SlideShare a Scribd company logo
Trepidation in Moving to
the Cloud
Dave Sobel
CEO, Evolve Technologies
www.comptia.org/emea2010
From http://geekandpoke.typepad.com 1
www.comptia.org/emea2010
Trepidation in Moving to the Cloud
Dave Sobel
CEO, Evolve Technologies
About Dave
• CEO, Evolve Technologies
– Washington DC IT Solution
Provider
– Microsoft Certified Partner
– Small Business Specialist
• HTG Member and Facilitator
• Author, “Virtualization: Defined. A
Primer for the SMB Consultant”
• Biz Blog:
www.evolvetech.com/blog
• Virtualization Blog:
www.smbvirtualization.net
• Microsoft MVP, Virtualization
• Columnist, Channel Insider
• Columnist, CRN
Today, more than ever, CIOs and their
organizations are under pressure…
VOLUME OF DIGITAL DATA
VARIETY OF INFORMATION
ECONOMIC PRESSURES THE DEMANDING CONSUMER
IT INTEGRATION
LAWS, REGULATIONS AND
STANDARDS
GROWTH OPPORTUNITIES
AVAILABILITY
RISING COST PRESSURES
HIGHER SERVICE EXPECTATIONS
EMERGING TECHNOLOGIES
5
IT infrastructure is reaching a breaking point.
85% idle
In distributed computing
environments, up to
85% of computing
capacity sits idle.
Consumer product and retail
industries lose about $40
billion annually, or 3.5 percent
of their sales, due to supply
chain inefficiencies.
33% of consumers notified
of a security breach will
terminate their relationship
with the company they
perceive as responsible.
33%$40 billion
Explosion of information
driving 54% growth in
storage shipments
every year.
1.5x 70¢ per $1
70% on average is spent
on maintaining current IT
infrastructures versus
adding new capabilities.
There are major forces of change at work,
affecting business and IT
Our world is smaller and flatter but it’s about to become more…
INSTRUMENTED
INTERCONNECTED
INTELLIGENT
Increasing access, globalization
and risk
Increasing devices and opportunity
for innovation
Increasing data and the use of technology
to capitalise on change
CEOs see an environment of unrelenting change, as well as opportunities to think
smarter - - economically, socially and technically.
7
Cloud spending to grow six times faster than traditional IT spending
USD 16.2 billion (2008)
57%
11%
18%
5%
9%
Storage Server
App Dev & Deployment Infrastructure
Bussiness Application
USD 42.3 billion (2012)
52%
9%
18%
13%
8%
Storage Server
App Dev & Deployment Infrastructure
Bussiness Application
• IDC forecasts the cloud computing services market to grow at a CAGR of 27 percent from USD 16.2 billion in 2008
to USD 42 billion in 2012. On the other hand, Gartner expects the worldwide cloud services revenue to cross USD 56.3
billion in 2009 to USD 150 billion by 2013.
• IDC estimates the traditional IT spending to grow at a CAGR of 7 percent to USD 494 billion in 2012 from USD 383
billion in 2008. Thus, the forecasted growth rate of cloud spending is six times that of traditional IT spending.
Size and Growth
By 2011, the world will be 10 times more instrumented then it was in 2006.
Internet connected devices will leap from 500M to 1 Trillion.
2005 2006 2007 2008 2009 2010 2011
0
200
400
600
800
1,000
1,200
1,400
1,600
1,800
Exabytes
RFID,
Digital TV,
MP3 players,
Digital cameras,
Camera phones, VoIP,
Medical imaging, Laptops,
smart meters, multi-player games,
Satellite images, GPS, ATMs, Scanners,
Sensors, Digital radio, DLP theaters, Telematics,
Peer-to-peer, Email, Instant messaging, Videoconferencing,
CAD/CAM, Toys, Industrial machines, Security systems, Appliances
10x
growth in
five years
Continuum of services overview
Time
Responsibilities/Risks
TransferedtoServiceProvider
“Do it yourself”
Bodyshopping
Out-tasking
Managed Services
Outsourcing
Source: www.google.com/trends
Customers’ expectations today and in perspective ?
Evolution Over The YearsAdoption
Time
1961
John McCarthy proposed
'computer time-sharing
technology' to be sold
through utility business
model (like electricity) in a
lecture at MIT
Mid 90’s
ASP (Application Service
Provider) model with
single tenant hosting of
applications
Early 00’s
SaaS (Software as a
Service) model with
multi-tenant hosting of
applications
Late 00’s
Cloud Computing with pay
as you go model, leveraging
virtualization for data center
efficiencies and faster
networks
13 Security and Cloud Computing
Customization, efficiency,
availability, resiliency,
security and privacy …
Standardization, capital
preservation, flexibility and
time to deploy …
Public …
• Access open to everybody,
subject to subscription
• Shared resources
• Multiple tenants
• Delivers select set of
standardized business process,
application and/or
infrastructure services on a
flexible price per use basis
• Always managed and hosted
by 3rd party
Private …
• Access limited to enterprise
and its partner network
• Dedicated resources
• Single tenant
• Drives efficiency,
standardization and best
practices while retaining
greater customization and
control
• Might be managed or hosted
by third party
Cloud Computing
Model
Cloud Services
Cloud Computing Delivery Models
Hybrid …
• Private infrastructure,
integrated with public cloud
Community …
• Several organizations with
similar needs and policies
share a private cloud
Public vs Private Cloud
Cloud Choices
Exclusive environment
Limited on-demand
capabilities
Private Cloud
On-demand resources,
scalability
Shared environment
Public Cloud
Requires Initial Capital Investment
Cloud setup within Org’s data center
Control on security and audit
Based on basic virtualization
Limited on-demand scaling
On-Premise Private Cloud
Exclusive, but hosted by a third party
Limited on-demand scaling
Expensive than public cloud
Cheaper than on-premise private cloud
Possibility of co-location
Externally Hosted Private Cloud
Hybrid Cloud
Public + Private
cloud
Source: TorryHarris Business Solutions on slideshare.net
USE CASES
USE CASES
17 Security and Cloud Computing
Compliance
Complying with PCI DSS
and other regulations may
prohibit the use of clouds for
some applications.
Reliability
High availability will be a key concern. IT
departments will worry about a loss of
service should outages occur.
Control
Many companies and governments
are uncomfortable with the idea of
their information located on systems
they do not control.
Security Management
Even the simplest of tasks may be behind
layers of abstraction or performed by
someone else.
Data
Migrating workloads to a shared
network and compute infrastructure
increases the potential for
unauthorized exposure.
Categories of Cloud Computing Risks
Providers must offer a high degree of
security transparency to help
put customers at ease.
Authentication and access
technologies become increasingly
important.
Mission critical applications may
not run in the cloud without
strong availability guarantees.
Comprehensive auditing
capabilities are essential.
Providers must supply easy controls to
manage security settings for application and
runtime environments.
18 Security and Cloud Computing
Of enterprises consider security
the #1 inhibitor to cloud adoptions
80%
Of enterprises are concerned
about the reliability of clouds
48%
Of respondents are concerned with cloud
interfering with their ability
to comply with regulations
33%
Source: Driving Profitable Growth Through Cloud Computing, IBM Study (conducted by Oliver Wyman)
“I prefer internal cloud to IaaS. When the service is
kept internally, I am more comfortable with the
security that it offers.”
“Security is the biggest concern. I don’t worry
much about the other “-ities” – reliability,
availability, etc.”
“How can we be assured that our data will not be
leaked and that the vendors have the technology
and the governance to control its employees from
stealing data?”
Security Remains the Top Concern for Cloud
Adoption
19 Security and Cloud Computing
Specific Customer Concerns Related to Security
Protection of intellectual property and data
Ability to enforce regulatory or contractual obligations
Unauthorized use of data
Confidentiality of data
Availability of data
Integrity of data
Ability to test or audit a provider’s environment
Other
30%
21%
15%
12%
9%
8%
6%
3%
Source: Deloitte Enterprise@Risk: Privacy and Data Protection Survey
USE CASES – and where the £’s are
USE CASES –
and where
the £’s are
dave@evolvetech.com
+44 (0)20 8002 9740 x111
www.smbvirtualization.net

