Interested in learning more cloud?

  Learn about the cloud sessions offered at the upcoming Fall 2012 Data
  Center World Conference at:

  www.datacenterworld.com.




This presentation was given during the Spring, 2012 Data Center World Conference and Expo.
Contents contained are owned by AFCOM and Data Center World and can only be reused with the
express permission of ACOM. Questions or for permission contact: jater@afcom.com.
Turbulence in the Cloud




Richard L. Sawyer
Strategist, HP Critical Facilities Services
AFCOM Spring 2012
 Demand drives the market
 What is the cloud?
 Impact of the cloud
 Storm clouds on the horizon
 What is the risk, really?
 How do you manage the cloud?
 Storm cloud checklist
Service demand drives cloud formation
2+ Trillion Users!
• On-line, real time services
• Self-service
• Automated response
• Automated payment
• Automated qualification
• Digital direct marketing (is
your insurance due to
renew?)
• Digital mass marketing (who
needs and actor?)
• Digital claims processing
Instantaneous Consumption:
10 Billion iPhone Application
downloads WW from Apple alone

Nielsen:
98% of iPhone owners use data
services

88% use iPhone for internet
 A pool of highly scalable, abstracted
  infrastructure, capable of hosting end-customer
  applications, that is billed by consumption.
 Implications:
    ◦   “Pool”                         = shared things
    ◦   “Abstracted infrastructure”    = virtualization
    ◦   “Highly scalable”              = load sensitive
    ◦   “Hosting”               = servicing
    ◦   “Billed”                       = metered service
Data
        USER        Network        Center


• DedicatedData Center, owned, leased, rented
• Business specific applications on silo systems
• Data and user closely linked
• Data Center anywhere
• User anywhere
• Shared platforms
• Virtual servers
• Rented service
• User/data link weak
Hybrid delivery mix and cloud

                                                Public




                                                               HYBRID DELIVERY
                                                               • Fully automated self-
                                                                 service delivery
                                                               • Orchestrated, managed &
                                                Private          secured hybrid service
                                                                 delivery
 TRADITIONAL IT                 PRIVATE AND                    • Brokered services based
 •Minimal automation            PUBLIC CLOUD                     on business requirements
 •Traditional methods of        •Partial automation
 service delivery – internal,
11HP Confidential
                                •New disparate public    and
 outsourcing, hosting           private cloud services
Flavors:
Internal

Hosted

Private

Public

Hybrid
   Data center as a utility
    ◦ PODs
    ◦ Modular construction
    ◦ Redundancy as needed
   Utilization (cost) driven metrics
    ◦ Server images: from 1 to 8+
    ◦ Metered usage
   Access is dependent
    ◦ Network and Internet availability
    ◦ Security and operational stability
   More data centers!
Christian Belady, MS Global Foundation Services, Mar
2011 “How big is the data center market?”
 Fraud
 Identity theft
 Financial immobility
 Lack of access (911, heath, safety services)
 Whacking: WAP networking invasions
 Hacking: Incursion for information
 Cracking: Incursion for malice (destruction,
  financial gain, denial of service, etc.)
 Government monitoring and control
 BYOD!
•Federal Budget for Internet
              Security: $13.3 Billion by
              2015

              •9.1% growth Y-O-Y

              •445% increase in reported
              attacks between 2006 -
GAO-10-834T   2010
                    Sources: GAO, Security Week
Item       Activity                                         No   Ye
                                                                 s
People     Right employees, right knowledge, right roles
Policies   Policies and procedures for service continuity
Process Models for secure transfer of data between users
        and providers
Product Defense-in-Depth technology to manage and
        mitigate risk
Proof   Validation methods, metrics and KPI’s to track
        security controls



                What is your capability maturity level?
 Everything depends on network connectivity.
 The data, whether business or personal, resides

  elsewhere.
 The ability to process with sufficient capacity,

  reliability and availability depends, ultimately, on
  the reliability of the data center.
   Three (3) types:     Strategy to Mitigate
    ◦ Loss of            risk:
                         1)Diversify access
      connectivity (no
                             -Modality
      data)
                             -Routing
    ◦ Bad connectivity   1)Monitor
      (bad data)             -Qualitative
    ◦ Redirection            -Quantitative
      (stolen data)          -Access/Output
                         1)Operate without
                         network
 Your data is your business
 Your data is your life
 You are your data
 Where is your data?
    ◦   Access controlled
    ◦   Resident copies (stored, electronically or paper)
    ◦   Dedicated data center
    ◦   Backup servers
    ◦   Multi-site storage
    ◦   Encrypted
 Unreliable data center = unreliable Cloud
 Reliable data centers have common engineering

  characteristics:
    ◦ Redundant capacity
    ◦ Concurrent maintainability
    ◦ Fault tolerance
   Scaling down reliability
    ◦   PODs, Hybrid, Modular data centers
    ◦   The “7-11” Solution
    ◦   “Laptop, Smartphone, HD” to Go
    ◦   “Data Centers on a Chip”
   The Cloud is a Service
    ◦ Get your Service Level Agreements right
    ◦ Train your suppliers, train your users
   The Cloud is the Data Center
    ◦ Locate, design, build and operate for reliability
    ◦ Leverage reliability methodology no matter what the
      scale
   Low tech business continuity options
    ◦ Don’t assume high tech is going to be the go-to solution
    ◦ Build your crash cart
RANSFORM legacy       MANAGE AN
frastructure,         SECURE acro
pplications, people   legacy applica
nd process            and cloud ass
on-premises                      CO
ervices                          of
                                 se
                                 se
 Are space, power and cooling sufficiently available?
 Are there differentiated reliability levels?
 Are personnel screened and trained?
 Are vendors and other clients managed effectively?
 What is the connectivity capacity and topography?
 What is the availability history of the site?
 Are SLA’s negotiable and meaningful?
 Do I trust my data to their management?
 Do I have more than two ways to communicate?
 How long can I operate with no internet?

 Can I recover data after the internet is restored?

 Is my recovery management dependent on the

  network?
 Are my human resources going to be available

  and productive?
 Am I sure my plan is going to work?
   Data demand is driving the cloud
   The data center is the cloud
   There will be a significant increase in data centers,
    worldwide to meet demand.
   The major risk is loss of access to data to run the
    business and service clients.
   Network, data and physical security need to be
    managed to mitigate real risks.
   Ask the right questions before committing.
   Have a valid, tested recovery plan.
Credits:

                 •Ian Jagger, HP Marketing
                 •US Government, office of GAO
                 •Security Weekly
                 •Christian Belady, MS Gobal Foundation
                 Services
                 •Gail Dutton, Contributor, Data Center
                 Management
                 •David Geer, Freelance writer



Richard L. Sawyer, Strategist, HP Critical Facility Services
rsawyer@hp.com
Interested in learning more cloud?

  Learn about the cloud sessions offered at the upcoming Fall 2012 Data
  Center World Conference at:

  www.datacenterworld.com.




This presentation was given during the Spring, 2012 Data Center World Conference and Expo.
Contents contained are owned by AFCOM and Data Center World and can only be reused with the
express permission of ACOM. Questions or for permission contact: jater@afcom.com.

Cloudy with a chance of downtime

  • 1.
    Interested in learningmore cloud? Learn about the cloud sessions offered at the upcoming Fall 2012 Data Center World Conference at: www.datacenterworld.com. This presentation was given during the Spring, 2012 Data Center World Conference and Expo. Contents contained are owned by AFCOM and Data Center World and can only be reused with the express permission of ACOM. Questions or for permission contact: jater@afcom.com.
  • 2.
    Turbulence in theCloud Richard L. Sawyer Strategist, HP Critical Facilities Services AFCOM Spring 2012
  • 3.
     Demand drivesthe market  What is the cloud?  Impact of the cloud  Storm clouds on the horizon  What is the risk, really?  How do you manage the cloud?  Storm cloud checklist
  • 4.
    Service demand drivescloud formation
  • 5.
  • 6.
    • On-line, realtime services • Self-service • Automated response • Automated payment • Automated qualification • Digital direct marketing (is your insurance due to renew?) • Digital mass marketing (who needs and actor?) • Digital claims processing
  • 7.
    Instantaneous Consumption: 10 BillioniPhone Application downloads WW from Apple alone Nielsen: 98% of iPhone owners use data services 88% use iPhone for internet
  • 8.
     A poolof highly scalable, abstracted infrastructure, capable of hosting end-customer applications, that is billed by consumption.  Implications: ◦ “Pool” = shared things ◦ “Abstracted infrastructure” = virtualization ◦ “Highly scalable” = load sensitive ◦ “Hosting” = servicing ◦ “Billed” = metered service
  • 9.
    Data USER Network Center • DedicatedData Center, owned, leased, rented • Business specific applications on silo systems • Data and user closely linked
  • 10.
    • Data Centeranywhere • User anywhere • Shared platforms • Virtual servers • Rented service • User/data link weak
  • 11.
    Hybrid delivery mixand cloud Public HYBRID DELIVERY • Fully automated self- service delivery • Orchestrated, managed & Private secured hybrid service delivery TRADITIONAL IT PRIVATE AND • Brokered services based •Minimal automation PUBLIC CLOUD on business requirements •Traditional methods of •Partial automation service delivery – internal, 11HP Confidential •New disparate public and outsourcing, hosting private cloud services
  • 12.
  • 13.
    Data center as a utility ◦ PODs ◦ Modular construction ◦ Redundancy as needed  Utilization (cost) driven metrics ◦ Server images: from 1 to 8+ ◦ Metered usage  Access is dependent ◦ Network and Internet availability ◦ Security and operational stability  More data centers!
  • 14.
    Christian Belady, MSGlobal Foundation Services, Mar 2011 “How big is the data center market?”
  • 15.
     Fraud  Identitytheft  Financial immobility  Lack of access (911, heath, safety services)  Whacking: WAP networking invasions  Hacking: Incursion for information  Cracking: Incursion for malice (destruction, financial gain, denial of service, etc.)  Government monitoring and control  BYOD!
  • 16.
    •Federal Budget forInternet Security: $13.3 Billion by 2015 •9.1% growth Y-O-Y •445% increase in reported attacks between 2006 - GAO-10-834T 2010 Sources: GAO, Security Week
  • 18.
    Item Activity No Ye s People Right employees, right knowledge, right roles Policies Policies and procedures for service continuity Process Models for secure transfer of data between users and providers Product Defense-in-Depth technology to manage and mitigate risk Proof Validation methods, metrics and KPI’s to track security controls What is your capability maturity level?
  • 19.
     Everything dependson network connectivity.  The data, whether business or personal, resides elsewhere.  The ability to process with sufficient capacity, reliability and availability depends, ultimately, on the reliability of the data center.
  • 20.
    Three (3) types: Strategy to Mitigate ◦ Loss of risk: 1)Diversify access connectivity (no -Modality data) -Routing ◦ Bad connectivity 1)Monitor (bad data) -Qualitative ◦ Redirection -Quantitative (stolen data) -Access/Output 1)Operate without network
  • 21.
     Your datais your business  Your data is your life  You are your data  Where is your data? ◦ Access controlled ◦ Resident copies (stored, electronically or paper) ◦ Dedicated data center ◦ Backup servers ◦ Multi-site storage ◦ Encrypted
  • 22.
     Unreliable datacenter = unreliable Cloud  Reliable data centers have common engineering characteristics: ◦ Redundant capacity ◦ Concurrent maintainability ◦ Fault tolerance  Scaling down reliability ◦ PODs, Hybrid, Modular data centers ◦ The “7-11” Solution ◦ “Laptop, Smartphone, HD” to Go ◦ “Data Centers on a Chip”
  • 23.
    The Cloud is a Service ◦ Get your Service Level Agreements right ◦ Train your suppliers, train your users  The Cloud is the Data Center ◦ Locate, design, build and operate for reliability ◦ Leverage reliability methodology no matter what the scale  Low tech business continuity options ◦ Don’t assume high tech is going to be the go-to solution ◦ Build your crash cart
  • 24.
    RANSFORM legacy MANAGE AN frastructure, SECURE acro pplications, people legacy applica nd process and cloud ass on-premises CO ervices of se se
  • 25.
     Are space,power and cooling sufficiently available?  Are there differentiated reliability levels?  Are personnel screened and trained?  Are vendors and other clients managed effectively?  What is the connectivity capacity and topography?  What is the availability history of the site?  Are SLA’s negotiable and meaningful?  Do I trust my data to their management?
  • 26.
     Do Ihave more than two ways to communicate?  How long can I operate with no internet?  Can I recover data after the internet is restored?  Is my recovery management dependent on the network?  Are my human resources going to be available and productive?  Am I sure my plan is going to work?
  • 28.
    Data demand is driving the cloud  The data center is the cloud  There will be a significant increase in data centers, worldwide to meet demand.  The major risk is loss of access to data to run the business and service clients.  Network, data and physical security need to be managed to mitigate real risks.  Ask the right questions before committing.  Have a valid, tested recovery plan.
  • 29.
    Credits: •Ian Jagger, HP Marketing •US Government, office of GAO •Security Weekly •Christian Belady, MS Gobal Foundation Services •Gail Dutton, Contributor, Data Center Management •David Geer, Freelance writer Richard L. Sawyer, Strategist, HP Critical Facility Services rsawyer@hp.com
  • 30.
    Interested in learningmore cloud? Learn about the cloud sessions offered at the upcoming Fall 2012 Data Center World Conference at: www.datacenterworld.com. This presentation was given during the Spring, 2012 Data Center World Conference and Expo. Contents contained are owned by AFCOM and Data Center World and can only be reused with the express permission of ACOM. Questions or for permission contact: jater@afcom.com.