Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
Virtualization   Security   Performance

Capabilities
January 2010




               © 360is Ltd
               360is.com
About 360is


        Three Sixty is a specialist consultancy company focused on
        technology infrastructure.


    ...
Services & Expertise


                                                                                   80% reduction in...
Respected Industry Practitioners


            Our consultants have lectured at the LSE & IoD, and advised the
           ...
High Impact Assessments, Analysis, and Execution




                                   © 360is Ltd
                      ...
Virtualization   Security   Performance

Case Studies
January 2010




               © 360is Ltd
               360is.com
Case Study: Virtualizing A Billion Dollar Data Warehouse



  Client Brief
  The client operates a supply-chain-finance/in...
Case Study: Diagnosing Complex Performance Problems



  Client Brief
  The client had migrated their custom, business-cri...
Case Study: Mobile Network Operator Vulnerability Remediation



  Client Brief
  3 months prior to public launch, a new 3...
Case Study: Investment Bank Maintenance Window Reduction



  Client Brief
  The client had built a sophisticated system f...
Case Study: Telco Divestment, Network Separation



  Client Brief
  One of the UK’s largest Telecommunications brands was...
Case Study: Drug Research, Infrastructure Security Assessment



  Client Brief
  A cutting-edge pharmaceutical research l...
Virtualization   Security   Performance




Call us to discuss your project with one of our consultants


             Pro...
Upcoming SlideShare
Loading in …5
×

360is Capabilities

247 views

Published on

Introduction to 360is, a professional services company, working in the areas of Virtualization, Security, and Performance Tuning for mission critical systems. For more information visit www.360is.com.