More Related Content

What's hot

2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)
2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)
2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)
Danny Miller
 
Cloud Computing in Indonesia
Cloud Computing in IndonesiaCloud Computing in Indonesia
Cloud Computing in Indonesia
Heru Sutadi
 
Unified Endpoint Management: Security & Productivity for the Mobile Enterprise
Unified Endpoint Management: Security & Productivity for the Mobile EnterpriseUnified Endpoint Management: Security & Productivity for the Mobile Enterprise
Unified Endpoint Management: Security & Productivity for the Mobile Enterprise
Citrix
 
Top 3 Reasons to Deliver Web Apps with Application Virtualization
Top 3 Reasons to Deliver Web Apps with Application VirtualizationTop 3 Reasons to Deliver Web Apps with Application Virtualization
Top 3 Reasons to Deliver Web Apps with Application Virtualization
Citrix
 
Cloud Computing Risk Management (Multi Venue)
Cloud Computing Risk Management (Multi Venue)Cloud Computing Risk Management (Multi Venue)
Cloud Computing Risk Management (Multi Venue)Brian K. Dickard
 
MT81 Keys to Successful Enterprise IoT Initiatives
MT81 Keys to Successful Enterprise IoT InitiativesMT81 Keys to Successful Enterprise IoT Initiatives
MT81 Keys to Successful Enterprise IoT Initiatives
Dell EMC World
 
IBM Security Strategy Intelligence,
IBM Security Strategy Intelligence,IBM Security Strategy Intelligence,
IBM Security Strategy Intelligence,
Information Security Awareness Group
 
Ohm2013 cloud security 101 slideshare
Ohm2013 cloud security 101 slideshareOhm2013 cloud security 101 slideshare
Ohm2013 cloud security 101 slideshare
Peter HJ van Eijk
 
HP2065_TieCon_Presentation_V7
HP2065_TieCon_Presentation_V7HP2065_TieCon_Presentation_V7
HP2065_TieCon_Presentation_V7Mark Interrante
 
Transforming Business with Citrix: Customers Share Their Stories.
Transforming Business with Citrix: Customers Share Their Stories.Transforming Business with Citrix: Customers Share Their Stories.
Transforming Business with Citrix: Customers Share Their Stories.
Citrix
 
How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?
How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?
How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?
Citrix
 
CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...
CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...
CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...
Phil Agcaoili
 
A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things
NetIQ
 
Privacy issues in the cloud final
Privacy issues in the cloud   finalPrivacy issues in the cloud   final
Privacy issues in the cloud finalguest50a642f
 
Cloud computing
Cloud computingCloud computing
Cloud computing
jhoejoe
 
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Troy Marshall
 
Democratizing IT Automation in a Multi-Cloud World
Democratizing IT Automation in a Multi-Cloud WorldDemocratizing IT Automation in a Multi-Cloud World
Democratizing IT Automation in a Multi-Cloud World
Enterprise Management Associates
 
Key Security Insights: Examining 2014 to predict emerging threats
Key Security Insights: Examining 2014 to predict emerging threats Key Security Insights: Examining 2014 to predict emerging threats
Key Security Insights: Examining 2014 to predict emerging threats
Dell World
 
Cloud computing - Risks and Mitigation - GTS
Cloud computing - Risks and Mitigation - GTSCloud computing - Risks and Mitigation - GTS
Cloud computing - Risks and Mitigation - GTS
Anchises Moraes
 
Desktop Virtualization: Reduce Costs, Improve Efficiencies with Proven VDI So...
Desktop Virtualization: Reduce Costs, Improve Efficiencies with Proven VDI So...Desktop Virtualization: Reduce Costs, Improve Efficiencies with Proven VDI So...
Desktop Virtualization: Reduce Costs, Improve Efficiencies with Proven VDI So...
Citrix
 

What's hot (20)

2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)
2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)
2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)
 
Cloud Computing in Indonesia
Cloud Computing in IndonesiaCloud Computing in Indonesia
Cloud Computing in Indonesia
 
Unified Endpoint Management: Security & Productivity for the Mobile Enterprise
Unified Endpoint Management: Security & Productivity for the Mobile EnterpriseUnified Endpoint Management: Security & Productivity for the Mobile Enterprise
Unified Endpoint Management: Security & Productivity for the Mobile Enterprise
 
Top 3 Reasons to Deliver Web Apps with Application Virtualization
Top 3 Reasons to Deliver Web Apps with Application VirtualizationTop 3 Reasons to Deliver Web Apps with Application Virtualization
Top 3 Reasons to Deliver Web Apps with Application Virtualization
 
Cloud Computing Risk Management (Multi Venue)
Cloud Computing Risk Management (Multi Venue)Cloud Computing Risk Management (Multi Venue)
Cloud Computing Risk Management (Multi Venue)
 
