SlideShare a Scribd company logo
© 2015 VMware Inc. All rights reserved.
People, processes, technology
Network Virtualization Best Practise
Emil Gągała
Network & Security Architect
InfraXstructure, 20.04.2016, Warszawa
Network Virtualization change areas
2
TechnologyPeople
Process
Best practices and guidance based on
production customers
The maturity model: the path to the vision
3
Blended
Cross-domain
and discipline
Siloed Specialization
Organization
(Structure)
People
(Roles &
Responsibilities)
People
Automated Modern
Manual Legacy
Processes Tooling
Process
Minimum
Maximum
Minimum
MaximumLeaf-spine fabric Virtual
3-tier Physical
Architecture Infrastructure
Architecture
Simplifying the situation
4
Technology
Process
People
Myth busters!
5
People
You will not be
automated out of a job.
MYTH #1
Software-defined data
center is going to automate
me out of a job
MYTH #2
Network functions will be
absorbed into the
virtualization team
MYTH #3
A virtual overlay is going to
make my job more difficult
MYTH
BUSTER #1
Your job will not go to
the virtualization team.
MYTH
BUSTER #2
Overlays do not make
your job more difficult.
MYTH
BUSTER #3
Private cloud | SDDC
Traditional network | HDDC
Hybrid cloud | SDDC
Org structures (simplified view)
6
Successfully operationalized in a variety of org structures
Compute Storage Networking
People
Minimum
Maximum
OperationsEngineeringArchitecture
Minimum
Maximum
• Blended
• Autonomous
• Intra-team training
Compute Storage Networking
Best practices
CONFIDENTIAL 7
Start with a small, cross-functional team
Select change agents
Define measures
of success
Communicate lessons
and wins
People
1
Network
SecurityCompute
Storage
Incubation team Tiger team
High impact
8
Unified team working together, sharing lessons learned, and continuously improving
People
Silos Specialization
Blended
Cross-domain
and discipline
A closely-knit team working in unison increases
company speed and agility
Team gains new expertise and experience, making
them more strategic and valuable to the company
Leadership opportunity during this networking
and security transformation
Avoid surprises!
New Cloud networking and security roles
Org structure People
9
Network virtualization is based on networking
concepts that require networking expertise
Need network engineers to deploy and
operate it
Career growth and opportunity
Network engineers must learn network
virtualization to stay current
Learning network virtualization is
required for future career growth
People
Simplifying the situation
10
TechnologyPeople
Process
& Tooling
Myth busters!
11
Process
& Tooling
Virtual networks bring
agility and simplicity
to processes.
MYTH #1
Virtual networks adds
complexity to existing
processes
MYTH #2
You need separate tools to
manage virtual and
physical networks
MYTH #3
Network virtualization
reduces visibility
MYTH
BUSTER #1
Existing management
tools can monitor both
networks.
MYTH
BUSTER #2
Provides more context
and visibility.
MYTH
BUSTER #3
Best practices
CONFIDENTIAL 12
Inventory and analyze existing processes
Process
2
Inventory Benchmark Measure
CONFIDENTIAL 13
Start
COTS?
Create
Network Data
flow diagram
Asset Discovery
vCenter
(Tags, notes)
Define List of
IP s & VM s
End
VMware
Infrastructure
Navigator
Existing Firewalls NetFflow Collectors
Existing
Documentation
Existing Asset and
Discovery
Monitoring
Dashboards
Potential Data Sources
Define
Grouping
Objects
Documentation
Security Groups
Vendor
Documentation
Services / Service
Groups
IPSETs
List of IP AddressesList of VM s
Define Security
Posture
Security Policies
Manual Firewall
Rules
Deploy
Performance /
Capacity
management
reports
Best practices
CONFIDENTIAL 14
Automate provisioning and management
Process
3
Start with IT automation
Quick win: security
automation
Self-service: portals and
catalogs
Security Policies & Groups
Development workload
Test workload
Production workload
Application type:
customer PCI
Groups
Finance
Sales
Engineering
Standards
Config #1
Config #2
Config #3
Config #4
Config #5
Config #6
Tooling considerations
Process
& Tooling
Application
Dashboard
Best practices
CONFIDENTIAL 16
Create application-level visibility
Process
4
Start with existing tools
Use same instrumentation
and protocols
Using blend of tools is OKHealth
Utilization
Capacity
COMPUTE NETWORK STORAGE
Real-time
summary
Monitoring and
troubleshooting
Debugging
High impact
17
Automated processes and enhanced network management
Automated Modern
Manual Legacy
Process
& Tooling
Policy-based provisioning of networks and services
brings agility and eliminates common config. errors
Manual operations can be automated (e.g., self service
portals, scaling network services, rule management)
Single view providing highest level of visibility into virtual
and physical SDDC infrastructureProcesses Tooling
Simplifying the situation
18
People
Process
Technology
A tightly integrated
system from a single
vendor is not always
best.
Technology
MYTH #1
A tightly integrated system
from a single vendor is the
best approach.
MYTH #2
Network virtualization
requires a re-architecture
of the physical network.
MYTH #3
Overlay networks are
inherently difficult to
manage.
Myth busters!
MYTH
BUSTER #1
Network Virtualization
works on your existing
physical network.
MYTH
BUSTER #2
Overlay networks have
been proven to be flexible
and easy to manage.
MYTH
BUSTER #3
Define your initial use cases
20
Micro segmentation
DMZ anywhere
Secure end user
Security
IT automating IT
Multi-tenant
infrastructure
Developer cloud
IT automation
Disaster recovery
Metro pooling
Hybrid cloud
networking
Application continuity IT optimization
Server asset utilization
Price | performance
Hardware lifecycle
$
Best practices
CONFIDENTIAL 21
Implement network virtualization incrementally5
Focus on service quality
Collaborate with
stakeholders
Develop SLAs over time
Design the physical
network for simplicity
Technology
Use case #1
Micro-segmentation
Communicate
• Project wins
• Learnings
• KPI metrics
Best practices
CONFIDENTIAL 22
Design the network for simplicity and resiliency6
Technology
Add networking and
security to DR
Workload mobility
and portability
Throughput, scalability,
and robustness
Traditional VLAN network
VM1 VM2
Server 1
VM3
VM4 VM5
Server 2
VM6
VM7 VM8
Server 3
VM9
Physical switch
Virtual networks:
1 2
3
VLANs
Technology
Software Defined Data Center
VM1 VM2
Server 1
VM3
VM4 VM5
Server 2
VM6
VM7 VM8
Server 3
VM9
Controller
Technology
High impact
Decouple and abstract networking services for increased control
Leaf-spine
ECMP fabric Virtual
Access/aggregation
/core
Physical
Resilient and scalable leaf-spine architecture
increases reliability and performance
Centralized point of control for management
and monitoring of virtual networks and security
Distributed implementation of services means
fine-grained policies can be operationalized
Technology
Architecture Infrastructure
Next steps
26
Minimum
Maximum
Minimum
Maximum
Blended
Cross-domain
and discipline
Silos Specialization
People
Automated Modern
Manual Legacy
Process
Leaf-spine
ECMP fabric
Virtual
Access/Aggregation
/Core
Physical
Architecture
TransformationPilotLearning
Organization
(structure)
People
(roles and
responsibilities)
Processes Tooling Architecture Infrastructure
Things to remember
27
Operations transformation results in big outcomes and rewards
Leadership: set vision,
communicate, and
involve people
Grow: gain expertise
and achieve professional
and career growth
Incremental: start with
one use case and set of
applications
Many have done it. It’s not complicated. Minimal changes.
Thank You

