Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
© 2009 IBM Corporation 
Davide Sormani 
22 September 2014 
Security considerations 
on Hybrid Cloud
IBM Presentation Template Full Version 
Hybrid Cloud 
On Premise Off Premise 
And traditional IT 
Source: IBM corporation ...
Strategic Impact 
Shift IT expenditure model: 
from capital expenses to operating expenses 
Needs adressed 
Temporary cap...
Market share and expectations 
IBM Microsoft HP Cisco Oracle Accenture VMware Dell Google 
20% 
15% 
10% 
5% 
0% 
61% 70% ...
Present Scenario 
Sensitive and mission-critical resources on a private 
cloud and easily accessible ones on public cloud ...
Main challenge 
of respondant* claimed that 
data security concerns is 
the number one inhibitor for 
hybrid cloud 
50% 
*...
Softlayer® Security Services 
Vulnerability scanning 
Antivirus and anti-spyware protection 
Host-based intrusion prote...
New Security Agreement 
Softlayer® and Intel® 
Intel® TXT 
on bare metal servers 
Hardware monitoring and security at chi...
How Intel® TXT meets the challenge 
Workloads on a Trusted Compute Platform 
Principal Buildings blocks: 
Trusted Platfor...
New Perspective 
Certify a cloud computing pool is appropriately 
secured for workloads 
Protection 
Visibility 
Control 
...
© 2014 11 IBM Corporation
Upcoming SlideShare
Loading in …5
×

Security Considerations on Hybrid Cloud

715 views

Published on

The security of the Hybrid Cloud is one of the major concerns raised by customers. A new partnership between Softlayer and Intel offers the best way to solve the security issue on Hybrid Cloud

Published in: Technology
  • Be the first to comment

Security Considerations on Hybrid Cloud

  1. 1. © 2009 IBM Corporation Davide Sormani 22 September 2014 Security considerations on Hybrid Cloud
  2. 2. IBM Presentation Template Full Version Hybrid Cloud On Premise Off Premise And traditional IT Source: IBM corporation Security Performance Control Pay-per-use Elasticity Speed © 2014 2 IBM Corporation
  3. 3. Strategic Impact Shift IT expenditure model: from capital expenses to operating expenses Needs adressed Temporary capacity expansion Scale with demand Network optimization Development lifecycle © 2014 3 IBM Corporation
  4. 4. Market share and expectations IBM Microsoft HP Cisco Oracle Accenture VMware Dell Google 20% 15% 10% 5% 0% 61% 70% Of Hybrid cloud users by end of 2014 Source: Technology Business Research Inc.; 2014; IBM Center for applied insights Of customers will increase hybridization © 2014 4 IBM Corporation
  5. 5. Present Scenario Sensitive and mission-critical resources on a private cloud and easily accessible ones on public cloud Adopters  Manufacturing 33%  F&A 18%  Public 2%  Healthcare 4%  Retail 18%  Telco/Media 6%  Other 19% Source: Technology Business Research Inc., 2014 Do not have cloud 50% Not integrated adopter 30% Integrated cloud adopter 20% © 2014 5 IBM Corporation
  6. 6. Main challenge of respondant* claimed that data security concerns is the number one inhibitor for hybrid cloud 50% * IDC 2013 Global Cloud Track survey Is it possible to get all the benefits of hybrid cloud and minimize tradeoffs? © 2014 6 IBM Corporation
  7. 7. Softlayer® Security Services Vulnerability scanning Antivirus and anti-spyware protection Host-based intrusion protection Firewall and network based threat protection (IPS, DDoS) Network Gateways Virtual Private Networking (VPN) SSL Certificates © 2014 7 IBM Corporation
  8. 8. New Security Agreement Softlayer® and Intel® Intel® TXT on bare metal servers Hardware monitoring and security at chip level Chain of trust: integrity from firmware, software and hypervisor Every component marked trust or untrust © 2014 8 IBM Corporation
  9. 9. How Intel® TXT meets the challenge Workloads on a Trusted Compute Platform Principal Buildings blocks: Trusted Platform Module (TPM) Root of trust Supported Intel® processor: Intel® Xeon® E5-2600 v2 Intel® Xeon® E3-1200 v3 Intel® Xeon® E5-4600 © 2014 9 IBM Corporation
  10. 10. New Perspective Certify a cloud computing pool is appropriately secured for workloads Protection Visibility Control Trust  Governance and enterprise risk  Information and life-cycle management  Compliance and audit regulations  Application security  Identity and access management  Incident response © 2014 10 IBM Corporation
  11. 11. © 2014 11 IBM Corporation

×