MT81 Keys to Successful Enterprise IoT Initiatives
MT81 Keys to Successful Enterprise IoT InitiativesMT81 Keys to Successful Enterprise IoT Initiatives
MT81 Keys to Successful Enterprise IoT Initiatives
 
IBM Security Strategy Intelligence,
IBM Security Strategy Intelligence,IBM Security Strategy Intelligence,
IBM Security Strategy Intelligence,
 
Ohm2013 cloud security 101 slideshare
Ohm2013 cloud security 101 slideshareOhm2013 cloud security 101 slideshare
Ohm2013 cloud security 101 slideshare
 
HP2065_TieCon_Presentation_V7
HP2065_TieCon_Presentation_V7HP2065_TieCon_Presentation_V7
HP2065_TieCon_Presentation_V7
 
Transforming Business with Citrix: Customers Share Their Stories.
Transforming Business with Citrix: Customers Share Their Stories.Transforming Business with Citrix: Customers Share Their Stories.
Transforming Business with Citrix: Customers Share Their Stories.
 
How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?
How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?
How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?
 
CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...
CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...
CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...
 
A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things
 
Privacy issues in the cloud final
Privacy issues in the cloud   finalPrivacy issues in the cloud   final
Privacy issues in the cloud final
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
 
Democratizing IT Automation in a Multi-Cloud World
Democratizing IT Automation in a Multi-Cloud WorldDemocratizing IT Automation in a Multi-Cloud World
Democratizing IT Automation in a Multi-Cloud World
 
Key Security Insights: Examining 2014 to predict emerging threats
Key Security Insights: Examining 2014 to predict emerging threats Key Security Insights: Examining 2014 to predict emerging threats
Key Security Insights: Examining 2014 to predict emerging threats
 
Cloud computing - Risks and Mitigation - GTS
Cloud computing - Risks and Mitigation - GTSCloud computing - Risks and Mitigation - GTS
Cloud computing - Risks and Mitigation - GTS
 
Desktop Virtualization: Reduce Costs, Improve Efficiencies with Proven VDI So...
Desktop Virtualization: Reduce Costs, Improve Efficiencies with Proven VDI So...Desktop Virtualization: Reduce Costs, Improve Efficiencies with Proven VDI So...
Desktop Virtualization: Reduce Costs, Improve Efficiencies with Proven VDI So...
 

Similar to EMEA10: Trepidation in Moving to the Cloud

F ernando sousa ibm_from hype to realiity
F ernando sousa ibm_from hype to realiityF ernando sousa ibm_from hype to realiity
F ernando sousa ibm_from hype to realiityEuroCloud
 
Cloud computing
Cloud computingCloud computing
Cloud computingRazib M
 
May 2013 Federal Cloud Computing Summit Keynote by David Cearly
May 2013 Federal Cloud Computing Summit Keynote by David CearlyMay 2013 Federal Cloud Computing Summit Keynote by David Cearly
May 2013 Federal Cloud Computing Summit Keynote by David Cearly
Tim Harvey
 
Boston Cloud Dinner/Discussion November 2010
Boston Cloud Dinner/Discussion November 2010Boston Cloud Dinner/Discussion November 2010
Boston Cloud Dinner/Discussion November 2010Ness Technologies
 
cloud security ppt
cloud security ppt cloud security ppt
cloud security ppt
Devyani Vaidya
 
Cloud Security
Cloud Security Cloud Security
Cloud Security
Devyani Vaidya
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
Devyani Vaidya
 
Enabling Cloud Computing
Enabling Cloud ComputingEnabling Cloud Computing
Enabling Cloud Computing
tntsa1972
 
Cloud Computing in Business and facts
Cloud Computing in Business and factsCloud Computing in Business and facts
Cloud Computing in Business and factsArun Ganesh
 
2016 Cloud Unbound Briefing
2016 Cloud Unbound Briefing2016 Cloud Unbound Briefing
2016 Cloud Unbound Briefing
Scott Cameron
 
Transcending IT Planetary Boundaries: Future of cloud, By Pradeep Gupta, Cha...
Transcending  IT Planetary Boundaries: Future of cloud, By Pradeep Gupta, Cha...Transcending  IT Planetary Boundaries: Future of cloud, By Pradeep Gupta, Cha...
Transcending IT Planetary Boundaries: Future of cloud, By Pradeep Gupta, Cha...HCL Infosystems
 
Cloud Computing - A future prerogative
Cloud Computing - A future prerogativeCloud Computing - A future prerogative
Cloud Computing - A future prerogativeWayne Poggenpoel
 
Indonesia new default short msp client presentation partnership with isv
Indonesia new default short msp client presentation   partnership with isvIndonesia new default short msp client presentation   partnership with isv
Indonesia new default short msp client presentation partnership with isv
Pandu W Sastrowardoyo
 
MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night? MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night?
Jorge García
 
Bni cloud presentation
Bni cloud presentationBni cloud presentation
Bni cloud presentation
richszy
 
1 - Cloud Computing Basics.pptx
1 - Cloud Computing Basics.pptx1 - Cloud Computing Basics.pptx
1 - Cloud Computing Basics.pptx
MuhammadArslan799356
 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud Computing
Ashish Patel
 
Keys to success and security in the cloud
Keys to success and security in the cloudKeys to success and security in the cloud
Keys to success and security in the cloud
Scalar Decisions
 
Keys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-CloudKeys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-Cloudpatmisasi
 

Similar to EMEA10: Trepidation in Moving to the Cloud (20)

F ernando sousa ibm_from hype to realiity
F ernando sousa ibm_from hype to realiityF ernando sousa ibm_from hype to realiity
F ernando sousa ibm_from hype to realiity
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
May 2013 Federal Cloud Computing Summit Keynote by David Cearly
May 2013 Federal Cloud Computing Summit Keynote by David CearlyMay 2013 Federal Cloud Computing Summit Keynote by David Cearly
May 2013 Federal Cloud Computing Summit Keynote by David Cearly
 
Boston Cloud Dinner/Discussion November 2010
Boston Cloud Dinner/Discussion November 2010Boston Cloud Dinner/Discussion November 2010
Boston Cloud Dinner/Discussion November 2010
 
cloud security ppt
cloud security ppt cloud security ppt
cloud security ppt
 
Cloud Security
Cloud Security Cloud Security
Cloud Security
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Enabling Cloud Computing
Enabling Cloud ComputingEnabling Cloud Computing
Enabling Cloud Computing
 
Business in the cloud
Business in the cloudBusiness in the cloud
Business in the cloud
 
Cloud Computing in Business and facts
Cloud Computing in Business and factsCloud Computing in Business and facts
Cloud Computing in Business and facts
 
2016 Cloud Unbound Briefing
2016 Cloud Unbound Briefing2016 Cloud Unbound Briefing
2016 Cloud Unbound Briefing
 
Transcending IT Planetary Boundaries: Future of cloud, By Pradeep Gupta, Cha...
Transcending  IT Planetary Boundaries: Future of cloud, By Pradeep Gupta, Cha...Transcending  IT Planetary Boundaries: Future of cloud, By Pradeep Gupta, Cha...
Transcending IT Planetary Boundaries: Future of cloud, By Pradeep Gupta, Cha...
 
Cloud Computing - A future prerogative
Cloud Computing - A future prerogativeCloud Computing - A future prerogative
Cloud Computing - A future prerogative
 
Indonesia new default short msp client presentation partnership with isv
Indonesia new default short msp client presentation   partnership with isvIndonesia new default short msp client presentation   partnership with isv
Indonesia new default short msp client presentation partnership with isv
 
MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night? MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night?
 
Bni cloud presentation
Bni cloud presentationBni cloud presentation
Bni cloud presentation
 
1 - Cloud Computing Basics.pptx
1 - Cloud Computing Basics.pptx1 - Cloud Computing Basics.pptx
1 - Cloud Computing Basics.pptx
 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud Computing
 
Keys to success and security in the cloud
Keys to success and security in the cloudKeys to success and security in the cloud
Keys to success and security in the cloud
 
Keys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-CloudKeys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-Cloud
 

More from CompTIA UK

EMEA10: New Innovations from Pearson VUE for 2011
EMEA10: New Innovations from Pearson VUE for 2011EMEA10: New Innovations from Pearson VUE for 2011
EMEA10: New Innovations from Pearson VUE for 2011
CompTIA UK
 
EMEA10: Commercial certification in Further and Higher Education (developing ...
EMEA10: Commercial certification in Further and Higher Education (developing ...EMEA10: Commercial certification in Further and Higher Education (developing ...
EMEA10: Commercial certification in Further and Higher Education (developing ...
CompTIA UK
 
EMEA10: Procom - the OCR package
EMEA10: Procom - the OCR packageEMEA10: Procom - the OCR package
EMEA10: Procom - the OCR package
CompTIA UK
 
EMEA10: IT Training and Certification: Value to Employers
EMEA10: IT Training and Certification: Value to EmployersEMEA10: IT Training and Certification: Value to Employers
EMEA10: IT Training and Certification: Value to Employers
CompTIA UK
 
EMEA10: Opening Keynote: Sir Ranuplh Fiennes
EMEA10: Opening Keynote: Sir Ranuplh FiennesEMEA10: Opening Keynote: Sir Ranuplh Fiennes
EMEA10: Opening Keynote: Sir Ranuplh Fiennes
CompTIA UK
 
EMEA10: BTEC IT goes QCF
EMEA10: BTEC IT goes QCFEMEA10: BTEC IT goes QCF
EMEA10: BTEC IT goes QCF
CompTIA UK
 
EMEA10: Implementing CompTIA Strata Fundamentals Into Your Curriculum
EMEA10: Implementing CompTIA Strata Fundamentals Into Your CurriculumEMEA10: Implementing CompTIA Strata Fundamentals Into Your Curriculum
EMEA10: Implementing CompTIA Strata Fundamentals Into Your Curriculum
CompTIA UK
 
EMEA10: Delivering CompTIA Certifications: New opportunities with the QCF
EMEA10: Delivering CompTIA Certifications: New opportunities with the QCF EMEA10: Delivering CompTIA Certifications: New opportunities with the QCF
EMEA10: Delivering CompTIA Certifications: New opportunities with the QCF
CompTIA UK
 
EMEA10: Practice Makes Perfect - Bringing Experiential Learning to Life
EMEA10: Practice Makes Perfect - Bringing Experiential Learning to LifeEMEA10: Practice Makes Perfect - Bringing Experiential Learning to Life
EMEA10: Practice Makes Perfect - Bringing Experiential Learning to Life
CompTIA UK
 
EMEA10: E2C Welcome and Opening Keynote
EMEA10: E2C Welcome and Opening KeynoteEMEA10: E2C Welcome and Opening Keynote
EMEA10: E2C Welcome and Opening Keynote
CompTIA UK
 

More from CompTIA UK (10)

EMEA10: New Innovations from Pearson VUE for 2011
EMEA10: New Innovations from Pearson VUE for 2011EMEA10: New Innovations from Pearson VUE for 2011
EMEA10: New Innovations from Pearson VUE for 2011
 
EMEA10: Commercial certification in Further and Higher Education (developing ...
EMEA10: Commercial certification in Further and Higher Education (developing ...EMEA10: Commercial certification in Further and Higher Education (developing ...
EMEA10: Commercial certification in Further and Higher Education (developing ...
 
EMEA10: Procom - the OCR package
EMEA10: Procom - the OCR packageEMEA10: Procom - the OCR package
EMEA10: Procom - the OCR package
 
EMEA10: IT Training and Certification: Value to Employers
EMEA10: IT Training and Certification: Value to EmployersEMEA10: IT Training and Certification: Value to Employers
EMEA10: IT Training and Certification: Value to Employers
 
EMEA10: Opening Keynote: Sir Ranuplh Fiennes
EMEA10: Opening Keynote: Sir Ranuplh FiennesEMEA10: Opening Keynote: Sir Ranuplh Fiennes
EMEA10: Opening Keynote: Sir Ranuplh Fiennes
 
EMEA10: BTEC IT goes QCF
EMEA10: BTEC IT goes QCFEMEA10: BTEC IT goes QCF
EMEA10: BTEC IT goes QCF
 
EMEA10: Implementing CompTIA Strata Fundamentals Into Your Curriculum
EMEA10: Implementing CompTIA Strata Fundamentals Into Your CurriculumEMEA10: Implementing CompTIA Strata Fundamentals Into Your Curriculum
EMEA10: Implementing CompTIA Strata Fundamentals Into Your Curriculum
 
EMEA10: Delivering CompTIA Certifications: New opportunities with the QCF
EMEA10: Delivering CompTIA Certifications: New opportunities with the QCF EMEA10: Delivering CompTIA Certifications: New opportunities with the QCF
EMEA10: Delivering CompTIA Certifications: New opportunities with the QCF
 
EMEA10: Practice Makes Perfect - Bringing Experiential Learning to Life
EMEA10: Practice Makes Perfect - Bringing Experiential Learning to LifeEMEA10: Practice Makes Perfect - Bringing Experiential Learning to Life
EMEA10: Practice Makes Perfect - Bringing Experiential Learning to Life
 
EMEA10: E2C Welcome and Opening Keynote
EMEA10: E2C Welcome and Opening KeynoteEMEA10: E2C Welcome and Opening Keynote
EMEA10: E2C Welcome and Opening Keynote
 

Recently uploaded

Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 

Recently uploaded (20)

Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 

EMEA10: Trepidation in Moving to the Cloud

  • 1. Trepidation in Moving to the Cloud Dave Sobel CEO, Evolve Technologies
  • 3. www.comptia.org/emea2010 Trepidation in Moving to the Cloud Dave Sobel CEO, Evolve Technologies
  • 4. About Dave • CEO, Evolve Technologies – Washington DC IT Solution Provider – Microsoft Certified Partner – Small Business Specialist • HTG Member and Facilitator • Author, “Virtualization: Defined. A Primer for the SMB Consultant” • Biz Blog: www.evolvetech.com/blog • Virtualization Blog: www.smbvirtualization.net • Microsoft MVP, Virtualization • Columnist, Channel Insider • Columnist, CRN
  • 5. Today, more than ever, CIOs and their organizations are under pressure… VOLUME OF DIGITAL DATA VARIETY OF INFORMATION ECONOMIC PRESSURES THE DEMANDING CONSUMER IT INTEGRATION LAWS, REGULATIONS AND STANDARDS GROWTH OPPORTUNITIES AVAILABILITY RISING COST PRESSURES HIGHER SERVICE EXPECTATIONS EMERGING TECHNOLOGIES
  • 6. 5 IT infrastructure is reaching a breaking point. 85% idle In distributed computing environments, up to 85% of computing capacity sits idle. Consumer product and retail industries lose about $40 billion annually, or 3.5 percent of their sales, due to supply chain inefficiencies. 33% of consumers notified of a security breach will terminate their relationship with the company they perceive as responsible. 33%$40 billion Explosion of information driving 54% growth in storage shipments every year. 1.5x 70¢ per $1 70% on average is spent on maintaining current IT infrastructures versus adding new capabilities.
  • 7. There are major forces of change at work, affecting business and IT Our world is smaller and flatter but it’s about to become more… INSTRUMENTED INTERCONNECTED INTELLIGENT Increasing access, globalization and risk Increasing devices and opportunity for innovation Increasing data and the use of technology to capitalise on change CEOs see an environment of unrelenting change, as well as opportunities to think smarter - - economically, socially and technically.
  • 8. 7 Cloud spending to grow six times faster than traditional IT spending USD 16.2 billion (2008) 57% 11% 18% 5% 9% Storage Server App Dev & Deployment Infrastructure Bussiness Application USD 42.3 billion (2012) 52% 9% 18% 13% 8% Storage Server App Dev & Deployment Infrastructure Bussiness Application • IDC forecasts the cloud computing services market to grow at a CAGR of 27 percent from USD 16.2 billion in 2008 to USD 42 billion in 2012. On the other hand, Gartner expects the worldwide cloud services revenue to cross USD 56.3 billion in 2009 to USD 150 billion by 2013. • IDC estimates the traditional IT spending to grow at a CAGR of 7 percent to USD 494 billion in 2012 from USD 383 billion in 2008. Thus, the forecasted growth rate of cloud spending is six times that of traditional IT spending. Size and Growth
  • 9. By 2011, the world will be 10 times more instrumented then it was in 2006. Internet connected devices will leap from 500M to 1 Trillion. 2005 2006 2007 2008 2009 2010 2011 0 200 400 600 800 1,000 1,200 1,400 1,600 1,800 Exabytes RFID, Digital TV, MP3 players, Digital cameras, Camera phones, VoIP, Medical imaging, Laptops, smart meters, multi-player games, Satellite images, GPS, ATMs, Scanners, Sensors, Digital radio, DLP theaters, Telematics, Peer-to-peer, Email, Instant messaging, Videoconferencing, CAD/CAM, Toys, Industrial machines, Security systems, Appliances 10x growth in five years
  • 10. Continuum of services overview Time Responsibilities/Risks TransferedtoServiceProvider “Do it yourself” Bodyshopping Out-tasking Managed Services Outsourcing
  • 12. Customers’ expectations today and in perspective ?