More Related Content

What's hot

Comment sécuriser les centres de données virtuels ou infonuagiques avec NSX
Comment sécuriser les centres de données virtuels ou infonuagiques avec NSXComment sécuriser les centres de données virtuels ou infonuagiques avec NSX
Comment sécuriser les centres de données virtuels ou infonuagiques avec NSX
ColloqueRISQ
 
Introduction to Microservices Architecture - SECCOMP 2020
Introduction to Microservices Architecture - SECCOMP 2020Introduction to Microservices Architecture - SECCOMP 2020
Introduction to Microservices Architecture - SECCOMP 2020
Rodrigo Antonialli
 
Why Security Teams should care about VMware
Why Security Teams should care about VMwareWhy Security Teams should care about VMware
Why Security Teams should care about VMware
JJDiGeronimo
 
NSX on VMware Data Center
NSX on VMware Data CenterNSX on VMware Data Center
NSX on VMware Data Center
Angel Villar Garea
 
Purpose-Built-SSL-VPN White Paper
Purpose-Built-SSL-VPN White PaperPurpose-Built-SSL-VPN White Paper
Purpose-Built-SSL-VPN White Paper
Array Networks
 
USB Port Protection that Hardens Endpoint Security and Streamlines Compliance
USB Port Protection that Hardens Endpoint Security and Streamlines ComplianceUSB Port Protection that Hardens Endpoint Security and Streamlines Compliance
USB Port Protection that Hardens Endpoint Security and Streamlines ComplianceNetwrix Corporation
 
Security and Virtualization in the Data Center
Security and Virtualization in the Data CenterSecurity and Virtualization in the Data Center
Security and Virtualization in the Data Center
Cisco Canada
 
CohesiveFT and IBM joint EMEA Webinar - 20Jun13
CohesiveFT and IBM joint EMEA Webinar - 20Jun13CohesiveFT and IBM joint EMEA Webinar - 20Jun13
CohesiveFT and IBM joint EMEA Webinar - 20Jun13
Cohesive Networks
 
VMworld 2013: Introducing NSX Service Composer: The New Consumption Model for...
VMworld 2013: Introducing NSX Service Composer: The New Consumption Model for...VMworld 2013: Introducing NSX Service Composer: The New Consumption Model for...
VMworld 2013: Introducing NSX Service Composer: The New Consumption Model for...
VMworld
 
What You Need To Know About The New PCI Cloud Guidelines
What You Need To Know About The New PCI Cloud GuidelinesWhat You Need To Know About The New PCI Cloud Guidelines
What You Need To Know About The New PCI Cloud GuidelinesCloudPassage
 
S102 cics the future is closer abridged
S102 cics the future is closer abridgedS102 cics the future is closer abridged
S102 cics the future is closer abridged
nick_garrod
 
Data Center Security Now and into the Future
Data Center Security Now and into the FutureData Center Security Now and into the Future
Data Center Security Now and into the Future
Cisco Security
 
Síťová virtualizace s VMware
Síťová virtualizace s VMwareSíťová virtualizace s VMware
Síťová virtualizace s VMware
MarketingArrowECS_CZ
 
Network Virtualization
Network Virtualization Network Virtualization
Network Virtualization
InterVision Systems
 
NATS in action - A Real time Microservices Architecture handled by NATS
NATS in action - A Real time Microservices Architecture handled by NATSNATS in action - A Real time Microservices Architecture handled by NATS
NATS in action - A Real time Microservices Architecture handled by NATSRaül Pérez
 
