Successfully reported this slideshow.
Your SlideShare is downloading. ×

Securing the Un-securable?

Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Loading in …3
×

Check these out next

1 of 25 Ad

Securing the Un-securable?

Whether or not you believe that IT is experiencing a
revolution, it is clear that a number the fundamentals of how
the IT infrastructure is built are changing. Server and storage
virtualisation, cloud-based delivery models, data centre
convergence onto 10 Gigabit Ethernet and the unification of
voice communications mechanisms are all symptomatic of
this. But IT is a two-edged sword: with every innovation
come a new set of risks to be mitigated, holes to be filled,
policies to be set and compliance objectives to be stuck to. In
the face of such rapid change, how exactly should
organizations large and small be thinking about security?
What are the pot-holes along the road, and how can they be
avoided?

Whether or not you believe that IT is experiencing a
revolution, it is clear that a number the fundamentals of how
the IT infrastructure is built are changing. Server and storage
virtualisation, cloud-based delivery models, data centre
convergence onto 10 Gigabit Ethernet and the unification of
voice communications mechanisms are all symptomatic of
this. But IT is a two-edged sword: with every innovation
come a new set of risks to be mitigated, holes to be filled,
policies to be set and compliance objectives to be stuck to. In
the face of such rapid change, how exactly should
organizations large and small be thinking about security?
What are the pot-holes along the road, and how can they be
avoided?

Advertisement
Advertisement

More Related Content

Slideshows for you (20)

Viewers also liked (18)

Advertisement

Similar to Securing the Un-securable? (20)

Advertisement

Securing the Un-securable?

  1. 1. Securing the Un-securable? Technology Convergence/Divergence and the Changing Face of Security Jon Collins, Managing Director Freeform Dynamics Ltd [email_address] www.freeformdynamics.com
  2. 2. Agenda <ul><li>What’s happening out there – and so what? </li></ul><ul><li>The new two-edged swords </li></ul><ul><li>What pot-holes to expect? </li></ul><ul><li>Where to start </li></ul>
  3. 3. Market remains turbulent...
  4. 4. Meanwhile, fragmentation is within...
  5. 5. What business drivers are having the most impact on how you architect and operate your server estate?
  6. 6. Same old, same old? VIRUSES AND TROJANS INTRUSION AND DENIAL SPAMMING AND PHISHING
  7. 7. How prominent are the following threats to [IT] security and how is this changing?
  8. 8. In fact, most organisations look more like this...
  9. 9. Have risk concerns held you back from taking advantage of the following?
  10. 10. What’s going on in technology?
  11. 11. What technical/operational drivers are having an impact?
  12. 12. No one size fits all for virtualisation Servers Storage Desktops
  13. 13. Adopters starting to appreciate architectural impact SERVER 1 SERVER 2 SERVER 3 STORAGE A STORAGE B STORAGE C VIRTUALISED SERVER WORKLOAD 1 WORKLOAD 2 WORKLOAD 3 INTERFACE STORAGE A STORAGE B STORAGE C
  14. 14. Meanwhile, what about Cloud?
  15. 15. Technological convergence is means to end
  16. 16. The new computing – back to the future? Web Servers Messaging Servers Security Server Directory. Servers ID Server Proxy Server App Servers Integration Servers Transaction Servers File Servers Database Servers Media Servers Portal Server Presentation Processing Data
  17. 17. Moving from technologies to services Email Internet Application Desktop Server Network VS TECHNOLOGY COMPONENTS SERVICES
  18. 18. Bottom-up vs Top-down Making everything “just work” Making a real difference to business IT as bottleneck IT as foundation IT as differentiator INCREASED EFFICIENCY INCREASED EFFECTIVENESS
  19. 19. What pot-holes to expect? <ul><li>More proliferation </li></ul><ul><li>More fragmentation </li></ul><ul><li>Knowable unknowns </li></ul><ul><li>Where’s the data? </li></ul><ul><li>Irresponsibility </li></ul><ul><li>Work smarter, not harder... and other cliches </li></ul>
  20. 20. <ul><li>What is the status of your capability in the following areas? </li></ul>Reality check
  21. 21. On fire fighting and fire extinguishers
  22. 22. Risk sensitivity/Management & technology capability
  23. 23. Integration and Co-ordination are Key – but there’s still a way to go!
  24. 24. So, where to start? <ul><li>Security exists to enable business </li></ul><ul><li>Make ownership, not buy-in, the first step </li></ul><ul><li>Balance trust with prevention </li></ul><ul><ul><li>Awareness training </li></ul></ul><ul><ul><li>Acceptable behaviour </li></ul></ul><ul><ul><li>Enforceable policy </li></ul></ul><ul><li>Risk mitigation with eyes wide open, not blinkered avoidance </li></ul>
  25. 25. Thank You Jon Collins, Managing Director Freeform Dynamics Ltd [email_address] March 2010 www.freeformdynamics.com

Editor's Notes

  • Technology Convergence/Divergence and the Changing Face of Security Whether or not you believe that IT is experiencing a revolution, it is clear that a number the fundamentals of how the IT infrastructure is built are changing. Server and storage virtualisation, cloud-based delivery models, data centre convergence onto 10 Gigabit Ethernet and the unification of voice communications mechanisms are all symptomatic of this. But IT is a two-edged sword: with every innovation come a new set of risks to be mitigated, holes to be filled, policies to be set and compliance objectives to be stuck to. In the face of such rapid change, how exactly should organizations large and small be thinking about security? What are the pot-holes along the road, and how can they be avoided?
  • This presentation is aimed at Emulex channel partners. Understand that the theme is convergence and what it enables – so this presentation takes the top-down view of what’s driving needs. First thing that needs to be mentioned is the downturn.
  • That’ll be a storage issue then 
  • Introduce Fortress IT Attack vectors are evolving from individual targets to more complex ways of getting round protection At same time. Attackers are moving to a more organised state – criminal activity driven BUT Organisations are looking to deperimeterise – how to square that?
  • Are we really any better off when we respond to technology hype?
  • Note however that while many organisations may be deploying virtualisation, that may only be for a minority of servers. We’re still in the pilot phase, and knowledge levels are low.
  • Early adopter experiences are not that common for broader use of server virtualisation. But what’s clear is that scaling is a big issue – storage and networking bottlenecks are quickly reached.
  • In practical terms – this means the adoption of 10GBaseT. It solves the problems – or acts as a catalyst to do so
  • Bluntly, are we recreating the mainframe? Ideally, the answer would be yes – as the mainframe had plenty of good things. However one thing it didn’t bring was the kind of flexibility we have grown used to in distributed architectures. IT therefore becomes more and more about dealing with the white space between the components
  • Services lead to service delivery, service contracts etc
  • Perhaps the answer lies in a more integrated view of security

×