  • 13. Evolution Over The YearsAdoption Time 1961 John McCarthy proposed 'computer time-sharing technology' to be sold through utility business model (like electricity) in a lecture at MIT Mid 90’s ASP (Application Service Provider) model with single tenant hosting of applications Early 00’s SaaS (Software as a Service) model with multi-tenant hosting of applications Late 00’s Cloud Computing with pay as you go model, leveraging virtualization for data center efficiencies and faster networks
  • 14. 13 Security and Cloud Computing Customization, efficiency, availability, resiliency, security and privacy … Standardization, capital preservation, flexibility and time to deploy … Public … • Access open to everybody, subject to subscription • Shared resources • Multiple tenants • Delivers select set of standardized business process, application and/or infrastructure services on a flexible price per use basis • Always managed and hosted by 3rd party Private … • Access limited to enterprise and its partner network • Dedicated resources • Single tenant • Drives efficiency, standardization and best practices while retaining greater customization and control • Might be managed or hosted by third party Cloud Computing Model Cloud Services Cloud Computing Delivery Models Hybrid … • Private infrastructure, integrated with public cloud Community … • Several organizations with similar needs and policies share a private cloud
  • 15. Public vs Private Cloud Cloud Choices Exclusive environment Limited on-demand capabilities Private Cloud On-demand resources, scalability Shared environment Public Cloud Requires Initial Capital Investment Cloud setup within Org’s data center Control on security and audit Based on basic virtualization Limited on-demand scaling On-Premise Private Cloud Exclusive, but hosted by a third party Limited on-demand scaling Expensive than public cloud Cheaper than on-premise private cloud Possibility of co-location Externally Hosted Private Cloud Hybrid Cloud Public + Private cloud Source: TorryHarris Business Solutions on slideshare.net
  • 18. 17 Security and Cloud Computing Compliance Complying with PCI DSS and other regulations may prohibit the use of clouds for some applications. Reliability High availability will be a key concern. IT departments will worry about a loss of service should outages occur. Control Many companies and governments are uncomfortable with the idea of their information located on systems they do not control. Security Management Even the simplest of tasks may be behind layers of abstraction or performed by someone else. Data Migrating workloads to a shared network and compute infrastructure increases the potential for unauthorized exposure. Categories of Cloud Computing Risks Providers must offer a high degree of security transparency to help put customers at ease. Authentication and access technologies become increasingly important. Mission critical applications may not run in the cloud without strong availability guarantees. Comprehensive auditing capabilities are essential. Providers must supply easy controls to manage security settings for application and runtime environments.
  • 19. 18 Security and Cloud Computing Of enterprises consider security the #1 inhibitor to cloud adoptions 80% Of enterprises are concerned about the reliability of clouds 48% Of respondents are concerned with cloud interfering with their ability to comply with regulations 33% Source: Driving Profitable Growth Through Cloud Computing, IBM Study (conducted by Oliver Wyman) “I prefer internal cloud to IaaS. When the service is kept internally, I am more comfortable with the security that it offers.” “Security is the biggest concern. I don’t worry much about the other “-ities” – reliability, availability, etc.” “How can we be assured that our data will not be leaked and that the vendors have the technology and the governance to control its employees from stealing data?” Security Remains the Top Concern for Cloud Adoption
  • 20. 19 Security and Cloud Computing Specific Customer Concerns Related to Security Protection of intellectual property and data Ability to enforce regulatory or contractual obligations Unauthorized use of data Confidentiality of data Availability of data Integrity of data Ability to test or audit a provider’s environment Other 30% 21% 15% 12% 9% 8% 6% 3% Source: Deloitte Enterprise@Risk: Privacy and Data Protection Survey
  • 21. USE CASES – and where the £’s are
  • 22. USE CASES – and where the £’s are
  • 23.
  • 24.
  • 25.
  • 26.
  • 27. dave@evolvetech.com +44 (0)20 8002 9740 x111 www.smbvirtualization.net