Webinář: Dell VRTX - datacentrum vše-v-jednom za skvělou cenu / 7.10.2013
Webinář: Dell VRTX - datacentrum vše-v-jednom za skvělou cenu / 7.10.2013Webinář: Dell VRTX - datacentrum vše-v-jednom za skvělou cenu / 7.10.2013
Webinář: Dell VRTX - datacentrum vše-v-jednom za skvělou cenu / 7.10.2013
Jaroslav Prodelal
 
Increasing Business Value Through High-Availability Technology
Increasing Business Value Through High-Availability TechnologyIncreasing Business Value Through High-Availability Technology
Increasing Business Value Through High-Availability Technology
Nexenta Systems
 
DSS ITSEC 2012 Balabit_Security_Shell_Control_Box & Logging
DSS ITSEC 2012 Balabit_Security_Shell_Control_Box & LoggingDSS ITSEC 2012 Balabit_Security_Shell_Control_Box & Logging
DSS ITSEC 2012 Balabit_Security_Shell_Control_Box & Logging
Andris Soroka
 
Update on vDesk 3.0
Update on vDesk 3.0Update on vDesk 3.0
Update on vDesk 3.0
Doug Dooley
 
Is Your Data Secure
Is Your Data SecureIs Your Data Secure
Is Your Data Secure
Real-Time Innovations (RTI)
 

What's hot (20)

Comment sécuriser les centres de données virtuels ou infonuagiques avec NSX
Comment sécuriser les centres de données virtuels ou infonuagiques avec NSXComment sécuriser les centres de données virtuels ou infonuagiques avec NSX
Comment sécuriser les centres de données virtuels ou infonuagiques avec NSX
 
Introduction to Microservices Architecture - SECCOMP 2020
Introduction to Microservices Architecture - SECCOMP 2020Introduction to Microservices Architecture - SECCOMP 2020
Introduction to Microservices Architecture - SECCOMP 2020
 
Why Security Teams should care about VMware
Why Security Teams should care about VMwareWhy Security Teams should care about VMware
Why Security Teams should care about VMware
 
NSX on VMware Data Center
NSX on VMware Data CenterNSX on VMware Data Center
NSX on VMware Data Center
 
Purpose-Built-SSL-VPN White Paper
Purpose-Built-SSL-VPN White PaperPurpose-Built-SSL-VPN White Paper
Purpose-Built-SSL-VPN White Paper
 
USB Port Protection that Hardens Endpoint Security and Streamlines Compliance
USB Port Protection that Hardens Endpoint Security and Streamlines ComplianceUSB Port Protection that Hardens Endpoint Security and Streamlines Compliance
USB Port Protection that Hardens Endpoint Security and Streamlines Compliance
 
Security and Virtualization in the Data Center
Security and Virtualization in the Data CenterSecurity and Virtualization in the Data Center
Security and Virtualization in the Data Center
 
CohesiveFT and IBM joint EMEA Webinar - 20Jun13
CohesiveFT and IBM joint EMEA Webinar - 20Jun13CohesiveFT and IBM joint EMEA Webinar - 20Jun13
CohesiveFT and IBM joint EMEA Webinar - 20Jun13
 
VMworld 2013: Introducing NSX Service Composer: The New Consumption Model for...
VMworld 2013: Introducing NSX Service Composer: The New Consumption Model for...VMworld 2013: Introducing NSX Service Composer: The New Consumption Model for...
VMworld 2013: Introducing NSX Service Composer: The New Consumption Model for...
 
What You Need To Know About The New PCI Cloud Guidelines
What You Need To Know About The New PCI Cloud GuidelinesWhat You Need To Know About The New PCI Cloud Guidelines
What You Need To Know About The New PCI Cloud Guidelines
 
S102 cics the future is closer abridged
S102 cics the future is closer abridgedS102 cics the future is closer abridged
S102 cics the future is closer abridged
 
Data Center Security Now and into the Future
Data Center Security Now and into the FutureData Center Security Now and into the Future
Data Center Security Now and into the Future
 
Síťová virtualizace s VMware
Síťová virtualizace s VMwareSíťová virtualizace s VMware
Síťová virtualizace s VMware
 
Network Virtualization
Network Virtualization Network Virtualization
Network Virtualization
 
NATS in action - A Real time Microservices Architecture handled by NATS
NATS in action - A Real time Microservices Architecture handled by NATSNATS in action - A Real time Microservices Architecture handled by NATS
NATS in action - A Real time Microservices Architecture handled by NATS
 
Webinář: Dell VRTX - datacentrum vše-v-jednom za skvělou cenu / 7.10.2013
Webinář: Dell VRTX - datacentrum vše-v-jednom za skvělou cenu / 7.10.2013Webinář: Dell VRTX - datacentrum vše-v-jednom za skvělou cenu / 7.10.2013
Webinář: Dell VRTX - datacentrum vše-v-jednom za skvělou cenu / 7.10.2013
 
Increasing Business Value Through High-Availability Technology
Increasing Business Value Through High-Availability TechnologyIncreasing Business Value Through High-Availability Technology
Increasing Business Value Through High-Availability Technology
 
DSS ITSEC 2012 Balabit_Security_Shell_Control_Box & Logging
DSS ITSEC 2012 Balabit_Security_Shell_Control_Box & LoggingDSS ITSEC 2012 Balabit_Security_Shell_Control_Box & Logging
DSS ITSEC 2012 Balabit_Security_Shell_Control_Box & Logging
 