Published in: Technology
  • Be the first to comment

  • Be the first to like this

360is Capabilities

  1. 1. Virtualization Security Performance Capabilities January 2010 © 360is Ltd 360is.com
  2. 2. About 360is Three Sixty is a specialist consultancy company focused on technology infrastructure. We frequently deliver high-risk, high-return, projects that transform our client’s business critical systems. We are practitioners with a track record in hyper-growth, technology- driven markets. Our founders introduced TCP/IP to the UK business market, and were part of the team that built the UK’s largest ISP (Unipalm-PIPEX) in the early 90s. As a consultancy firm we work in the sole interest of our client, and are free to recommend the right technology or product for your project. Clients: Credit Suisse, Barclays Capital, RBS, Carphone Warehouse, COLT Telecom, BT, Easynet, Tesco, Pepsico, RyanAir, Multimap… © 360is Ltd 360is.com
  3. 3. Services & Expertise 80% reduction in (non staff related) IT OPEX identified Formulate managed services business plan and restructure to deliver £10m 1200 user Services revenue in year 1 implementation of Desktop Business Technology Strategy Virtualization Enabled strategic Analysis Architecture Execution BPO while meeting compliance and 10:1 transactional security Expertise 20:1 data requirements warehouse Virtualization 50:1 web hosting New “from scratch” Security 3G network Reduced “book to infrastructure Performance bill” period from 8 secured for launch weeks to 1 week 100% more users Identified Maintenance supported by performance window reduced by existing hardware bottlenecks with 85% platform SAN, specified appropriate upgrade
  4. 4. Respected Industry Practitioners Our consultants have lectured at the LSE & IoD, and advised the FSA and Criminal Intelligence unit of a major UK police force. We are widely published in interviews, thought leadership articles, and independent commentary. Designing Firewall Mission Critical Virtualization Information Architecting Proxies VPN Architecture Hardware Assurance Managed Services © 360is Ltd 360is.com
  5. 5. High Impact Assessments, Analysis, and Execution © 360is Ltd 360is.com
  6. 6. Virtualization Security Performance Case Studies January 2010 © 360is Ltd 360is.com
  7. 7. Case Study: Virtualizing A Billion Dollar Data Warehouse Client Brief The client operates a supply-chain-finance/invoice-discounting data warehouse for medium sized banks, provided as a managed service at their central London data centre. Increasing data center costs drove them to consider virtualizing their estate, consisting of approximately 100 Dell Servers spread across production and DR sites. The infrastructure handles €10B of invoices per day. Our Solution Our consultants performed an assessment of the estate and transaction growth plans A detailed architecture was designed to support virtualized operations Working with the clients technology team, our consultants implemented the design Hardware appliances were used, maximising VM density & performance Investments in DR automation and shared storage were preserved Outcome Time to provision a new client is down to a week not months Data centre costs are down by 70% Reliability is up, with N+1 architecture within each site Business growth, increased profitability, no new IT CAPEX © 360is Ltd 360is.com
  8. 8. Case Study: Diagnosing Complex Performance Problems Client Brief The client had migrated their custom, business-critical applications from a physical environment to virtual. The virtualization platform was outsourced as part of a strategic program with a major systems integrator. The applications had been suffering from crippling performance problems for several months, and the outsource partner had been unable to determine whether the application itself, the guest OS, or the hypervisor was at fault. Our Solution The 360is consultant conducted a short, highly focused hands-on investigation The guest OS, hypervisor, end-user application, and delivery mechanism were profiled Detailed telemetry was collected and analysed from virtual and physical instances A management and technical report was produced Outcome Tactical solution to extract 15-25% more performance from tuning Option presented for zero CAPEX alternative, 100% more performance Vendors presented with evidenced conclusions indentifying their software as the source of poor performance © 360is Ltd 360is.com
  9. 9. Case Study: Mobile Network Operator Vulnerability Remediation Client Brief 3 months prior to public launch, a new 3G Mobile Network Operator comprehensively failed an IT Security audit. Over 200 key network elements required in-place hardening, but the 11-man team of contractors tasked with this project had made little or no progress. Our Solution Our consultant was initially retained as a security team member, but was awarded overall responsibility for delivering the project after 1 week. Our consultant immediately dismissed 50% of the project team A highly automated OS hardening process and software was created This was applied to the estate of network elements Vulnerability scanning was performed on the hardened platforms Outcome The project was completed ahead of schedule The auditor signed off on the infrastructure The company launch deadline was met Shortly after launch, the company was acquired for €6.4B © 360is Ltd 360is.com
  10. 10. Case Study: Investment Bank Maintenance Window Reduction Client Brief The client had built a sophisticated system for distributing patches, packages, user credentials, and configuration files across a global UNIX estate during a strict maintenance window. Over time this system had become overloaded and struggled to complete before start of day. The hardware could not be upgraded beyond 8 CPUs nor could its functions be offloaded to a different platform due to complex interdependencies. Our Solution Our consultant determined the process was network and CPU constrained Changes were made to increase efficiency of the secure file distribution method CPU load reduced by 80% by selecting an efficient cipher for that CPU architecture Network bandwidth demand marginally reduced using delta encoding Outcome The maintenance window requirement was reduced by 85% Our client gained several years worth of estate headroom There was no impact to other systems in the estate This method of data distribution was adopted widely by other teams © 360is Ltd 360is.com
  11. 11. Case Study: Telco Divestment, Network Separation Client Brief One of the UK’s largest Telecommunications brands was divesting itself of a division. This process included the separation of “office networks” from the parent company. This would need to be completed quickly, however the client also saw an opportunity to make a fresh start with a properly architected infrastructure requiring minimum effort to operate. Our Solution A detailed specification for critical infrastructure components was agreed An automated hardened server OS-build mechanism was created for the client The entire infrastructure was developed and tested as virtual machines VMs were converted to physicals for deployment Outcome The project was completed on budget and ahead of schedule The network was handed over to the IT operations team successfully The divestment proceeded unhindered by IT 1 year on, the infrastructure requires almost no maintenance © 360is Ltd 360is.com
  12. 12. Case Study: Drug Research, Infrastructure Security Assessment Client Brief A cutting-edge pharmaceutical research laboratory wanted to securely provide results to clients via a new web infrastructure. Since the data was of a highly confidential nature, the initiative could not go ahead without a comprehensive security assessment. The client sought to validate a significant security investment already put in place, and gain confidence that the service was going live with the best possible configuration. Furthermore, our client wished to assure its customers, that all reasonable steps had been taken to protect their data. Our Solution A detailed security assessment was conducted on the public infrastructure Findings were presented in management and technical reports 360is consultants worked with the client to prioritise the vulnerabilities The infrastructure was re-tested to confirm any holes were closed Outcome The assessment validated security put in place by the IT team Minor vulnerabilities were detected and quickly corrected The online results service went live, on time Faster turnaround of experiment results has become a significant competitive differentiator for the client © 360is Ltd 360is.com
  13. 13. Virtualization Security Performance Call us to discuss your project with one of our consultants Project Enquiries: +44 (0)208 123 1740 General: +44 (0)208 133 6049 Fax: +44 (0)870 130 0399 info@360is.com © 360is Ltd 360is.com

×