AwanHeiTech Exchange 2013 on Consumerisation of Cloud: From Cloudy to Clear Skies"
Topic:
Navigating the Cloud Computing Kaleidoscope
- Identifying Challenges for Your Cloud Journey
7. Deployment
Architecture
Deployment
Architecture
B92CCA75A8
• Selection of Suitable Deployment Models
• Protection of Data, Security and ConcernsSecuritySecurity
Clear
Objectives
Clear
Objectives
• Understanding Your Cloud Aspiration
• Roles ResponsibilitiesPeoplePeople
6 Copyright 2013 FUJITSU LIMITED
8. 1 Understanding Your Cloud Aspiration
1 Selecting Deployment Model
1 Data Protection, Security and Concerns
1 Understanding Roles and Responsibilities Service
NaaS
Private
#78$D2F4758BCDEF8 B92CCA75A8
11. Service
NaaS
Private
1 Understanding Your Cloud Aspiration
1 Selecting Deployment Model
1 Data Protection, Security and Concerns
1 Understanding Roles and Responsibilities
13. Service
NaaS
Private
1 Understanding Your Cloud Aspiration
1 Selecting Deployment Model
1 Data Protection, Security and Concerns
1 Understanding Roles and Responsibilities
16. Logical Platform A
Division A
)A5A5264D78:8DC264D78
• The Access Control Feature controls the access between tenants and platforms
• Address Translation Function can hide secure server information
• The Anomaly IPS feature protects each platform from flooding-attacks
Physical ServerPhysical Server
・
・
・
FUJITSU Server PRIMERGY
Deploy
FUJITSU Server PRIMERGY
Service user of division B
Logical Platform
Division B
Internet
Improved network security for customers, projects divisions
Logical Platform B
NS Appliance(*)NS Appliance(*)
FUJITSU Server PRIMERGY
Physical ServerPhysical Server
・
・
・
NS Appliance(*)NS Appliance(*)
15
15 Copyright 2013 FUJITSU LIMITED
17. 026286D6A64D7 '764D7
1 Encrypts drive data in ETERNUS DX
1 Able to select Fujitsu’s unique encryption
scheme or 128-bitAES encryption
Encrypt confidential information in drives
Encryption
Encryption is specified
on a LUN basis
Encryption
Unencrypted
data
Encryption
Encryption
Encryption Encryption
Encryption Encryption
Encryption
Encryption
Encryption
Encryption
Encryption
Encryption setting and
management
Prevents information
leakage
Server A Server B Server C
Fujitsu’s unique encryption
scheme
- Less performance degradation than
128bit AES
- Closed unique technology ensures the
safety
Encryption
AES (Advanced Encryption Standard) is an encryption standard of the Federal Information Processing Standards
Data removal
protection
ETERNUS
DX400 S2 series
16 Copyright 2013 FUJITSU LIMITED
18. Service
NaaS
Private
1 Understanding Your Cloud Aspiration
1 Selecting Deployment Model
1 Data Protection, Concerns and Challenges
1 Understanding Roles and Responsibilities
22. B92CCA75A8
Clear
Objectives
Clear
Objectives
• Understanding Your Cloud Aspiration
Clarify business, culture, economic objectives, priorities, and
desired outcomes
Biz-IT data gathering and analysis
Identify critical interdependency, processes, applications, etc
Assess the infrastructure readiness for Cloud
Cloud -Role and Responsibilities
Clarify expectation for cloud resources.
Data Management Analysis and identification
Note : Please check with Fujitsu regarding related services
21 Copyright 2013 FUJITSU LIMITED
23. Deployment
Architecture
Deployment
Architecture
B92CCA75A
• Selection of Suitable Deployment Models
Traditional
(On-Premise)
Traditional
(On-Premise)
Storage
Server HW
Networking
vServers
Databases
Virtualization
Runtimes
Applications
Security Integration
UserManaged
(Infrastructure
(as a Service))
(Infrastructure
(as a Service))
Storage
Server HW
Networking
vServers
Databases
Virtualization
Runtimes
Applications
Security Integration
Users
(Platform
(as a Service))
(Platform
(as a Service))
Storage
Server HW
Networking
vServers
Databases
Virtualization
Runtimes
Applications
Security Integration
Public/Private
Users
Software
(as a Service)
Software
(as a Service)
Storage
Server HW
Networking
vServers
Databases
Virtualization
Runtimes
Applications
Security Integration
Hardware/Service
abstracted
Dynamic capacity
and pricing
Seamless scaling
up or down
Systems re-
purposing
Hardware/Service
abstracted
Dynamic capacity
and pricing
Seamless scaling
up or down
Systems re-
purposing
Hardware/Service
abstracted
Dynamic capacity
and pricing
Seamless scaling
up or down
Systems re-
purposing
Hardware/Service
abstracted
Dynamic capacity
and pricing
Seamless scaling
up or down
Systems re-
purposing
Hardware,
software
Service
abstracted
Dynamic capacity
and pricing
Seamless scaling
up or down
Systems re-
purposing
Hardware,
software
Service
abstracted
Dynamic capacity
and pricing
Seamless scaling
up or down
Systems re-
purposing
Infrastructur
e
Note : Please check with Fujitsu regarding related services
22 Copyright 2013 FUJITSU LIMITED
24. B92CCA75A8
• Protection of Data, Security and ConcernsSecuritySecurity
Note : Please check with Fujitsu regarding related servicesSource : Cloud Security Alliance
23 Copyright 2013 FUJITSU LIMITED
25. B92CCA75A8
• Roles ResponsibilitiesPeoplePeople
Note : Please check with Fujitsu regarding related services
24 Copyright 2013 FUJITSU LIMITED