2. About HashiCorp
Leading Cloud Infrastructure Automation
Founded
2012
Employees
600
Funding
174M
Our software stack enables the provisioning, securing, connecting
and running of apps and the infrastructure to support them.
We unlock the cloud operating model for every business and
enable their digital transformation strategies to succeed.
3. From 2018 Cost of a Data Breach Study: Global Overview from
IBM Security and Ponemon Institute*
https://zkresearch.com/research/2017-application-delivery-cont
roller-study/
4. Networking in a datacenter was easy...
● Monolithic applications with long-lived IPs
● Well defined north-south traffic path
● Traditional perimeter based network security
But what happens when you move to clouds and have
modular applications and services with dynamic IPs?
6. Reimagining the stack
The implications of the Cloud Operating Model
Run
Development
Dedicated
Infrastructure
Scheduled across the fleet
Connect
Networking
Host-based
Static IP
Service-based
Dynamic IP
Secure
Security
High trust
IP-based
Low trust
Identity-based
Provision
Operations
Dedicated servers
Homogeneous
Capacity on-demand
Heterogeneous
STATIC DYNAMIC
7. The Cloud Landscape
In search of a common model across multi-cloud environments
Run
Development
Connect
Networking
Secure
Security
Provision
Operations
DEDICATED
PRIVATE
CLOUD
vSphere
Hardware
IP:
Hardware
vCenter
vSphere
Various
Hardware
Identity:
AD/LDAP
Terraform
EKS / ECS
Lambda
CloudMap/
AppMesh
Identity:
AWS IAM
Cloud
Formation
AKS / ACS
Azure Functions
Proprietary
Identity:
Azure AD
Resource
Manager
GKE Cloud
Functions
Proprietary
Identity:
GCP IAM
Cloud
Deployment
Manager
AWS AZURE GCP
8. The Shift from Static to Dynamic Networking
● Modular services with dynamic IPs, running on bare metals, VMs, containers...
● 85% of volume from complex east-west traffic*
● No clear network perimeters
9. Consul
Provides a foundation of cloud network automation using a central service
registry for service based networking
50k+
Used at scale with
50k+ agents
1M+
Monthly D/Ls
Service registry & health monitoring to provide a
real-time directory of all services with their health status
Network middleware automation with service
discovery for dynamic reconfiguration as services scale
up, down or move
Zero trust network with service mesh to secure
service-to-service traffic with identity-based security
policies and encrypted traffic with Mutual-TLS
Trusted by: