SlideShare a Scribd company logo
CloudSwitch Overview John Considine Co-Founder & CTO
What We Do 2 Web App Training App CRMApp We help enterprises with existing data centers and applications move servers and applications to the cloud simply and securely  without changing anything.
Why Create CloudSwitch? Late 2007 / Early 2008 ,[object Object]
Had fundamental understanding of how Clouds were built
Determined real problems for Enterprise adoptionSolution requires infrastructure level product Enterprise -> Out  not  Cloud -> In Provable Security Tight integration with existing infrastructure “No Modifications” to operating system, configurations, applications Partial solutions break value proposition Specific Stacks / Applications / Frameworks cannot run in isolation  Can’t address security, can’t be fully integrated CloudSwitch Proprietary & Confidential 3
What This Means for Enterprise IT 4 No Re-architecting Applications Secure Extensionof Data Center Use Existing Management Tools No Cloud Lock-in Enterprise IT
Cloud 1 Cloud Isolation Technology CloudSwitch Instance (CSI) Data Server CloudSwitch Instance (CSI) Data Server App 2 App 2 CloudSwitch Appliance (CSA) App 5 App 3 App 4 App 4 App 3 Cloud 2 Components work cooperatively to simplify, secure, and manage operating environments in the cloud Customer Data Center CLOUD ISOLATION TECHNOLOGYTM VIRTUAL MANAGEMENT/CONTROLS App 1 App 2 VIRTUALIZED STORAGE FIREWALL ENCRYPTED TUNNEL 5 App 4 App 3 CLOUD ISOLATION TECHNOLOGYTM VIRTUALIZED STORAGE DATA CENTER SERVICES: DNS, LDAP, Identity, Infrastructure… VIRTUALIZED STORAGE
Enterprise Apps in the Cloud CloudSwitch Proprietary & Confidential 6
Private Beta Use Cases CloudSwitch Proprietary & Confidential 7
The CloudSwitch Team John McEleney - CEO Former CEO of SolidWorks – Grew annual revenues to $350M,  and 100K+ customers John Considine – CTO Serial entrepreneur & Director of Engineering; Part of Pirus Networks acquired by Sun in 2002; Delivered 4 different product lines for Sun Ellen Rubin – VP products Former VP Marketing at Neteeza – Took company public in 2006 Shawn Henry – VP Engineering Director of Engineering at RSA - delivered the Consumer Authentication line of products, grew revenue to over $120M Fred Oliveira – Chief Architect Former Chief Architect of the Cloud Infrastructure Group at EMC – Conceived, developed and delivered EMCs’ Atmos product Currently in public beta with strong inbound interest Ready to start selling mid-year CloudSwitch Proprietary & Confidential 8

More Related Content

What's hot

Building Hybrid Mobile Apps for AppExchange
Building Hybrid Mobile Apps for AppExchangeBuilding Hybrid Mobile Apps for AppExchange
Building Hybrid Mobile Apps for AppExchange
Salesforce Developers
 
Geting cloud architecture right the first time linthicum interop fall 2013
Geting cloud architecture right the first time linthicum interop fall 2013Geting cloud architecture right the first time linthicum interop fall 2013
Geting cloud architecture right the first time linthicum interop fall 2013
David Linthicum
 
Enterprise Transformation
Enterprise TransformationEnterprise Transformation
Enterprise Transformation
Papu Bhattacharya
 
Retail Week: Cloud Security
Retail Week: Cloud SecurityRetail Week: Cloud Security
Retail Week: Cloud Security
Datapipe
 
What's new with IAP?
What's new with IAP? What's new with IAP?
What's new with IAP?
Itential
 
ePlus Intelligent Branch
ePlus Intelligent BranchePlus Intelligent Branch
ePlus Intelligent Branch
ePlus
 
Winning with Hybrid IT IBC 2015
Winning with Hybrid IT IBC 2015Winning with Hybrid IT IBC 2015
Winning with Hybrid IT IBC 2015
Equinix
 
The State of IoT
The State of IoTThe State of IoT
The State of IoT
Mike Kavis
 
Accelerate Your Enterprise Applications with ePlus and NetApp
Accelerate Your Enterprise Applications with ePlus and NetAppAccelerate Your Enterprise Applications with ePlus and NetApp
Accelerate Your Enterprise Applications with ePlus and NetApp
ePlus
 
Cloud Managed Services
Cloud Managed ServicesCloud Managed Services
Cloud Managed Services
The TNS Group
 
Maximize Software Investments with ePlus and Cisco ONE
Maximize Software Investments with ePlus and Cisco ONEMaximize Software Investments with ePlus and Cisco ONE
Maximize Software Investments with ePlus and Cisco ONE
ePlus
 
Cloud managed services
Cloud managed servicesCloud managed services
Cloud managed services
Devopstech
 
Extreme IoT Games
Extreme IoT GamesExtreme IoT Games
Extreme IoT Games
Mike Kavis
 
First step to an effective data privacy program
First step to an effective data privacy programFirst step to an effective data privacy program
First step to an effective data privacy program
LeeDavis47
 
150601 gartner cloud_summit_vfinal
150601 gartner cloud_summit_vfinal150601 gartner cloud_summit_vfinal
150601 gartner cloud_summit_vfinal
Michael Burian
 
Application Darwinism: Why Most Enterprise Apps Will Move to the Cloud (SVC20...
Application Darwinism: Why Most Enterprise Apps Will Move to the Cloud (SVC20...Application Darwinism: Why Most Enterprise Apps Will Move to the Cloud (SVC20...
Application Darwinism: Why Most Enterprise Apps Will Move to the Cloud (SVC20...
Amazon Web Services
 
Powering IT Transformation For Any Business
Powering IT Transformation For Any BusinessPowering IT Transformation For Any Business
Powering IT Transformation For Any Business
ePlus
 
Empowering agencies using Elastic as a Service inside Government
Empowering agencies using Elastic as a Service inside GovernmentEmpowering agencies using Elastic as a Service inside Government
Empowering agencies using Elastic as a Service inside Government
Elasticsearch
 
Enabling Cloud Deployment
Enabling Cloud DeploymentEnabling Cloud Deployment
Enabling Cloud Deployment
Nalashaa Healthcare Solutions
 
Cloud security: Accelerating cloud adoption
Cloud security: Accelerating cloud adoption Cloud security: Accelerating cloud adoption
Cloud security: Accelerating cloud adoption
Dell World
 

What's hot (20)

Building Hybrid Mobile Apps for AppExchange
Building Hybrid Mobile Apps for AppExchangeBuilding Hybrid Mobile Apps for AppExchange
Building Hybrid Mobile Apps for AppExchange
 
Geting cloud architecture right the first time linthicum interop fall 2013
Geting cloud architecture right the first time linthicum interop fall 2013Geting cloud architecture right the first time linthicum interop fall 2013
Geting cloud architecture right the first time linthicum interop fall 2013
 
Enterprise Transformation
Enterprise TransformationEnterprise Transformation
Enterprise Transformation
 
Retail Week: Cloud Security
Retail Week: Cloud SecurityRetail Week: Cloud Security
Retail Week: Cloud Security
 
What's new with IAP?
What's new with IAP? What's new with IAP?
What's new with IAP?
 
ePlus Intelligent Branch
ePlus Intelligent BranchePlus Intelligent Branch
ePlus Intelligent Branch
 
Winning with Hybrid IT IBC 2015
Winning with Hybrid IT IBC 2015Winning with Hybrid IT IBC 2015
Winning with Hybrid IT IBC 2015
 
The State of IoT
The State of IoTThe State of IoT
The State of IoT
 
Accelerate Your Enterprise Applications with ePlus and NetApp
Accelerate Your Enterprise Applications with ePlus and NetAppAccelerate Your Enterprise Applications with ePlus and NetApp
Accelerate Your Enterprise Applications with ePlus and NetApp
 
Cloud Managed Services
Cloud Managed ServicesCloud Managed Services
Cloud Managed Services
 
Maximize Software Investments with ePlus and Cisco ONE
Maximize Software Investments with ePlus and Cisco ONEMaximize Software Investments with ePlus and Cisco ONE
Maximize Software Investments with ePlus and Cisco ONE
 
Cloud managed services
Cloud managed servicesCloud managed services
Cloud managed services
 
Extreme IoT Games
Extreme IoT GamesExtreme IoT Games
Extreme IoT Games
 
First step to an effective data privacy program
First step to an effective data privacy programFirst step to an effective data privacy program
First step to an effective data privacy program
 
150601 gartner cloud_summit_vfinal
150601 gartner cloud_summit_vfinal150601 gartner cloud_summit_vfinal
150601 gartner cloud_summit_vfinal
 
Application Darwinism: Why Most Enterprise Apps Will Move to the Cloud (SVC20...
Application Darwinism: Why Most Enterprise Apps Will Move to the Cloud (SVC20...Application Darwinism: Why Most Enterprise Apps Will Move to the Cloud (SVC20...
Application Darwinism: Why Most Enterprise Apps Will Move to the Cloud (SVC20...
 
Powering IT Transformation For Any Business
Powering IT Transformation For Any BusinessPowering IT Transformation For Any Business
Powering IT Transformation For Any Business
 
Empowering agencies using Elastic as a Service inside Government
Empowering agencies using Elastic as a Service inside GovernmentEmpowering agencies using Elastic as a Service inside Government
Empowering agencies using Elastic as a Service inside Government
 
Enabling Cloud Deployment
Enabling Cloud DeploymentEnabling Cloud Deployment
Enabling Cloud Deployment
 
Cloud security: Accelerating cloud adoption
Cloud security: Accelerating cloud adoption Cloud security: Accelerating cloud adoption
Cloud security: Accelerating cloud adoption
 

Similar to Cloud Switch 318

CWIN17 london becoming cloud native part 2 - guy martin docker
CWIN17 london   becoming cloud native part 2 - guy martin dockerCWIN17 london   becoming cloud native part 2 - guy martin docker
CWIN17 london becoming cloud native part 2 - guy martin docker
Capgemini
 
Developing Your Cloud Strategy
Developing Your Cloud StrategyDeveloping Your Cloud Strategy
Developing Your Cloud Strategy
VISI
 
Realise True Business Value .pdf
Realise True Business Value .pdfRealise True Business Value .pdf
Realise True Business Value .pdf
ThousandEyes
 
Developing Your Cloud Strategy
Developing Your Cloud StrategyDeveloping Your Cloud Strategy
Developing Your Cloud Strategy
Redpath Consulting Group
 
How to move to the cloud, get it right, stay secure and not cost a fortune
How to move to the cloud, get it right, stay secure and not cost a fortuneHow to move to the cloud, get it right, stay secure and not cost a fortune
How to move to the cloud, get it right, stay secure and not cost a fortune
Corecom Consulting
 
MT01 The business imperatives driving cloud adoption
MT01 The business imperatives driving cloud adoptionMT01 The business imperatives driving cloud adoption
MT01 The business imperatives driving cloud adoption
Dell EMC World
 
Cloud Switch 312
Cloud Switch 312Cloud Switch 312
Cloud Switch 312
Dealmaker Media
 
CloudExpo NY 2014: Moving Mission Critical Applications to the Cloud
CloudExpo NY 2014: Moving Mission Critical Applications to the CloudCloudExpo NY 2014: Moving Mission Critical Applications to the Cloud
CloudExpo NY 2014: Moving Mission Critical Applications to the Cloud
Kacy Clarke
 
Cloud the current future v6
Cloud   the current future v6Cloud   the current future v6
Cloud the current future v6
Nitai Partners Inc
 
How to utilize cloud in your corporate it strategy
How to utilize cloud in your corporate it strategyHow to utilize cloud in your corporate it strategy
How to utilize cloud in your corporate it strategy
Redpath Consulting Group
 
Developer Conference 2.1 - (Cloud) First Steps to the Cloud
Developer Conference 2.1 - (Cloud) First Steps to the CloudDeveloper Conference 2.1 - (Cloud) First Steps to the Cloud
Developer Conference 2.1 - (Cloud) First Steps to the Cloud
Micro Focus
 
Isovalent-kloia Cilium Workshop
Isovalent-kloia Cilium WorkshopIsovalent-kloia Cilium Workshop
Isovalent-kloia Cilium Workshop
kloia
 
Realize True Business Value With ThousandEyes
Realize True Business Value With ThousandEyesRealize True Business Value With ThousandEyes
Realize True Business Value With ThousandEyes
ThousandEyes
 
Jobs in the Cloud
 Jobs in the Cloud Jobs in the Cloud
Jobs in the Cloud
Society of Women Engineers
 
Citrix Synergy 2014 - Syn111 From the field: Autodesk's journey to private cl...
Citrix Synergy 2014 - Syn111 From the field: Autodesk's journey to private cl...Citrix Synergy 2014 - Syn111 From the field: Autodesk's journey to private cl...
Citrix Synergy 2014 - Syn111 From the field: Autodesk's journey to private cl...
Citrix
 
The Software-Defined Perimeter: Securing Network Access for the Modern Workforce
The Software-Defined Perimeter: Securing Network Access for the Modern WorkforceThe Software-Defined Perimeter: Securing Network Access for the Modern Workforce
The Software-Defined Perimeter: Securing Network Access for the Modern Workforce
Perimeter 81
 
Smartscale Executive Summary
Smartscale Executive SummarySmartscale Executive Summary
Smartscale Executive Summary
Smartscale Systems
 
Migrating and Modernizing Identity on the Path to Multi Cloud
Migrating and Modernizing Identity on the Path to Multi CloudMigrating and Modernizing Identity on the Path to Multi Cloud
Migrating and Modernizing Identity on the Path to Multi Cloud
Strata Identity
 
BusinessIntelligenze - On Cloud BI (English)
BusinessIntelligenze - On Cloud BI (English)BusinessIntelligenze - On Cloud BI (English)
BusinessIntelligenze - On Cloud BI (English)
BusinessIntelligenze
 
SD-WAN_MoD.pptx for SD WAN networks connectivity
SD-WAN_MoD.pptx for SD WAN networks connectivitySD-WAN_MoD.pptx for SD WAN networks connectivity
SD-WAN_MoD.pptx for SD WAN networks connectivity
bayusch
 

Similar to Cloud Switch 318 (20)

CWIN17 london becoming cloud native part 2 - guy martin docker
CWIN17 london   becoming cloud native part 2 - guy martin dockerCWIN17 london   becoming cloud native part 2 - guy martin docker
CWIN17 london becoming cloud native part 2 - guy martin docker
 
Developing Your Cloud Strategy
Developing Your Cloud StrategyDeveloping Your Cloud Strategy
Developing Your Cloud Strategy
 
Realise True Business Value .pdf
Realise True Business Value .pdfRealise True Business Value .pdf
Realise True Business Value .pdf
 
Developing Your Cloud Strategy
Developing Your Cloud StrategyDeveloping Your Cloud Strategy
Developing Your Cloud Strategy
 
How to move to the cloud, get it right, stay secure and not cost a fortune
How to move to the cloud, get it right, stay secure and not cost a fortuneHow to move to the cloud, get it right, stay secure and not cost a fortune
How to move to the cloud, get it right, stay secure and not cost a fortune
 
MT01 The business imperatives driving cloud adoption
MT01 The business imperatives driving cloud adoptionMT01 The business imperatives driving cloud adoption
MT01 The business imperatives driving cloud adoption
 
Cloud Switch 312
Cloud Switch 312Cloud Switch 312
Cloud Switch 312
 
CloudExpo NY 2014: Moving Mission Critical Applications to the Cloud
CloudExpo NY 2014: Moving Mission Critical Applications to the CloudCloudExpo NY 2014: Moving Mission Critical Applications to the Cloud
CloudExpo NY 2014: Moving Mission Critical Applications to the Cloud
 
Cloud the current future v6
Cloud   the current future v6Cloud   the current future v6
Cloud the current future v6
 
How to utilize cloud in your corporate it strategy
How to utilize cloud in your corporate it strategyHow to utilize cloud in your corporate it strategy
How to utilize cloud in your corporate it strategy
 
Developer Conference 2.1 - (Cloud) First Steps to the Cloud
Developer Conference 2.1 - (Cloud) First Steps to the CloudDeveloper Conference 2.1 - (Cloud) First Steps to the Cloud
Developer Conference 2.1 - (Cloud) First Steps to the Cloud
 
Isovalent-kloia Cilium Workshop
Isovalent-kloia Cilium WorkshopIsovalent-kloia Cilium Workshop
Isovalent-kloia Cilium Workshop
 
Realize True Business Value With ThousandEyes
Realize True Business Value With ThousandEyesRealize True Business Value With ThousandEyes
Realize True Business Value With ThousandEyes
 
Jobs in the Cloud
 Jobs in the Cloud Jobs in the Cloud
Jobs in the Cloud
 
Citrix Synergy 2014 - Syn111 From the field: Autodesk's journey to private cl...
Citrix Synergy 2014 - Syn111 From the field: Autodesk's journey to private cl...Citrix Synergy 2014 - Syn111 From the field: Autodesk's journey to private cl...
Citrix Synergy 2014 - Syn111 From the field: Autodesk's journey to private cl...
 
The Software-Defined Perimeter: Securing Network Access for the Modern Workforce
The Software-Defined Perimeter: Securing Network Access for the Modern WorkforceThe Software-Defined Perimeter: Securing Network Access for the Modern Workforce
The Software-Defined Perimeter: Securing Network Access for the Modern Workforce
 
Smartscale Executive Summary
Smartscale Executive SummarySmartscale Executive Summary
Smartscale Executive Summary
 
Migrating and Modernizing Identity on the Path to Multi Cloud
Migrating and Modernizing Identity on the Path to Multi CloudMigrating and Modernizing Identity on the Path to Multi Cloud
Migrating and Modernizing Identity on the Path to Multi Cloud
 
BusinessIntelligenze - On Cloud BI (English)
BusinessIntelligenze - On Cloud BI (English)BusinessIntelligenze - On Cloud BI (English)
BusinessIntelligenze - On Cloud BI (English)
 
SD-WAN_MoD.pptx for SD WAN networks connectivity
SD-WAN_MoD.pptx for SD WAN networks connectivitySD-WAN_MoD.pptx for SD WAN networks connectivity
SD-WAN_MoD.pptx for SD WAN networks connectivity
 

More from Dealmaker Media

Bitcasa
BitcasaBitcasa
Cloudant Presents at Under the Radar 2013
Cloudant Presents at Under the Radar 2013Cloudant Presents at Under the Radar 2013
Cloudant Presents at Under the Radar 2013
Dealmaker Media
 
SiSense Presents at Under the Radar 2013
SiSense Presents at Under the Radar 2013SiSense Presents at Under the Radar 2013
SiSense Presents at Under the Radar 2013
Dealmaker Media
 
Keen IO Presents at Under the Radar 2013
Keen IO Presents at Under the Radar 2013Keen IO Presents at Under the Radar 2013
Keen IO Presents at Under the Radar 2013
Dealmaker Media
 
Continuuity Presents at Under the Radar 2013
Continuuity Presents at Under the Radar 2013Continuuity Presents at Under the Radar 2013
Continuuity Presents at Under the Radar 2013
Dealmaker Media
 
Clustrix Presents at Under the Radar 2013
Clustrix Presents at Under the Radar 2013Clustrix Presents at Under the Radar 2013
Clustrix Presents at Under the Radar 2013
Dealmaker Media
 
SwiftStack Presents at Under the Radar 2013
SwiftStack Presents at Under the Radar 2013SwiftStack Presents at Under the Radar 2013
SwiftStack Presents at Under the Radar 2013
Dealmaker Media
 
Codenvy Presents at Under the Radar 2013
Codenvy Presents at Under the Radar 2013Codenvy Presents at Under the Radar 2013
Codenvy Presents at Under the Radar 2013
Dealmaker Media
 
Cedexis Presents at Under the Radar
Cedexis Presents at Under the RadarCedexis Presents at Under the Radar
Cedexis Presents at Under the Radar
Dealmaker Media
 
Catchpoint Presents at Under the Radar 2013
Catchpoint Presents at Under the Radar 2013Catchpoint Presents at Under the Radar 2013
Catchpoint Presents at Under the Radar 2013
Dealmaker Media
 
TrueAbility Presents at Under the Radar 2013
TrueAbility Presents at Under the Radar 2013TrueAbility Presents at Under the Radar 2013
TrueAbility Presents at Under the Radar 2013
Dealmaker Media
 
BetterCompany (formally happiily) Presents at Under the Radar 2013
BetterCompany (formally happiily) Presents at Under the Radar 2013BetterCompany (formally happiily) Presents at Under the Radar 2013
BetterCompany (formally happiily) Presents at Under the Radar 2013
Dealmaker Media
 
GoodRevu Presents at Under the Radar 2013
GoodRevu Presents at Under the Radar 2013GoodRevu Presents at Under the Radar 2013
GoodRevu Presents at Under the Radar 2013
Dealmaker Media
 
Entelo Presents at Under the Radar 2013
Entelo Presents at Under the Radar 2013Entelo Presents at Under the Radar 2013
Entelo Presents at Under the Radar 2013
Dealmaker Media
 
TrackVia Presents at Under the Radar 2013
TrackVia Presents at Under the Radar 2013TrackVia Presents at Under the Radar 2013
TrackVia Presents at Under the Radar 2013
Dealmaker Media
 
Sprint.ly Presents at Under the Radar 2013
Sprint.ly Presents at Under the Radar 2013Sprint.ly Presents at Under the Radar 2013
Sprint.ly Presents at Under the Radar 2013
Dealmaker Media
 
Senexx Presents at Under the Radar 2013
Senexx Presents at Under the Radar 2013Senexx Presents at Under the Radar 2013
Senexx Presents at Under the Radar 2013
Dealmaker Media
 
Allocadia Presents at Under the Radar 2013
Allocadia Presents at Under the Radar 2013Allocadia Presents at Under the Radar 2013
Allocadia Presents at Under the Radar 2013
Dealmaker Media
 
MobileSpan Presents at Under the Radar 2013
MobileSpan Presents at Under the Radar 2013MobileSpan Presents at Under the Radar 2013
MobileSpan Presents at Under the Radar 2013
Dealmaker Media
 
MobileSpaces Presents at Under the Radar 2013
MobileSpaces Presents at Under the Radar 2013MobileSpaces Presents at Under the Radar 2013
MobileSpaces Presents at Under the Radar 2013
Dealmaker Media
 

More from Dealmaker Media (20)

Bitcasa
BitcasaBitcasa
Bitcasa
 
Cloudant Presents at Under the Radar 2013
Cloudant Presents at Under the Radar 2013Cloudant Presents at Under the Radar 2013
Cloudant Presents at Under the Radar 2013
 
SiSense Presents at Under the Radar 2013
SiSense Presents at Under the Radar 2013SiSense Presents at Under the Radar 2013
SiSense Presents at Under the Radar 2013
 
Keen IO Presents at Under the Radar 2013
Keen IO Presents at Under the Radar 2013Keen IO Presents at Under the Radar 2013
Keen IO Presents at Under the Radar 2013
 
Continuuity Presents at Under the Radar 2013
Continuuity Presents at Under the Radar 2013Continuuity Presents at Under the Radar 2013
Continuuity Presents at Under the Radar 2013
 
Clustrix Presents at Under the Radar 2013
Clustrix Presents at Under the Radar 2013Clustrix Presents at Under the Radar 2013
Clustrix Presents at Under the Radar 2013
 
SwiftStack Presents at Under the Radar 2013
SwiftStack Presents at Under the Radar 2013SwiftStack Presents at Under the Radar 2013
SwiftStack Presents at Under the Radar 2013
 
Codenvy Presents at Under the Radar 2013
Codenvy Presents at Under the Radar 2013Codenvy Presents at Under the Radar 2013
Codenvy Presents at Under the Radar 2013
 
Cedexis Presents at Under the Radar
Cedexis Presents at Under the RadarCedexis Presents at Under the Radar
Cedexis Presents at Under the Radar
 
Catchpoint Presents at Under the Radar 2013
Catchpoint Presents at Under the Radar 2013Catchpoint Presents at Under the Radar 2013
Catchpoint Presents at Under the Radar 2013
 
TrueAbility Presents at Under the Radar 2013
TrueAbility Presents at Under the Radar 2013TrueAbility Presents at Under the Radar 2013
TrueAbility Presents at Under the Radar 2013
 
BetterCompany (formally happiily) Presents at Under the Radar 2013
BetterCompany (formally happiily) Presents at Under the Radar 2013BetterCompany (formally happiily) Presents at Under the Radar 2013
BetterCompany (formally happiily) Presents at Under the Radar 2013
 
GoodRevu Presents at Under the Radar 2013
GoodRevu Presents at Under the Radar 2013GoodRevu Presents at Under the Radar 2013
GoodRevu Presents at Under the Radar 2013
 
Entelo Presents at Under the Radar 2013
Entelo Presents at Under the Radar 2013Entelo Presents at Under the Radar 2013
Entelo Presents at Under the Radar 2013
 
TrackVia Presents at Under the Radar 2013
TrackVia Presents at Under the Radar 2013TrackVia Presents at Under the Radar 2013
TrackVia Presents at Under the Radar 2013
 
Sprint.ly Presents at Under the Radar 2013
Sprint.ly Presents at Under the Radar 2013Sprint.ly Presents at Under the Radar 2013
Sprint.ly Presents at Under the Radar 2013
 
Senexx Presents at Under the Radar 2013
Senexx Presents at Under the Radar 2013Senexx Presents at Under the Radar 2013
Senexx Presents at Under the Radar 2013
 
Allocadia Presents at Under the Radar 2013
Allocadia Presents at Under the Radar 2013Allocadia Presents at Under the Radar 2013
Allocadia Presents at Under the Radar 2013
 
MobileSpan Presents at Under the Radar 2013
MobileSpan Presents at Under the Radar 2013MobileSpan Presents at Under the Radar 2013
MobileSpan Presents at Under the Radar 2013
 
MobileSpaces Presents at Under the Radar 2013
MobileSpaces Presents at Under the Radar 2013MobileSpaces Presents at Under the Radar 2013
MobileSpaces Presents at Under the Radar 2013
 

Recently uploaded

Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Pitangent Analytics & Technology Solutions Pvt. Ltd
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
"Scaling RAG Applications to serve millions of users",  Kevin Goedecke"Scaling RAG Applications to serve millions of users",  Kevin Goedecke
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
Fwdays
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
DianaGray10
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
ScyllaDB
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Fwdays
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
Safe Software
 
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillinQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
LizaNolte
 
High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024
Vadym Kazulkin
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
operationspcvita
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
Ivo Velitchkov
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
UiPathCommunity
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
Jason Yip
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
DanBrown980551
 

Recently uploaded (20)

Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
"Scaling RAG Applications to serve millions of users",  Kevin Goedecke"Scaling RAG Applications to serve millions of users",  Kevin Goedecke
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
 
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillinQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
 
High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
 

Cloud Switch 318

  • 1. CloudSwitch Overview John Considine Co-Founder & CTO
  • 2. What We Do 2 Web App Training App CRMApp We help enterprises with existing data centers and applications move servers and applications to the cloud simply and securely without changing anything.
  • 3.
  • 4. Had fundamental understanding of how Clouds were built
  • 5. Determined real problems for Enterprise adoptionSolution requires infrastructure level product Enterprise -> Out not Cloud -> In Provable Security Tight integration with existing infrastructure “No Modifications” to operating system, configurations, applications Partial solutions break value proposition Specific Stacks / Applications / Frameworks cannot run in isolation Can’t address security, can’t be fully integrated CloudSwitch Proprietary & Confidential 3
  • 6. What This Means for Enterprise IT 4 No Re-architecting Applications Secure Extensionof Data Center Use Existing Management Tools No Cloud Lock-in Enterprise IT
  • 7. Cloud 1 Cloud Isolation Technology CloudSwitch Instance (CSI) Data Server CloudSwitch Instance (CSI) Data Server App 2 App 2 CloudSwitch Appliance (CSA) App 5 App 3 App 4 App 4 App 3 Cloud 2 Components work cooperatively to simplify, secure, and manage operating environments in the cloud Customer Data Center CLOUD ISOLATION TECHNOLOGYTM VIRTUAL MANAGEMENT/CONTROLS App 1 App 2 VIRTUALIZED STORAGE FIREWALL ENCRYPTED TUNNEL 5 App 4 App 3 CLOUD ISOLATION TECHNOLOGYTM VIRTUALIZED STORAGE DATA CENTER SERVICES: DNS, LDAP, Identity, Infrastructure… VIRTUALIZED STORAGE
  • 8. Enterprise Apps in the Cloud CloudSwitch Proprietary & Confidential 6
  • 9. Private Beta Use Cases CloudSwitch Proprietary & Confidential 7
  • 10. The CloudSwitch Team John McEleney - CEO Former CEO of SolidWorks – Grew annual revenues to $350M, and 100K+ customers John Considine – CTO Serial entrepreneur & Director of Engineering; Part of Pirus Networks acquired by Sun in 2002; Delivered 4 different product lines for Sun Ellen Rubin – VP products Former VP Marketing at Neteeza – Took company public in 2006 Shawn Henry – VP Engineering Director of Engineering at RSA - delivered the Consumer Authentication line of products, grew revenue to over $120M Fred Oliveira – Chief Architect Former Chief Architect of the Cloud Infrastructure Group at EMC – Conceived, developed and delivered EMCs’ Atmos product Currently in public beta with strong inbound interest Ready to start selling mid-year CloudSwitch Proprietary & Confidential 8
  • 11. Where We Are Today Well-funded with over $15M from top-tier VCs Matrix Partners, Atlas Ventures, Commonwealth Capitol Completed successful private beta with 6 paid customers Currently in public beta with strong inbound interest Ready to start selling mid-year CloudSwitch Proprietary & Confidential 9
  • 12. We Make the Cloud Ready for Enterprise IT Thank You!

Editor's Notes

  1. We’re CloudSwitch, a venture-backed start-up in Boston, focused on making the cloud work for enterprise IT. The cloud is a great way for enterprises to lower costs and be more agile, and we’re excited to be part of this major shift.We help mid-tier and large enterprises with existing data centers and applications move to the cloud – simply, securely and with no modifications.
  2. This has great value for enterprise IT. With CloudSwitch:Cloud resources are secured end-to-end as an extension of the enterprise's security perimeter - all data and communications are encrypted and stay in the control of the enterprise.Applications run in the cloud without modification – no need to re-architect an app for a specific cloud.Users can manage applications running in the cloud using existing management tools and processes, just as they did before.Enterprises are now free from cloud lock-in, able to move applications to the right place as needed -- to another cloud or back to the data center.
  3. Our CloudSwitch software product, which is about to be released in a public beta, is a downloadable virtual machine that installs easily into a customer’s data center. You’re up and running immediately.Using our management console, you take existing applications – including computing, networking and storage – and point and click them into the target cloud. We’ll automatically move the application into the cloud by mapping it to the cloud resources. At the same time we’re securing the application by encrypting the data in transit and at rest, and keeping key management in the hands of the customer.Once the application is in the cloud, it still looks just like it did in the data center, with the same IP address and identity. So all the management and monitoring tools and data center processes work exactly the same.Our Cloud Isolation Technology is the “secret sauce” that makes all this happen.With CloudSwitch, you can move from the data center to the cloud and back, and between clouds, without changing anything – and it doesn’t matter which cloud or which hypervisor technology you’re using.
  4. Our software is already deployed at several enterprise beta sites, and we’re about to make it more widely available so any company that wants to move to the cloud can do this quickly, easily and securely.