SlideShare a Scribd company logo
Embracing the Cloud
How is the Cloud built and how do you Secure It?
Lisa Guess
VP Juniper Networks - Systems Engineering
Your business challenges
How should I embrace the cloud?
How do I secure the cloud?
How do I innovate without disrupting business?
What is my Return on Investment (ROI)?
IT Quickly Moving Toward Cloud
Source: IDG Enterprise Cloud Computing Study 2014
Percentage of respondents
utilizing different types of
Cloud computing
environments……..
Public Cloud
Private Cloud
Hybrid Cloud
19%
15%
5%
61%
25%
21%
7%
47%
Private Cloud Public Cloud Hybrid Cloud Non-Cloud
% OF TOTAL IT ENVIRONMENT
IN THE CLOUD
Current In 18 months
Applications Driving Design Change
Network Virtualization
ATTRIBUTES
• Virtualized with Bare metal
• Introduction of Network Overlays
REQUIREMENTS
• Physical to Virtual (P2V) integration
• Overlay visualization & management
Everything “As-a-Service”
ATTRIBUTES
• Scale-out
• On-demand
REQUIREMENTS
• Multi-tenancy
• Simple to operate, easy to scale
Modern App Flows
ATTRIBUTES
• Increased Machine to Machine
• East-West traffic
REQUIREMENTS
• Flatter Topology
• High performance and consistent
Today You Are Here
User IT Admin
You Need to Be Here
User
CLICK HERE
Orchestration? Security? Protocols?SDN? Support?Intelligence?
Path to Success: Identify
Today You Are Here
• Resources are in silos
• Network services are on physical appliances
• Tasks are not automated
• Orchestration is decentralized
• Security is an afterthought
VLANS VLANS
FINANCE HR MARKETING
Firewalls
Load-Balancer
Physical
Servers
Local Hard
Drives
You Need to Be Here
VIRTUALIZED
HR MARKETINGFINANCE
• Resources are pooled
• Network services are virtualized and distributed
• Moves/adds/changes are fully automated
• Orchestration is completely centralized
• Security is integrated
Path to Success: Set Goals
Path to Success: Foundational Impediments
Security is difficult
Physical is the default
Bottlenecks
Automation is key
Difficult to automate
Box-by-box touch points
Difficult to mine data
Processes are manual
Suboptimal topologies
Inconsistent performance
Disaggregated elements
Network is complex
Application silos
Client/User
Employees CustomersFinance
Application
Mail EDIERP
95%
Portal:
Data Sources:
Applications:
Employees Customers Partners Suppliers DevicesDatabase Transactions Sensors Inventory Devices
Analysis Reporting CRM Database Administration
InventoryHRPurchasing
Analysis Reporting CRM Mail Order Processing
InventoryHRPurchasing
Network Devices Rich media New applications Digitized information Machine to MachineEmployees Customers Machines Suppliers Partners
“Any to Any” Services
Sharing, Flexibility, Velocity
Employees CustomersFinance
EDIMailERP Mail EDIERP
>75%
Portal:
Data Sources:
Applications:
Employees Customers Partners Suppliers DevicesDatabase Transactions Sensors Inventory Devices
Analysis Reporting CRM Database Administration
InventoryHRPurchasing
Analysis Reporting CRM Mail Order Processing
InventoryHRPurchasing
Network Devices Rich media New applications Digitized information Machine to MachineEmployees Customers Machines Suppliers Partners
Moving to the Cloud
Legacy DC
Suppliers DevicesInventory Devices
Database Administration
Inventory
Mail Order Processing
Inventory
Digitized information Machine to MachineSuppliers Partners
Moving to the Cloud
Legacy DC Virtualized DC Cloud DC
Design for five 9s
• Apps not resilient
• High end x86 servers
• Virtual machines
• Shared storage - FC
• L2 adjacency
Design for 3 9s
• Apps resilient
• Commodity servers
• Virtualization
• NAS storage
• L3 connectivity
Devices
Database
Inventory
Digitized information
Moving to the Cloud
Legacy DC Virtualized DC Cloud DC
Devices
Mail Order Processing
Inventory
Suppliers Partners
Devices
Mail
Inventory
Suppliers
Order Processing
Partners
Inventory
Devices
Inventory
Digitized information
Moving to the Cloud
Legacy DC Virtualized DC Cloud DC
Devices
Inventory
Suppliers
Order Processing
Partners
Inventory
Mail
Network
Big Data - Hadoop
Agility – Time to Provision
2 Months
Physical
Server
Time
Virtual
Server
2 WeeksNetwork
2 WeeksStorage
2 Minutes
Orchestration,
Automation,
Automation
“Crushing Grapes”
Orchestration
“Making Wine”
Automation ≠ Orchestration
Speeding up “IT” Workflows at scale while eliminating errors
Automation helps eliminate
repeatable manual tasks
through scripts or other
software tools
Orchestration is an extension
of automation that groups
automated tasks into
coordinated workflows.
Path to the Cloud
Self Provisioned
Clouds
Cloud DC
3
Optimization
Greater Agility &
Availability
Virtualized DC
2
Consolidation
Lower Cost
Legacy DC
1
Server Virtualization
Network, Automation
Orchestration
Public
Private
MetaFabric
VM
VM
VM
Virtual Physical
VM
VM
VM
Virtual Physical
VM
VM
VM
Virtual Physical
VM
VM
VM
Virtual Physical
My on-premises
data center
My hosted
service provider
My cloud
service provider
My managed
service provider
VM
VM
VM
Virtual
VM
VM
VM
Virtual
Architecture for building a coherent network within & between data centers
MetaFabric – Three Steps
Automate Operations
Orchestration
Network automation and analytics
Network virtualization
MH
Secure the NetworkNetwork
security
Simplify the Network
Network infrastructure
Data CenterDCIData Center
Simplify the network
Old Model:
Deploy individual
network elements
New Model:
Deploy a coherent
network
• Data plane driven • Shared distributed control plane
• Common management plane
Simplify the network
Coherent architecture
Building blocks
Topology
Tree Spine and Leaf
Advantages:
• Better, more consistent app performance
• More agile - eliminates locality issues
• Simpler to manage
• Lower cost
Simplify the network
Coherent architecture
Building blocks
Topology
Access
Spine
Edge
Simplify the network
Coherent architecture
Building blocks
Topology
Access
Spine
Edge
Coherent Network:
Shared, distributed control plane
Common management plane
MC-LAGEthernet FabricIP Fabric w/ Open ClosCoherence beyond the edge
Coherent architectures
Legacy and Virtualized data centers
Private cloud data centers
Public cloud data centers
Virtual Network Fabric Overlay
IP Fabric
All L3
Multi-Tier w/ MC-LAG
L2/L3
Ethernet Fabric
L2/L3
MetaFabric – Three Steps
Secure the NetworkNetwork
security
Simplify the Network
Network infrastructure
Data CenterDCIData Center
Automate Operations
Orchestration
Network automation and analytics
Network virtualization
MH
Secure – a new model for the cloud
Castle Model
Hotel Model
• Micro-perimeterization
• Multiple enforcement points
• Supported by the cloud
Security Enforcement
Router (MX)
[stateless ACL L2-3]
5
Physical Firewall Appliance (SRX)
[Stateful L2-L7 firewall]
1
DC Spine Switch (QFX1000)
[Stateful ACL and/or L4-7 firewall]
3
DC Leaf Switch (QFX5100)
[Stateful ACL and/or L4-7 firewall]
4
VT-x
Hypervisor
VAVASDN
Virtualized Host with virtual
firewall
(dFW, Contrail vRouter, vSRX)
[Stateful ACL and/or L4-7 firewall]
2
SD
SPACE
ND VD
APIs & libraries exposed to operators,
orchestration, & automation platforms
To Device-specific APIs
Contrail
Central
Policy
Engine
Threat
Intelligence
Threat
Intelligence
MetaFabric – Three Steps
Automate Operations
Orchestration
Network automation and analytics
Network virtualization
MH
Secure the NetworkNetwork
security
Simplify the Network
Network infrastructure
Data CenterDCIData Center
Automate operations
Old Model:
Manage network
devices
New Model:
Automate the
workflow of
delivering the
application
Automate Work Flows
Build & Provision
Operate & Monitor
Orchestrate
Benefits:
Repeatability
More reliable
More agile
Lower operating cost
The Automation Stack
Junos
Data Plane (PFE)Chassis
XML-RPC
PythonEZ Framework RubyEZ Library
Ansible
Python
Scripts
ChefPuppet
Ruby
Scripts
Netconf Junoscript
SNMP
RO
CLI
Junos Platform Automation Stack
Chef
Junos
Data Plane (PFE)Chassis
XML-RPC
Netconf
PythonEZ Framework RubyEZ Library
PuppetAnsible
Python
Scripts
Ruby
Scripts
Junoscript
SNMP
RO
CLI
Junos Platform Automation Stack
Two Approaches
Network Coherence
BottomsUp
Network Director
Security Director
Target top 20% of tasks – 80% of the effort
Two Approaches
Network Coherence
Build your own
TopsDown
Network Virtualization
Network Director
Security Director
Network Virtualization
Network Virtualization
Can we do for the network
what we did for the server?
Network Virtualization
VLANs
A1 B1 A2 B2
Network Virtualization
Promise of Overlays
A1 B1 A2 B2
Network Virtualization
Service Chaining
A1 B1A2 B2
Virtual Network A Virtual Network B
FW IDP LB NAT
MetaFabric – Three Steps
Automate Operations
Orchestration
Network automation and analytics
Network virtualization
MH
Secure the NetworkNetwork
security
Simplify the Network
Network infrastructure
Data CenterDCIData Center
Thank you

More Related Content

What's hot

Building an AppSec Team Extended Cut
Building an AppSec Team Extended CutBuilding an AppSec Team Extended Cut
Building an AppSec Team Extended CutMike Spaulding
 
Robert Hurlbut - Threat Modeling for Secure Software Design
Robert Hurlbut - Threat Modeling for Secure Software DesignRobert Hurlbut - Threat Modeling for Secure Software Design
Robert Hurlbut - Threat Modeling for Secure Software Design
centralohioissa
 
Tripwire Energy Working Group: TIV Demo
Tripwire Energy Working Group: TIV Demo Tripwire Energy Working Group: TIV Demo
Tripwire Energy Working Group: TIV Demo
Tripwire
 
Accelerating OT - A Case Study
Accelerating OT - A Case StudyAccelerating OT - A Case Study
Accelerating OT - A Case Study
Digital Bond
 
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
Shah Sheikh
 
Vulnerability Testing Services Case Study
Vulnerability Testing Services Case StudyVulnerability Testing Services Case Study
Vulnerability Testing Services Case Study
Nandita Nityanandam
 
SD-WAN - comSpark 2019
SD-WAN - comSpark 2019SD-WAN - comSpark 2019
SD-WAN - comSpark 2019
Advanced Technology Consulting (ATC)
 
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?michaelbasoah
 
IBM Q-radar security intelligence roadmap
IBM Q-radar security intelligence roadmapIBM Q-radar security intelligence roadmap
IBM Q-radar security intelligence roadmap
DATA SECURITY SOLUTIONS
 
Why Zero Trust Yields Maximum Security
Why Zero Trust Yields Maximum SecurityWhy Zero Trust Yields Maximum Security
Why Zero Trust Yields Maximum Security
Priyanka Aash
 
Stop Hackers with Integrated CASB & IDaaS Security
Stop Hackers with  Integrated CASB & IDaaS SecurityStop Hackers with  Integrated CASB & IDaaS Security
Stop Hackers with Integrated CASB & IDaaS Security
OneLogin
 
Art Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat PreventionArt Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat Prevention
centralohioissa
 
Security Analytics for Data Discovery - Closing the SIEM Gap
Security Analytics for Data Discovery - Closing the SIEM GapSecurity Analytics for Data Discovery - Closing the SIEM Gap
Security Analytics for Data Discovery - Closing the SIEM Gap
Eric Johansen, CISSP
 
Endpoint Security
Endpoint SecurityEndpoint Security
Endpoint Security
Ahmed Hashem El Fiky
 
Information Security
Information SecurityInformation Security
Information SecurityMohit8780
 
Vulnerability threat and attack
Vulnerability threat and attackVulnerability threat and attack
Vulnerability threat and attack
newbie2019
 
Symantec Data Loss Prevention - Technical Proposal (General)
Symantec Data Loss Prevention - Technical Proposal (General)Symantec Data Loss Prevention - Technical Proposal (General)
Symantec Data Loss Prevention - Technical Proposal (General)
Iftikhar Ali Iqbal
 
The Subversive Six: Hidden Risk Points in ICS
The Subversive Six: Hidden Risk Points in ICSThe Subversive Six: Hidden Risk Points in ICS
The Subversive Six: Hidden Risk Points in ICS
Tripwire
 
Stopping zero day threats
Stopping zero day threatsStopping zero day threats
Stopping zero day threats
Zscaler
 
LoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityLoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated Cybersecurity
Rohit Kapoor
 

What's hot (20)

Building an AppSec Team Extended Cut
Building an AppSec Team Extended CutBuilding an AppSec Team Extended Cut
Building an AppSec Team Extended Cut
 
Robert Hurlbut - Threat Modeling for Secure Software Design
Robert Hurlbut - Threat Modeling for Secure Software DesignRobert Hurlbut - Threat Modeling for Secure Software Design
Robert Hurlbut - Threat Modeling for Secure Software Design
 
Tripwire Energy Working Group: TIV Demo
Tripwire Energy Working Group: TIV Demo Tripwire Energy Working Group: TIV Demo
Tripwire Energy Working Group: TIV Demo
 
Accelerating OT - A Case Study
Accelerating OT - A Case StudyAccelerating OT - A Case Study
Accelerating OT - A Case Study
 
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
 
Vulnerability Testing Services Case Study
Vulnerability Testing Services Case StudyVulnerability Testing Services Case Study
Vulnerability Testing Services Case Study
 
SD-WAN - comSpark 2019
SD-WAN - comSpark 2019SD-WAN - comSpark 2019
SD-WAN - comSpark 2019
 
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?
 
IBM Q-radar security intelligence roadmap
IBM Q-radar security intelligence roadmapIBM Q-radar security intelligence roadmap
IBM Q-radar security intelligence roadmap
 
Why Zero Trust Yields Maximum Security
Why Zero Trust Yields Maximum SecurityWhy Zero Trust Yields Maximum Security
Why Zero Trust Yields Maximum Security
 
Stop Hackers with Integrated CASB & IDaaS Security
Stop Hackers with  Integrated CASB & IDaaS SecurityStop Hackers with  Integrated CASB & IDaaS Security
Stop Hackers with Integrated CASB & IDaaS Security
 
Art Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat PreventionArt Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat Prevention
 
Security Analytics for Data Discovery - Closing the SIEM Gap
Security Analytics for Data Discovery - Closing the SIEM GapSecurity Analytics for Data Discovery - Closing the SIEM Gap
Security Analytics for Data Discovery - Closing the SIEM Gap
 
Endpoint Security
Endpoint SecurityEndpoint Security
Endpoint Security
 
Information Security
Information SecurityInformation Security
Information Security
 
Vulnerability threat and attack
Vulnerability threat and attackVulnerability threat and attack
Vulnerability threat and attack
 
Symantec Data Loss Prevention - Technical Proposal (General)
Symantec Data Loss Prevention - Technical Proposal (General)Symantec Data Loss Prevention - Technical Proposal (General)
Symantec Data Loss Prevention - Technical Proposal (General)
 
The Subversive Six: Hidden Risk Points in ICS
The Subversive Six: Hidden Risk Points in ICSThe Subversive Six: Hidden Risk Points in ICS
The Subversive Six: Hidden Risk Points in ICS
 
Stopping zero day threats
Stopping zero day threatsStopping zero day threats
Stopping zero day threats
 
LoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityLoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated Cybersecurity
 

Similar to Lisa Guess - Embracing the Cloud

Virtualization and cloud computing
Virtualization and cloud computingVirtualization and cloud computing
Virtualization and cloud computing
Deep Gupta
 
Brocade Software Networking Presentation at Interface 2016
Brocade Software Networking Presentation at Interface 2016Brocade Software Networking Presentation at Interface 2016
Brocade Software Networking Presentation at Interface 2016
Scott Sims
 
Risc and velostrata 2 28 2018 lessons_in_cloud_migration
Risc and velostrata  2 28 2018 lessons_in_cloud_migrationRisc and velostrata  2 28 2018 lessons_in_cloud_migration
Risc and velostrata 2 28 2018 lessons_in_cloud_migration
RISC Networks
 
A Complete Guide Cloud Computing
A Complete Guide Cloud ComputingA Complete Guide Cloud Computing
A Complete Guide Cloud Computing
Sripati Mahapatra
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Srinivasa Rao
 
z Systems redefining Enterprise IT for digital business - Alain Poquillon
z Systems redefining Enterprise IT for digital business - Alain Poquillonz Systems redefining Enterprise IT for digital business - Alain Poquillon
z Systems redefining Enterprise IT for digital business - Alain Poquillon
NRB
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud Computing
Unmesh Ballal
 
Financial impact of Cloud Computing
Financial impact of Cloud ComputingFinancial impact of Cloud Computing
Financial impact of Cloud Computing
krisbliesner
 
Unit 1.2 move to cloud computing
Unit 1.2   move to cloud computingUnit 1.2   move to cloud computing
Unit 1.2 move to cloud computing
eShikshak
 
ECI - The Elastic Network - winds of change
ECI - The Elastic Network - winds of changeECI - The Elastic Network - winds of change
ECI - The Elastic Network - winds of change
ECI – THE ELASTIC NETWORK™
 
Plenary_three_Cloud_computing_-_is_social_housing_ready_for_it_-_Phil_Copperw...
Plenary_three_Cloud_computing_-_is_social_housing_ready_for_it_-_Phil_Copperw...Plenary_three_Cloud_computing_-_is_social_housing_ready_for_it_-_Phil_Copperw...
Plenary_three_Cloud_computing_-_is_social_housing_ready_for_it_-_Phil_Copperw...Phil Copperwheat
 
Orange Business Live 2013 cloud breakout
Orange Business Live 2013 cloud breakoutOrange Business Live 2013 cloud breakout
Orange Business Live 2013 cloud breakout
Orange Business Services
 
Digital Transformation in 2018: DX 4 3-2-1
Digital Transformation in 2018: DX 4 3-2-1Digital Transformation in 2018: DX 4 3-2-1
Digital Transformation in 2018: DX 4 3-2-1
James Kelly
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud Computing
Bharat Kalia
 
Enabling the Software Defined Data Center for Hybrid IT
Enabling the Software Defined Data Center for Hybrid ITEnabling the Software Defined Data Center for Hybrid IT
Enabling the Software Defined Data Center for Hybrid IT
NetApp
 
What is Your Edge From the Cloud to the Edge, Extending Your Reach
What is Your Edge From the Cloud to the Edge, Extending Your ReachWhat is Your Edge From the Cloud to the Edge, Extending Your Reach
What is Your Edge From the Cloud to the Edge, Extending Your Reach
SUSE
 
New Delhi Cloud Summit 05 26-11
New Delhi Cloud Summit 05 26-11New Delhi Cloud Summit 05 26-11
New Delhi Cloud Summit 05 26-11
Dileep Bhandarkar
 
Basic cloud
Basic cloudBasic cloud

Similar to Lisa Guess - Embracing the Cloud (20)

Virtualization and cloud computing
Virtualization and cloud computingVirtualization and cloud computing
Virtualization and cloud computing
 
Brocade Software Networking Presentation at Interface 2016
Brocade Software Networking Presentation at Interface 2016Brocade Software Networking Presentation at Interface 2016
Brocade Software Networking Presentation at Interface 2016
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Risc and velostrata 2 28 2018 lessons_in_cloud_migration
Risc and velostrata  2 28 2018 lessons_in_cloud_migrationRisc and velostrata  2 28 2018 lessons_in_cloud_migration
Risc and velostrata 2 28 2018 lessons_in_cloud_migration
 
A Complete Guide Cloud Computing
A Complete Guide Cloud ComputingA Complete Guide Cloud Computing
A Complete Guide Cloud Computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
z Systems redefining Enterprise IT for digital business - Alain Poquillon
z Systems redefining Enterprise IT for digital business - Alain Poquillonz Systems redefining Enterprise IT for digital business - Alain Poquillon
z Systems redefining Enterprise IT for digital business - Alain Poquillon
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud Computing
 
Financial impact of Cloud Computing
Financial impact of Cloud ComputingFinancial impact of Cloud Computing
Financial impact of Cloud Computing
 
Unit 1.2 move to cloud computing
Unit 1.2   move to cloud computingUnit 1.2   move to cloud computing
Unit 1.2 move to cloud computing
 
ECI - The Elastic Network - winds of change
ECI - The Elastic Network - winds of changeECI - The Elastic Network - winds of change
ECI - The Elastic Network - winds of change
 
Plenary_three_Cloud_computing_-_is_social_housing_ready_for_it_-_Phil_Copperw...
Plenary_three_Cloud_computing_-_is_social_housing_ready_for_it_-_Phil_Copperw...Plenary_three_Cloud_computing_-_is_social_housing_ready_for_it_-_Phil_Copperw...
Plenary_three_Cloud_computing_-_is_social_housing_ready_for_it_-_Phil_Copperw...
 
Orange Business Live 2013 cloud breakout
Orange Business Live 2013 cloud breakoutOrange Business Live 2013 cloud breakout
Orange Business Live 2013 cloud breakout
 
Digital Transformation in 2018: DX 4 3-2-1
Digital Transformation in 2018: DX 4 3-2-1Digital Transformation in 2018: DX 4 3-2-1
Digital Transformation in 2018: DX 4 3-2-1
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud Computing
 
Enabling the Software Defined Data Center for Hybrid IT
Enabling the Software Defined Data Center for Hybrid ITEnabling the Software Defined Data Center for Hybrid IT
Enabling the Software Defined Data Center for Hybrid IT
 
What is Your Edge From the Cloud to the Edge, Extending Your Reach
What is Your Edge From the Cloud to the Edge, Extending Your ReachWhat is Your Edge From the Cloud to the Edge, Extending Your Reach
What is Your Edge From the Cloud to the Edge, Extending Your Reach
 
New Delhi Cloud Summit 05 26-11
New Delhi Cloud Summit 05 26-11New Delhi Cloud Summit 05 26-11
New Delhi Cloud Summit 05 26-11
 
Basic cloud
Basic cloudBasic cloud
Basic cloud
 
What is cloud
What is cloudWhat is cloud
What is cloud
 

More from centralohioissa

Mike Spaulding - Building an Application Security Program
Mike Spaulding - Building an Application Security ProgramMike Spaulding - Building an Application Security Program
Mike Spaulding - Building an Application Security Program
centralohioissa
 
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
centralohioissa
 
Bob West - Educating the Board of Directors
Bob West - Educating the Board of DirectorsBob West - Educating the Board of Directors
Bob West - Educating the Board of Directors
centralohioissa
 
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about CybersecurityMark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
centralohioissa
 
Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems
Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access SystemsValerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems
Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems
centralohioissa
 
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
centralohioissa
 
Jeffrey Sweet - Third Party Risk Governance - Why? and How?
Jeffrey Sweet - Third Party Risk Governance - Why? and How?Jeffrey Sweet - Third Party Risk Governance - Why? and How?
Jeffrey Sweet - Third Party Risk Governance - Why? and How?
centralohioissa
 
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
centralohioissa
 
Tre Smith - From Decision to Implementation: Who's On First?
Tre Smith - From Decision to Implementation: Who's On First?Tre Smith - From Decision to Implementation: Who's On First?
Tre Smith - From Decision to Implementation: Who's On First?
centralohioissa
 
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the War
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the WarGary Sheehan - Winning a Battle Doesn't Mean We Are Winning the War
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the War
centralohioissa
 
Sean Whalen - How to Hack a Hospital
Sean Whalen - How to Hack a HospitalSean Whalen - How to Hack a Hospital
Sean Whalen - How to Hack a Hospital
centralohioissa
 
Harry Regan - Disaster Recovery and Business Continuity - "It's never so bad ...
Harry Regan - Disaster Recovery and Business Continuity - "It's never so bad ...Harry Regan - Disaster Recovery and Business Continuity - "It's never so bad ...
Harry Regan - Disaster Recovery and Business Continuity - "It's never so bad ...
centralohioissa
 
Rafeeq Rehman - Breaking the Phishing Attack Chain
Rafeeq Rehman - Breaking the Phishing Attack ChainRafeeq Rehman - Breaking the Phishing Attack Chain
Rafeeq Rehman - Breaking the Phishing Attack Chain
centralohioissa
 
Michael Woolard - Gamify Awareness Training: Failure to engage is failure to ...
Michael Woolard - Gamify Awareness Training: Failure to engage is failure to ...Michael Woolard - Gamify Awareness Training: Failure to engage is failure to ...
Michael Woolard - Gamify Awareness Training: Failure to engage is failure to ...
centralohioissa
 
Ruben Melendez - Economically Justifying IT Security Initiatives
Ruben Melendez - Economically Justifying IT Security InitiativesRuben Melendez - Economically Justifying IT Security Initiatives
Ruben Melendez - Economically Justifying IT Security Initiatives
centralohioissa
 
Ed McCabe - Putting the Intelligence back in Threat Intelligence
Ed McCabe - Putting the Intelligence back in Threat IntelligenceEd McCabe - Putting the Intelligence back in Threat Intelligence
Ed McCabe - Putting the Intelligence back in Threat Intelligence
centralohioissa
 
Ofer Maor - Security Automation in the SDLC - Real World Cases
Ofer Maor - Security Automation in the SDLC - Real World CasesOfer Maor - Security Automation in the SDLC - Real World Cases
Ofer Maor - Security Automation in the SDLC - Real World Cases
centralohioissa
 
Jim Libersky: Cyber Security - Super Bowl 50
Jim Libersky: Cyber Security - Super Bowl 50Jim Libersky: Cyber Security - Super Bowl 50
Jim Libersky: Cyber Security - Super Bowl 50
centralohioissa
 
Jim Wojno: Incident Response - No Pain, No Gain!
Jim Wojno: Incident Response - No Pain, No Gain!Jim Wojno: Incident Response - No Pain, No Gain!
Jim Wojno: Incident Response - No Pain, No Gain!
centralohioissa
 
Jason Samide - State of Security & 2016 Predictions
Jason Samide - State of Security & 2016 PredictionsJason Samide - State of Security & 2016 Predictions
Jason Samide - State of Security & 2016 Predictions
centralohioissa
 

More from centralohioissa (20)

Mike Spaulding - Building an Application Security Program
Mike Spaulding - Building an Application Security ProgramMike Spaulding - Building an Application Security Program
Mike Spaulding - Building an Application Security Program
 
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
 
Bob West - Educating the Board of Directors
Bob West - Educating the Board of DirectorsBob West - Educating the Board of Directors
Bob West - Educating the Board of Directors
 
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about CybersecurityMark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
 
Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems
Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access SystemsValerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems
Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems
 
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
 
Jeffrey Sweet - Third Party Risk Governance - Why? and How?
Jeffrey Sweet - Third Party Risk Governance - Why? and How?Jeffrey Sweet - Third Party Risk Governance - Why? and How?
Jeffrey Sweet - Third Party Risk Governance - Why? and How?
 
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
 
Tre Smith - From Decision to Implementation: Who's On First?
Tre Smith - From Decision to Implementation: Who's On First?Tre Smith - From Decision to Implementation: Who's On First?
Tre Smith - From Decision to Implementation: Who's On First?
 
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the War
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the WarGary Sheehan - Winning a Battle Doesn't Mean We Are Winning the War
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the War
 
Sean Whalen - How to Hack a Hospital
Sean Whalen - How to Hack a HospitalSean Whalen - How to Hack a Hospital
Sean Whalen - How to Hack a Hospital
 
Harry Regan - Disaster Recovery and Business Continuity - "It's never so bad ...
Harry Regan - Disaster Recovery and Business Continuity - "It's never so bad ...Harry Regan - Disaster Recovery and Business Continuity - "It's never so bad ...
Harry Regan - Disaster Recovery and Business Continuity - "It's never so bad ...
 
Rafeeq Rehman - Breaking the Phishing Attack Chain
Rafeeq Rehman - Breaking the Phishing Attack ChainRafeeq Rehman - Breaking the Phishing Attack Chain
Rafeeq Rehman - Breaking the Phishing Attack Chain
 
Michael Woolard - Gamify Awareness Training: Failure to engage is failure to ...
Michael Woolard - Gamify Awareness Training: Failure to engage is failure to ...Michael Woolard - Gamify Awareness Training: Failure to engage is failure to ...
Michael Woolard - Gamify Awareness Training: Failure to engage is failure to ...
 
Ruben Melendez - Economically Justifying IT Security Initiatives
Ruben Melendez - Economically Justifying IT Security InitiativesRuben Melendez - Economically Justifying IT Security Initiatives
Ruben Melendez - Economically Justifying IT Security Initiatives
 
Ed McCabe - Putting the Intelligence back in Threat Intelligence
Ed McCabe - Putting the Intelligence back in Threat IntelligenceEd McCabe - Putting the Intelligence back in Threat Intelligence
Ed McCabe - Putting the Intelligence back in Threat Intelligence
 
Ofer Maor - Security Automation in the SDLC - Real World Cases
Ofer Maor - Security Automation in the SDLC - Real World CasesOfer Maor - Security Automation in the SDLC - Real World Cases
Ofer Maor - Security Automation in the SDLC - Real World Cases
 
Jim Libersky: Cyber Security - Super Bowl 50
Jim Libersky: Cyber Security - Super Bowl 50Jim Libersky: Cyber Security - Super Bowl 50
Jim Libersky: Cyber Security - Super Bowl 50
 
Jim Wojno: Incident Response - No Pain, No Gain!
Jim Wojno: Incident Response - No Pain, No Gain!Jim Wojno: Incident Response - No Pain, No Gain!
Jim Wojno: Incident Response - No Pain, No Gain!
 
Jason Samide - State of Security & 2016 Predictions
Jason Samide - State of Security & 2016 PredictionsJason Samide - State of Security & 2016 Predictions
Jason Samide - State of Security & 2016 Predictions
 

Recently uploaded

Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 

Recently uploaded (20)

Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 

Lisa Guess - Embracing the Cloud

  • 1. Embracing the Cloud How is the Cloud built and how do you Secure It? Lisa Guess VP Juniper Networks - Systems Engineering
  • 2.
  • 3.
  • 4. Your business challenges How should I embrace the cloud? How do I secure the cloud? How do I innovate without disrupting business? What is my Return on Investment (ROI)?
  • 5. IT Quickly Moving Toward Cloud Source: IDG Enterprise Cloud Computing Study 2014 Percentage of respondents utilizing different types of Cloud computing environments…….. Public Cloud Private Cloud Hybrid Cloud 19% 15% 5% 61% 25% 21% 7% 47% Private Cloud Public Cloud Hybrid Cloud Non-Cloud % OF TOTAL IT ENVIRONMENT IN THE CLOUD Current In 18 months
  • 6. Applications Driving Design Change Network Virtualization ATTRIBUTES • Virtualized with Bare metal • Introduction of Network Overlays REQUIREMENTS • Physical to Virtual (P2V) integration • Overlay visualization & management Everything “As-a-Service” ATTRIBUTES • Scale-out • On-demand REQUIREMENTS • Multi-tenancy • Simple to operate, easy to scale Modern App Flows ATTRIBUTES • Increased Machine to Machine • East-West traffic REQUIREMENTS • Flatter Topology • High performance and consistent
  • 7. Today You Are Here User IT Admin You Need to Be Here User CLICK HERE Orchestration? Security? Protocols?SDN? Support?Intelligence? Path to Success: Identify
  • 8. Today You Are Here • Resources are in silos • Network services are on physical appliances • Tasks are not automated • Orchestration is decentralized • Security is an afterthought VLANS VLANS FINANCE HR MARKETING Firewalls Load-Balancer Physical Servers Local Hard Drives You Need to Be Here VIRTUALIZED HR MARKETINGFINANCE • Resources are pooled • Network services are virtualized and distributed • Moves/adds/changes are fully automated • Orchestration is completely centralized • Security is integrated Path to Success: Set Goals
  • 9. Path to Success: Foundational Impediments Security is difficult Physical is the default Bottlenecks Automation is key Difficult to automate Box-by-box touch points Difficult to mine data Processes are manual Suboptimal topologies Inconsistent performance Disaggregated elements Network is complex
  • 11. Portal: Data Sources: Applications: Employees Customers Partners Suppliers DevicesDatabase Transactions Sensors Inventory Devices Analysis Reporting CRM Database Administration InventoryHRPurchasing Analysis Reporting CRM Mail Order Processing InventoryHRPurchasing Network Devices Rich media New applications Digitized information Machine to MachineEmployees Customers Machines Suppliers Partners “Any to Any” Services Sharing, Flexibility, Velocity Employees CustomersFinance EDIMailERP Mail EDIERP >75%
  • 12. Portal: Data Sources: Applications: Employees Customers Partners Suppliers DevicesDatabase Transactions Sensors Inventory Devices Analysis Reporting CRM Database Administration InventoryHRPurchasing Analysis Reporting CRM Mail Order Processing InventoryHRPurchasing Network Devices Rich media New applications Digitized information Machine to MachineEmployees Customers Machines Suppliers Partners Moving to the Cloud Legacy DC
  • 13. Suppliers DevicesInventory Devices Database Administration Inventory Mail Order Processing Inventory Digitized information Machine to MachineSuppliers Partners Moving to the Cloud Legacy DC Virtualized DC Cloud DC Design for five 9s • Apps not resilient • High end x86 servers • Virtual machines • Shared storage - FC • L2 adjacency Design for 3 9s • Apps resilient • Commodity servers • Virtualization • NAS storage • L3 connectivity
  • 14. Devices Database Inventory Digitized information Moving to the Cloud Legacy DC Virtualized DC Cloud DC Devices Mail Order Processing Inventory Suppliers Partners Devices Mail Inventory Suppliers Order Processing Partners Inventory
  • 15. Devices Inventory Digitized information Moving to the Cloud Legacy DC Virtualized DC Cloud DC Devices Inventory Suppliers Order Processing Partners Inventory Mail Network Big Data - Hadoop
  • 16. Agility – Time to Provision 2 Months Physical Server Time Virtual Server 2 WeeksNetwork 2 WeeksStorage 2 Minutes Orchestration, Automation,
  • 17. Automation “Crushing Grapes” Orchestration “Making Wine” Automation ≠ Orchestration Speeding up “IT” Workflows at scale while eliminating errors Automation helps eliminate repeatable manual tasks through scripts or other software tools Orchestration is an extension of automation that groups automated tasks into coordinated workflows.
  • 18. Path to the Cloud Self Provisioned Clouds Cloud DC 3 Optimization Greater Agility & Availability Virtualized DC 2 Consolidation Lower Cost Legacy DC 1 Server Virtualization Network, Automation Orchestration Public Private
  • 19. MetaFabric VM VM VM Virtual Physical VM VM VM Virtual Physical VM VM VM Virtual Physical VM VM VM Virtual Physical My on-premises data center My hosted service provider My cloud service provider My managed service provider VM VM VM Virtual VM VM VM Virtual Architecture for building a coherent network within & between data centers
  • 20. MetaFabric – Three Steps Automate Operations Orchestration Network automation and analytics Network virtualization MH Secure the NetworkNetwork security Simplify the Network Network infrastructure Data CenterDCIData Center
  • 21. Simplify the network Old Model: Deploy individual network elements New Model: Deploy a coherent network • Data plane driven • Shared distributed control plane • Common management plane
  • 22. Simplify the network Coherent architecture Building blocks Topology Tree Spine and Leaf Advantages: • Better, more consistent app performance • More agile - eliminates locality issues • Simpler to manage • Lower cost
  • 23. Simplify the network Coherent architecture Building blocks Topology Access Spine Edge
  • 24. Simplify the network Coherent architecture Building blocks Topology Access Spine Edge Coherent Network: Shared, distributed control plane Common management plane MC-LAGEthernet FabricIP Fabric w/ Open ClosCoherence beyond the edge
  • 25. Coherent architectures Legacy and Virtualized data centers Private cloud data centers Public cloud data centers Virtual Network Fabric Overlay IP Fabric All L3 Multi-Tier w/ MC-LAG L2/L3 Ethernet Fabric L2/L3
  • 26. MetaFabric – Three Steps Secure the NetworkNetwork security Simplify the Network Network infrastructure Data CenterDCIData Center Automate Operations Orchestration Network automation and analytics Network virtualization MH
  • 27. Secure – a new model for the cloud Castle Model Hotel Model • Micro-perimeterization • Multiple enforcement points • Supported by the cloud
  • 28. Security Enforcement Router (MX) [stateless ACL L2-3] 5 Physical Firewall Appliance (SRX) [Stateful L2-L7 firewall] 1 DC Spine Switch (QFX1000) [Stateful ACL and/or L4-7 firewall] 3 DC Leaf Switch (QFX5100) [Stateful ACL and/or L4-7 firewall] 4 VT-x Hypervisor VAVASDN Virtualized Host with virtual firewall (dFW, Contrail vRouter, vSRX) [Stateful ACL and/or L4-7 firewall] 2 SD SPACE ND VD APIs & libraries exposed to operators, orchestration, & automation platforms To Device-specific APIs Contrail Central Policy Engine Threat Intelligence Threat Intelligence
  • 29. MetaFabric – Three Steps Automate Operations Orchestration Network automation and analytics Network virtualization MH Secure the NetworkNetwork security Simplify the Network Network infrastructure Data CenterDCIData Center
  • 30. Automate operations Old Model: Manage network devices New Model: Automate the workflow of delivering the application
  • 31. Automate Work Flows Build & Provision Operate & Monitor Orchestrate Benefits: Repeatability More reliable More agile Lower operating cost
  • 32. The Automation Stack Junos Data Plane (PFE)Chassis XML-RPC PythonEZ Framework RubyEZ Library Ansible Python Scripts ChefPuppet Ruby Scripts Netconf Junoscript SNMP RO CLI Junos Platform Automation Stack
  • 33. Chef Junos Data Plane (PFE)Chassis XML-RPC Netconf PythonEZ Framework RubyEZ Library PuppetAnsible Python Scripts Ruby Scripts Junoscript SNMP RO CLI Junos Platform Automation Stack Two Approaches Network Coherence BottomsUp Network Director Security Director Target top 20% of tasks – 80% of the effort
  • 34. Two Approaches Network Coherence Build your own TopsDown Network Virtualization Network Director Security Director
  • 35. Network Virtualization Network Virtualization Can we do for the network what we did for the server?
  • 37. Network Virtualization Promise of Overlays A1 B1 A2 B2
  • 38. Network Virtualization Service Chaining A1 B1A2 B2 Virtual Network A Virtual Network B FW IDP LB NAT
  • 39. MetaFabric – Three Steps Automate Operations Orchestration Network automation and analytics Network virtualization MH Secure the NetworkNetwork security Simplify the Network Network infrastructure Data CenterDCIData Center

Editor's Notes

  1. TALK TRACK: If the goal is automation and abstraction, there are multiple ways to get to that goal Among our customers we see very different types of cloud builders Some are hard core DIYers and will build entire toolsets from scratch rather than wait for the commercial marketplace to provide what they need. Others are also DIYers, but use the tools that are available from the open source community And others just want something that works—they will typically buy and end-to-end software stack from a large vendor. In that camp we see vmware as a very viable option for many customers. We are working closely with vmware and have 6 different engineering projects happening simultaneously Finally, there are two open areas of openstack and cloudstack. We see this as the next normal. This means that the largest cloud providers who do not want to do it themselves will overtime move into the openstack environment. There are different technology paths to get to SDN Software only approach using existing architectures and overlaying automation Hybrid approach – new physical infrastructure and new architecture (still no SDN controller) full overlay model – using controller The network needs to work for all these types of cloud builders
  2. 10
  3. 11
  4. 12
  5. 13
  6. 14
  7. 15
  8. The further up the stack you go, the less complex it is for the end user to automate. However, along with it being less complex it is also less flexible. For instance, writing an application/script that interacts directly over netconf allows the user to do more (with more coding of course) than writing a playbook in Ansible. The underlying modules for Ansible have to support whatever the end user is trying to do. If the module doesn’t exist, there is the ability to build that module using the PyEZ framework and use it ad-infinitum for that particular task.
  9. The further up the stack you go, the less complex it is for the end user to automate. However, along with it being less complex it is also less flexible. For instance, writing an application/script that interacts directly over netconf allows the user to do more (with more coding of course) than writing a playbook in Ansible. The underlying modules for Ansible have to support whatever the end user is trying to do. If the module doesn’t exist, there is the ability to build that module using the PyEZ framework and use it ad-infinitum for that particular task.