Update on vDesk 3.0
Update on vDesk 3.0Update on vDesk 3.0
Update on vDesk 3.0
 
Is Your Data Secure
Is Your Data SecureIs Your Data Secure
Is Your Data Secure
 

Viewers also liked

infraxstructure: Stas Levitan, "Always On" business in cloud - 2016"
infraxstructure: Stas Levitan, "Always On" business in cloud - 2016"infraxstructure: Stas Levitan, "Always On" business in cloud - 2016"
infraxstructure: Stas Levitan, "Always On" business in cloud - 2016"
PROIDEA
 
infraxstructure: Mariusz Rybusiński, Veeam "Keep Calm and Backup to the Cloud"
infraxstructure: Mariusz Rybusiński, Veeam  "Keep Calm and Backup to the Cloud"infraxstructure: Mariusz Rybusiński, Veeam  "Keep Calm and Backup to the Cloud"
infraxstructure: Mariusz Rybusiński, Veeam "Keep Calm and Backup to the Cloud"
PROIDEA
 
infraXstructure Alexis Dacquay, "How to win back visibility into your network...
infraXstructure Alexis Dacquay, "How to win back visibility into your network...infraXstructure Alexis Dacquay, "How to win back visibility into your network...
infraXstructure Alexis Dacquay, "How to win back visibility into your network...
PROIDEA
 
infraxstructure: Krzysztof Szczygieł "Infrastruktura i wyposażenie Data Cent...
infraxstructure: Krzysztof Szczygieł  "Infrastruktura i wyposażenie Data Cent...infraxstructure: Krzysztof Szczygieł  "Infrastruktura i wyposażenie Data Cent...
infraxstructure: Krzysztof Szczygieł "Infrastruktura i wyposażenie Data Cent...
PROIDEA
 
infraxstructure: Robert Mroczkowski "Maszyny się uczą - admińskie rozmówki p...
infraxstructure: Robert Mroczkowski  "Maszyny się uczą - admińskie rozmówki p...infraxstructure: Robert Mroczkowski  "Maszyny się uczą - admińskie rozmówki p...
infraxstructure: Robert Mroczkowski "Maszyny się uczą - admińskie rozmówki p...
PROIDEA
 
infraxstructure: Robert Zdunek, "Jak zbudować innowacyjne i efektywne energet...
infraxstructure: Robert Zdunek, "Jak zbudować innowacyjne i efektywne energet...infraxstructure: Robert Zdunek, "Jak zbudować innowacyjne i efektywne energet...
infraxstructure: Robert Zdunek, "Jak zbudować innowacyjne i efektywne energet...
PROIDEA
 
infraxstructure: Krzysztof Waszkiewicz "Usługi chmurowe dla biznesu wolne od...
infraxstructure: Krzysztof Waszkiewicz  "Usługi chmurowe dla biznesu wolne od...infraxstructure: Krzysztof Waszkiewicz  "Usługi chmurowe dla biznesu wolne od...
infraxstructure: Krzysztof Waszkiewicz "Usługi chmurowe dla biznesu wolne od...
PROIDEA
 
infraxstructure: Mateusz Chrobok "Opowieść o ucieczce przed błędami typu 0da...
infraxstructure: Mateusz Chrobok  "Opowieść o ucieczce przed błędami typu 0da...infraxstructure: Mateusz Chrobok  "Opowieść o ucieczce przed błędami typu 0da...
infraxstructure: Mateusz Chrobok "Opowieść o ucieczce przed błędami typu 0da...
PROIDEA
 
InfraXstructure: Mirosław Dąbrowski "Zmiany w organizacji a gotowość na meto...
InfraXstructure: Mirosław Dąbrowski  "Zmiany w organizacji a gotowość na meto...InfraXstructure: Mirosław Dąbrowski  "Zmiany w organizacji a gotowość na meto...
InfraXstructure: Mirosław Dąbrowski "Zmiany w organizacji a gotowość na meto...
PROIDEA
 
infraxstructure: Mirosław Burnejko "Cloud Migration Checklist – Czyli jakie ...
infraxstructure: Mirosław Burnejko  "Cloud Migration Checklist – Czyli jakie ...infraxstructure: Mirosław Burnejko  "Cloud Migration Checklist – Czyli jakie ...
infraxstructure: Mirosław Burnejko "Cloud Migration Checklist – Czyli jakie ...
PROIDEA
 
infraxstructure: Piotr Jabłoński "SDN w praktyce. Znacząca poprawa bezpieczeń...
infraxstructure: Piotr Jabłoński "SDN w praktyce. Znacząca poprawa bezpieczeń...infraxstructure: Piotr Jabłoński "SDN w praktyce. Znacząca poprawa bezpieczeń...
infraxstructure: Piotr Jabłoński "SDN w praktyce. Znacząca poprawa bezpieczeń...
PROIDEA
 
infraXstructure: Adam Sznajder, Optymalizacja kosztów w Amazon Web Services -...
infraXstructure: Adam Sznajder, Optymalizacja kosztów w Amazon Web Services -...infraXstructure: Adam Sznajder, Optymalizacja kosztów w Amazon Web Services -...
infraXstructure: Adam Sznajder, Optymalizacja kosztów w Amazon Web Services -...
PROIDEA
 
infraxstructure: Marcin Kaczmarek "SDS - Storage jako aplikacja."
infraxstructure: Marcin Kaczmarek  "SDS - Storage jako aplikacja."infraxstructure: Marcin Kaczmarek  "SDS - Storage jako aplikacja."
infraxstructure: Marcin Kaczmarek "SDS - Storage jako aplikacja."
PROIDEA
 
infraxstructure: Jarosław Zieliński i Sławomir Stanek "Wojna o Wirtualizację...
infraxstructure: Jarosław Zieliński i Sławomir Stanek  "Wojna o Wirtualizację...infraxstructure: Jarosław Zieliński i Sławomir Stanek  "Wojna o Wirtualizację...
infraxstructure: Jarosław Zieliński i Sławomir Stanek "Wojna o Wirtualizację...
PROIDEA
 
infraxstructure: Rafał Stańczak "Postępujący rozwój infrastruktury na potrze...
infraxstructure: Rafał Stańczak  "Postępujący rozwój infrastruktury na potrze...infraxstructure: Rafał Stańczak  "Postępujący rozwój infrastruktury na potrze...
infraxstructure: Rafał Stańczak "Postępujący rozwój infrastruktury na potrze...
PROIDEA
 
infraxstructure: Piotr Wojciechowski "Secure Data Center"
infraxstructure: Piotr Wojciechowski  "Secure Data Center"infraxstructure: Piotr Wojciechowski  "Secure Data Center"
infraxstructure: Piotr Wojciechowski "Secure Data Center"
PROIDEA
 

Viewers also liked (16)

infraxstructure: Stas Levitan, "Always On" business in cloud - 2016"
infraxstructure: Stas Levitan, "Always On" business in cloud - 2016"infraxstructure: Stas Levitan, "Always On" business in cloud - 2016"
infraxstructure: Stas Levitan, "Always On" business in cloud - 2016"
 
infraxstructure: Mariusz Rybusiński, Veeam "Keep Calm and Backup to the Cloud"
infraxstructure: Mariusz Rybusiński, Veeam  "Keep Calm and Backup to the Cloud"infraxstructure: Mariusz Rybusiński, Veeam  "Keep Calm and Backup to the Cloud"
infraxstructure: Mariusz Rybusiński, Veeam "Keep Calm and Backup to the Cloud"
 
infraXstructure Alexis Dacquay, "How to win back visibility into your network...
infraXstructure Alexis Dacquay, "How to win back visibility into your network...infraXstructure Alexis Dacquay, "How to win back visibility into your network...
infraXstructure Alexis Dacquay, "How to win back visibility into your network...
 
infraxstructure: Krzysztof Szczygieł "Infrastruktura i wyposażenie Data Cent...
infraxstructure: Krzysztof Szczygieł  "Infrastruktura i wyposażenie Data Cent...infraxstructure: Krzysztof Szczygieł  "Infrastruktura i wyposażenie Data Cent...
infraxstructure: Krzysztof Szczygieł "Infrastruktura i wyposażenie Data Cent...
 
infraxstructure: Robert Mroczkowski "Maszyny się uczą - admińskie rozmówki p...
infraxstructure: Robert Mroczkowski  "Maszyny się uczą - admińskie rozmówki p...infraxstructure: Robert Mroczkowski  "Maszyny się uczą - admińskie rozmówki p...
infraxstructure: Robert Mroczkowski "Maszyny się uczą - admińskie rozmówki p...
 
infraxstructure: Robert Zdunek, "Jak zbudować innowacyjne i efektywne energet...
infraxstructure: Robert Zdunek, "Jak zbudować innowacyjne i efektywne energet...infraxstructure: Robert Zdunek, "Jak zbudować innowacyjne i efektywne energet...
infraxstructure: Robert Zdunek, "Jak zbudować innowacyjne i efektywne energet...
 
infraxstructure: Krzysztof Waszkiewicz "Usługi chmurowe dla biznesu wolne od...
infraxstructure: Krzysztof Waszkiewicz  "Usługi chmurowe dla biznesu wolne od...infraxstructure: Krzysztof Waszkiewicz  "Usługi chmurowe dla biznesu wolne od...
infraxstructure: Krzysztof Waszkiewicz "Usługi chmurowe dla biznesu wolne od...
 
infraxstructure: Mateusz Chrobok "Opowieść o ucieczce przed błędami typu 0da...
infraxstructure: Mateusz Chrobok  "Opowieść o ucieczce przed błędami typu 0da...infraxstructure: Mateusz Chrobok  "Opowieść o ucieczce przed błędami typu 0da...
infraxstructure: Mateusz Chrobok "Opowieść o ucieczce przed błędami typu 0da...
 
InfraXstructure: Mirosław Dąbrowski "Zmiany w organizacji a gotowość na meto...
InfraXstructure: Mirosław Dąbrowski  "Zmiany w organizacji a gotowość na meto...InfraXstructure: Mirosław Dąbrowski  "Zmiany w organizacji a gotowość na meto...
InfraXstructure: Mirosław Dąbrowski "Zmiany w organizacji a gotowość na meto...
 
infraxstructure: Mirosław Burnejko "Cloud Migration Checklist – Czyli jakie ...
infraxstructure: Mirosław Burnejko  "Cloud Migration Checklist – Czyli jakie ...infraxstructure: Mirosław Burnejko  "Cloud Migration Checklist – Czyli jakie ...
infraxstructure: Mirosław Burnejko "Cloud Migration Checklist – Czyli jakie ...
 
infraxstructure: Piotr Jabłoński "SDN w praktyce. Znacząca poprawa bezpieczeń...
infraxstructure: Piotr Jabłoński "SDN w praktyce. Znacząca poprawa bezpieczeń...infraxstructure: Piotr Jabłoński "SDN w praktyce. Znacząca poprawa bezpieczeń...
infraxstructure: Piotr Jabłoński "SDN w praktyce. Znacząca poprawa bezpieczeń...
 
infraXstructure: Adam Sznajder, Optymalizacja kosztów w Amazon Web Services -...
infraXstructure: Adam Sznajder, Optymalizacja kosztów w Amazon Web Services -...infraXstructure: Adam Sznajder, Optymalizacja kosztów w Amazon Web Services -...
infraXstructure: Adam Sznajder, Optymalizacja kosztów w Amazon Web Services -...
 
infraxstructure: Marcin Kaczmarek "SDS - Storage jako aplikacja."
infraxstructure: Marcin Kaczmarek  "SDS - Storage jako aplikacja."infraxstructure: Marcin Kaczmarek  "SDS - Storage jako aplikacja."
infraxstructure: Marcin Kaczmarek "SDS - Storage jako aplikacja."
 
infraxstructure: Jarosław Zieliński i Sławomir Stanek "Wojna o Wirtualizację...
infraxstructure: Jarosław Zieliński i Sławomir Stanek  "Wojna o Wirtualizację...infraxstructure: Jarosław Zieliński i Sławomir Stanek  "Wojna o Wirtualizację...
infraxstructure: Jarosław Zieliński i Sławomir Stanek "Wojna o Wirtualizację...
 
infraxstructure: Rafał Stańczak "Postępujący rozwój infrastruktury na potrze...
infraxstructure: Rafał Stańczak  "Postępujący rozwój infrastruktury na potrze...infraxstructure: Rafał Stańczak  "Postępujący rozwój infrastruktury na potrze...
infraxstructure: Rafał Stańczak "Postępujący rozwój infrastruktury na potrze...
 
infraxstructure: Piotr Wojciechowski "Secure Data Center"
infraxstructure: Piotr Wojciechowski  "Secure Data Center"infraxstructure: Piotr Wojciechowski  "Secure Data Center"
infraxstructure: Piotr Wojciechowski "Secure Data Center"
 

Similar to infraxstructure: Emil Gągała "Ludzie, procesy, technika – czy wirtualizacja sieci to rewolucja w firmie?"

Sdn primer pdf
Sdn primer pdfSdn primer pdf
Sdn primer pdf
Pooja Patel
 
Maturing IoT solutions with Microsoft Azure (Sam Vanhoutte & Glenn Colpaert a...
Maturing IoT solutions with Microsoft Azure (Sam Vanhoutte & Glenn Colpaert a...Maturing IoT solutions with Microsoft Azure (Sam Vanhoutte & Glenn Colpaert a...
Maturing IoT solutions with Microsoft Azure (Sam Vanhoutte & Glenn Colpaert a...
Codit
 
IRJET - Cloud based Datacenter in Virtual Private Network
IRJET - Cloud based Datacenter in Virtual Private NetworkIRJET - Cloud based Datacenter in Virtual Private Network
IRJET - Cloud based Datacenter in Virtual Private Network
IRJET Journal
 
Mris network architecture proposal r1
Mris network architecture proposal r1Mris network architecture proposal r1
Mris network architecture proposal r1
Craig Burma
 
Lisa Guess - Embracing the Cloud
Lisa Guess - Embracing the CloudLisa Guess - Embracing the Cloud
Lisa Guess - Embracing the Cloud
centralohioissa
 
Cisco DNA
Cisco DNACisco DNA
OSSF 2018 - Peter Crocker of Cumulus Networks - TCO and technical advantages ...
OSSF 2018 - Peter Crocker of Cumulus Networks - TCO and technical advantages ...OSSF 2018 - Peter Crocker of Cumulus Networks - TCO and technical advantages ...
OSSF 2018 - Peter Crocker of Cumulus Networks - TCO and technical advantages ...
FINOS
 
Why integration is key in IoT solutions? (Sam Vanhoutte @Integrate2017)
Why integration is key in IoT solutions? (Sam Vanhoutte @Integrate2017)Why integration is key in IoT solutions? (Sam Vanhoutte @Integrate2017)
Why integration is key in IoT solutions? (Sam Vanhoutte @Integrate2017)
Codit
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. Reality
Internap
 
En35793797
En35793797En35793797
En35793797
IJERA Editor
 
[OpenStack Days Korea 2016] An SDN Pioneer's Vision of Networking
[OpenStack Days Korea 2016] An SDN Pioneer's Vision of Networking[OpenStack Days Korea 2016] An SDN Pioneer's Vision of Networking
[OpenStack Days Korea 2016] An SDN Pioneer's Vision of Networking
OpenStack Korea Community
 
COM526_Lecture 1.pdf
COM526_Lecture 1.pdfCOM526_Lecture 1.pdf
COM526_Lecture 1.pdf
SherefHesham
 
Cloud Security @ TIM - Current Practises and Future Challanges
Cloud Security @ TIM - Current Practises and Future ChallangesCloud Security @ TIM - Current Practises and Future Challanges
Cloud Security @ TIM - Current Practises and Future Challanges
Michele Vecchione
 
Network Softwarization
Network SoftwarizationNetwork Softwarization
Network Softwarization
Ahmad Tajuddin Samsudin
 
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
NetworkCollaborators
 
VMworld 2014: Virtualization 101
VMworld 2014: Virtualization 101VMworld 2014: Virtualization 101
VMworld 2014: Virtualization 101
VMworld
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
CloudExpoEurope
 
Week2
Week2Week2
Week2
trayyoo
 
How Cloud Computing will change how you and your team will run IT
How Cloud Computing will change how you and your team will run ITHow Cloud Computing will change how you and your team will run IT
How Cloud Computing will change how you and your team will run IT
Peter HJ van Eijk
 
OVNC 2015-Software-Defined Networking: Where Are We Today?
OVNC 2015-Software-Defined Networking: Where Are We Today?OVNC 2015-Software-Defined Networking: Where Are We Today?
OVNC 2015-Software-Defined Networking: Where Are We Today?
NAIM Networks, Inc.
 

Similar to infraxstructure: Emil Gągała "Ludzie, procesy, technika – czy wirtualizacja sieci to rewolucja w firmie?" (20)

Sdn primer pdf
Sdn primer pdfSdn primer pdf
Sdn primer pdf
 
Maturing IoT solutions with Microsoft Azure (Sam Vanhoutte & Glenn Colpaert a...
Maturing IoT solutions with Microsoft Azure (Sam Vanhoutte & Glenn Colpaert a...Maturing IoT solutions with Microsoft Azure (Sam Vanhoutte & Glenn Colpaert a...
Maturing IoT solutions with Microsoft Azure (Sam Vanhoutte & Glenn Colpaert a...
 
IRJET - Cloud based Datacenter in Virtual Private Network
IRJET - Cloud based Datacenter in Virtual Private NetworkIRJET - Cloud based Datacenter in Virtual Private Network
IRJET - Cloud based Datacenter in Virtual Private Network
 
Mris network architecture proposal r1
Mris network architecture proposal r1Mris network architecture proposal r1
Mris network architecture proposal r1
 
Lisa Guess - Embracing the Cloud
Lisa Guess - Embracing the CloudLisa Guess - Embracing the Cloud
Lisa Guess - Embracing the Cloud
 
Cisco DNA
Cisco DNACisco DNA
Cisco DNA
 
OSSF 2018 - Peter Crocker of Cumulus Networks - TCO and technical advantages ...
OSSF 2018 - Peter Crocker of Cumulus Networks - TCO and technical advantages ...OSSF 2018 - Peter Crocker of Cumulus Networks - TCO and technical advantages ...
OSSF 2018 - Peter Crocker of Cumulus Networks - TCO and technical advantages ...
 
Why integration is key in IoT solutions? (Sam Vanhoutte @Integrate2017)
Why integration is key in IoT solutions? (Sam Vanhoutte @Integrate2017)Why integration is key in IoT solutions? (Sam Vanhoutte @Integrate2017)
Why integration is key in IoT solutions? (Sam Vanhoutte @Integrate2017)
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. Reality
 
En35793797
En35793797En35793797
En35793797
 
[OpenStack Days Korea 2016] An SDN Pioneer's Vision of Networking
[OpenStack Days Korea 2016] An SDN Pioneer's Vision of Networking[OpenStack Days Korea 2016] An SDN Pioneer's Vision of Networking
[OpenStack Days Korea 2016] An SDN Pioneer's Vision of Networking
 
COM526_Lecture 1.pdf
COM526_Lecture 1.pdfCOM526_Lecture 1.pdf
COM526_Lecture 1.pdf
 
Cloud Security @ TIM - Current Practises and Future Challanges
Cloud Security @ TIM - Current Practises and Future ChallangesCloud Security @ TIM - Current Practises and Future Challanges
Cloud Security @ TIM - Current Practises and Future Challanges
 
Network Softwarization
Network SoftwarizationNetwork Softwarization
Network Softwarization
 
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
 
VMworld 2014: Virtualization 101
VMworld 2014: Virtualization 101VMworld 2014: Virtualization 101
VMworld 2014: Virtualization 101
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
 
Week2
Week2Week2
Week2
 
How Cloud Computing will change how you and your team will run IT
How Cloud Computing will change how you and your team will run ITHow Cloud Computing will change how you and your team will run IT
How Cloud Computing will change how you and your team will run IT
 
OVNC 2015-Software-Defined Networking: Where Are We Today?
OVNC 2015-Software-Defined Networking: Where Are We Today?OVNC 2015-Software-Defined Networking: Where Are We Today?
OVNC 2015-Software-Defined Networking: Where Are We Today?
 

Recently uploaded

FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 

infraxstructure: Emil Gągała "Ludzie, procesy, technika – czy wirtualizacja sieci to rewolucja w firmie?"

  • 1. © 2015 VMware Inc. All rights reserved. People, processes, technology Network Virtualization Best Practise Emil Gągała Network & Security Architect InfraXstructure, 20.04.2016, Warszawa
  • 2. Network Virtualization change areas 2 TechnologyPeople Process Best practices and guidance based on production customers
  • 3. The maturity model: the path to the vision 3 Blended Cross-domain and discipline Siloed Specialization Organization (Structure) People (Roles & Responsibilities) People Automated Modern Manual Legacy Processes Tooling Process Minimum Maximum Minimum MaximumLeaf-spine fabric Virtual 3-tier Physical Architecture Infrastructure Architecture
  • 5. Myth busters! 5 People You will not be automated out of a job. MYTH #1 Software-defined data center is going to automate me out of a job MYTH #2 Network functions will be absorbed into the virtualization team MYTH #3 A virtual overlay is going to make my job more difficult MYTH BUSTER #1 Your job will not go to the virtualization team. MYTH BUSTER #2 Overlays do not make your job more difficult. MYTH BUSTER #3
  • 6. Private cloud | SDDC Traditional network | HDDC Hybrid cloud | SDDC Org structures (simplified view) 6 Successfully operationalized in a variety of org structures Compute Storage Networking People Minimum Maximum OperationsEngineeringArchitecture Minimum Maximum • Blended • Autonomous • Intra-team training Compute Storage Networking
  • 7. Best practices CONFIDENTIAL 7 Start with a small, cross-functional team Select change agents Define measures of success Communicate lessons and wins People 1 Network SecurityCompute Storage Incubation team Tiger team
  • 8. High impact 8 Unified team working together, sharing lessons learned, and continuously improving People Silos Specialization Blended Cross-domain and discipline A closely-knit team working in unison increases company speed and agility Team gains new expertise and experience, making them more strategic and valuable to the company Leadership opportunity during this networking and security transformation Avoid surprises! New Cloud networking and security roles Org structure People
  • 9. 9 Network virtualization is based on networking concepts that require networking expertise Need network engineers to deploy and operate it Career growth and opportunity Network engineers must learn network virtualization to stay current Learning network virtualization is required for future career growth People
  • 11. Myth busters! 11 Process & Tooling Virtual networks bring agility and simplicity to processes. MYTH #1 Virtual networks adds complexity to existing processes MYTH #2 You need separate tools to manage virtual and physical networks MYTH #3 Network virtualization reduces visibility MYTH BUSTER #1 Existing management tools can monitor both networks. MYTH BUSTER #2 Provides more context and visibility. MYTH BUSTER #3
  • 12. Best practices CONFIDENTIAL 12 Inventory and analyze existing processes Process 2 Inventory Benchmark Measure
  • 13. CONFIDENTIAL 13 Start COTS? Create Network Data flow diagram Asset Discovery vCenter (Tags, notes) Define List of IP s & VM s End VMware Infrastructure Navigator Existing Firewalls NetFflow Collectors Existing Documentation Existing Asset and Discovery Monitoring Dashboards Potential Data Sources Define Grouping Objects Documentation Security Groups Vendor Documentation Services / Service Groups IPSETs List of IP AddressesList of VM s Define Security Posture Security Policies Manual Firewall Rules Deploy Performance / Capacity management reports
  • 14. Best practices CONFIDENTIAL 14 Automate provisioning and management Process 3 Start with IT automation Quick win: security automation Self-service: portals and catalogs Security Policies & Groups Development workload Test workload Production workload Application type: customer PCI Groups Finance Sales Engineering Standards Config #1 Config #2 Config #3 Config #4 Config #5 Config #6
  • 16. Application Dashboard Best practices CONFIDENTIAL 16 Create application-level visibility Process 4 Start with existing tools Use same instrumentation and protocols Using blend of tools is OKHealth Utilization Capacity COMPUTE NETWORK STORAGE Real-time summary Monitoring and troubleshooting Debugging
  • 17. High impact 17 Automated processes and enhanced network management Automated Modern Manual Legacy Process & Tooling Policy-based provisioning of networks and services brings agility and eliminates common config. errors Manual operations can be automated (e.g., self service portals, scaling network services, rule management) Single view providing highest level of visibility into virtual and physical SDDC infrastructureProcesses Tooling
  • 19. A tightly integrated system from a single vendor is not always best. Technology MYTH #1 A tightly integrated system from a single vendor is the best approach. MYTH #2 Network virtualization requires a re-architecture of the physical network. MYTH #3 Overlay networks are inherently difficult to manage. Myth busters! MYTH BUSTER #1 Network Virtualization works on your existing physical network. MYTH BUSTER #2 Overlay networks have been proven to be flexible and easy to manage. MYTH BUSTER #3
  • 20. Define your initial use cases 20 Micro segmentation DMZ anywhere Secure end user Security IT automating IT Multi-tenant infrastructure Developer cloud IT automation Disaster recovery Metro pooling Hybrid cloud networking Application continuity IT optimization Server asset utilization Price | performance Hardware lifecycle $
  • 21. Best practices CONFIDENTIAL 21 Implement network virtualization incrementally5 Focus on service quality Collaborate with stakeholders Develop SLAs over time Design the physical network for simplicity Technology Use case #1 Micro-segmentation Communicate • Project wins • Learnings • KPI metrics
  • 22. Best practices CONFIDENTIAL 22 Design the network for simplicity and resiliency6 Technology Add networking and security to DR Workload mobility and portability Throughput, scalability, and robustness
  • 23. Traditional VLAN network VM1 VM2 Server 1 VM3 VM4 VM5 Server 2 VM6 VM7 VM8 Server 3 VM9 Physical switch Virtual networks: 1 2 3 VLANs Technology
  • 24. Software Defined Data Center VM1 VM2 Server 1 VM3 VM4 VM5 Server 2 VM6 VM7 VM8 Server 3 VM9 Controller Technology
  • 25. High impact Decouple and abstract networking services for increased control Leaf-spine ECMP fabric Virtual Access/aggregation /core Physical Resilient and scalable leaf-spine architecture increases reliability and performance Centralized point of control for management and monitoring of virtual networks and security Distributed implementation of services means fine-grained policies can be operationalized Technology Architecture Infrastructure
  • 26. Next steps 26 Minimum Maximum Minimum Maximum Blended Cross-domain and discipline Silos Specialization People Automated Modern Manual Legacy Process Leaf-spine ECMP fabric Virtual Access/Aggregation /Core Physical Architecture TransformationPilotLearning Organization (structure) People (roles and responsibilities) Processes Tooling Architecture Infrastructure
  • 27. Things to remember 27 Operations transformation results in big outcomes and rewards Leadership: set vision, communicate, and involve people Grow: gain expertise and achieve professional and career growth Incremental: start with one use case and set of applications Many have done it. It’s not complicated. Minimal changes.