • Loss of control over both the physical and logical aspects of the system and data diminishes the organization’s ability to maintain situational awareness, weigh alternatives, set priorities, and effect changes in security and privacy that are in the best interest of the organization.
  29. 29. Botnets and other threats • Botnets could be used to launch a denial of service attack against the infrastructure of a cloud provider. • The possibility that a cloud service could become infiltrated by a botnet has already occurred. • In 2009, a command-and-control node was discovered operating from within one of the leading cloud providers.
  30. 30. Communication with RTUs Thin Client Stations TCP/IP RTUs
  31. 31. Store and Forward with local HMIs Thin Client Stations TCP/IP Local HMIs
  32. 32. Email (US) info@indusoft.com (Brazil) info@indusoft.com.br (Germany) info@indusoft-germany.de USASupport support@indusoft.comWeb site (English) www.indusoft.com (Portuguese) www.indusoft.com.br (German) www.indusoft-germany.de BrazilPhone (512) 349-0334 (US) +55-11-3293-9139 (Brazil) +49 (0) 6227-732510 (Germany) GermanyToll-Free 877-INDUSOFT (877-463-8763)Fax (512) 349-0375

×