SlideShare a Scribd company logo
1 of 29
The most trusted, proven enterprise-class Cloud:
Closer than you think
Antony Cassano, ITS Department Manager
IT needs to become smarter … get new choices
• Some use the word “Cloud” to describe
new consumption and delivery models
• Regardless of terminology, it is clear that
these new models are emerging for the
enterprise – even if they were first
inspired by consumer Internet services
• The current security & performance
requirements for enterprise cloud
implementations, create new choices of
cloud deployment models and types of
Cloud providers, with Cloud
integration, execution & operation
capabilities
What is an Enterprise Class Cloud?
3
Is it just another cloud with a marketing spin?
Absolutely not!
Replaces while
delivering the
benefits of a
cloud-based
approach —
multi-tenant
isolation,
on-demand
delivery, and
dynamic scale
An Enterprise
Class Cloud, is
designed to
meet or exceed
the
security, perform
ance, and
business SLAs
of infrastructure
Potential Customer Profiles
• Internal cost awareness
• Focus on business, not IT
• Modern (non legacy) business
applications
• Staff need application and/or
desktop access BYOD, Mobility
• Flexibility a priority
• Interested in latest technologies
• Data security a priority
• Large IT staff
• Multiple or custom applications
• Staff/execs not interested in
anywhere, any device/SaaS/cloud
• Stuck to desk/old business ideas
• Slow to adopt technology
• Unaware of security issues
• Business Non aware of actual IT Costs
Today’s ideal customer
Today’s challenging
customer
Support all Cloud flavors
5
Key attributes of an Enterprise Class Cloud
6
Enterprise-Class
Security
Business Continuity Assured
Performance SLAs
Complex
Network Routing
Compliance Resource Pooling
Security in the Cloud: Is it Pie in the Sky?
7
Why is cloud perceived to be insecure?
What are the real security risks?
What can be done to mitigate those risks?
Data security is of the highest importance
8
ee-quarters (77%) would rather host their data in a
but latent facility than in a facility that guarantees top
ess secure (9%).
my d ta” ranks 
ngst all factors
y DMs when
osting provider,
rformance.
ecurity is of the highest
ance for CA and UK DMs
Factors Considered In Order of Importance
(Total Sample)
n-in-ten (69%) agree:
willing to incur latency to 
ure data sovereignty.
”
2
Eight-in-ten (81%) say:
t is important to know
precisely where their data is
stored.
“Security of my data” ranks highest
amongst all factors considered by
DMs when selecting a hosting
provider, even over performance.
“Eight-in-ten (81%) say:
It is important to know precisely
where their data is stored.”
More than three-quarters (77%)
would rather host their data in a
highly secure, but latent facility than
in a facility that guarantees top
speeds but is less secure
“44% are confused by
privacy and security laws.”
US Patriot Act
*Survey prepared by March Communications January
2014, The Impact of the NSA on Hosting Decision Makers
in the UK and Canada.
“Further, despite companies’ strong
reaction to the NSA scandal, many say
that they don’t fully understand
current data laws, with 60% admitting
they don’t know as much as they
should about data privacy laws.”
Data the “crown jewels” asset
9
In addition to the intrinsic value of data to the Enterprise, there
are very frequently a number of regulatory issues to be
considered:
• Location of data
• Access to data
• Ownership of data: The US, the UK, and much of the EU have
divergent rules about ownership of data stored on corporate
networks
• Intellectual property laws: protection of intellectual property
varies widely from jurisdiction to jurisdiction.
• Privacy and confidentiality laws: authorities in different
jurisdictions take widely different views of the degree of
privacy and confidentiality.
Questions that the Enterprise must consider
10
• Can I audit the service provider at any time, or only by prior
arrangement?
• Who, other than employees of my company, will have access to the
data and what kind of access will it be?
• How long will the recovery process take and who is responsible?
• What kind of tools are available for me to audit the cloud provider‟s
handling of my data?
• How and when will the data be backed up?
• Who is responsible for initiating the recovery process when data is
lost?
• Does the service provider have the certifications typical for a
provider of such services (especially ISO9001 and ISO27001)?
• Transparency
Cloud provider should have ready answers
11
• Where are your data centers physically located?
• Which data center(s) will be used to store my data?
• Where will my backups be stored?
• Will my data be replicated to a remote location? If so, where?
• If my data is replicated remotely, will I be able to resume
processing from there in the event of a complete data center
outage? If so, in what timeframe?
• What is the network architecture (a) between customers and the
cloud? And (b) between cloud data centers?
• Are all the data centers in the cloud owned by the provider? If
not, who owns them and what else is processed in those data
centers?
12
While there are many more questions to be asked, a cloud
provider that cannot or will not share the answers to this sort
of question is unlikely to be an appropriate partner for
mission critical production workloads
So what is Uni Systems doing to mitigate those risks?
Looking forward
Uni|Cloud : Enterprise Class Transparency Cloud
13
• Transparency
• Reliability
• Trusted Advisor
• Strong market partnerships
• Synergies
• Business Development
• Security/Legal/Compliance
Uni Systems Secure Cloud Services…
Built with Reliability in mind
ISO 27001:2005
•Hosting Services for Information and Communication Technology (ICT) equipment and high-availability office facilities in the
Company’s Data Centre
•Cloud Services including Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS)
•Professional Services including the design, installation, administration and technical support of ICT
Reliability of Operations
People Security Aware
NDA Agreement
Processes Business Continuity
Mgmt
Availability Management
Professional Services
Background checked
Operational & Change
Control
Managed Backup
Access Control Mgmt
SLA Mgmt
Monitoring
Secure Information
exchange
Audit Logging
Quality Assurance
Data Deletion Mgmt
Uni|Cloud : Private Compute-as-a-Service
17
Our Customers can take advantage of our hybrid cloud capabilities, blending
multi-tenant cloud with private cloud and traditional management services,
all in a single solution
• Enterprise Performance
• Availability SLA (end to end)
• Industry standard technology including (Microsoft, Citrix, HP, EMC, Cisco)
• Enterprise Security and Compliance
• Full logical Isolation between tenants
• Virtual Private Clouds with user-determined public internet connectivity
• Unique customizable network & WEB application firewalls for security
• VPN admin for all equipment
• Role based permissions, Audit logs for environmental changes
Uni|Cloud : Private Compute-as-a-Service
18
• Fully managed Service
• Comprehensive, ongoing management of the entire private
cloud
• Management of the underlying Oss, Virtualization
stacks, hardware
• Uni Systems Data‟s management process for Cloud
availability and performance
• Ongoing software lifecycle management
• Uni Systems multipoint root cause analysis monitoring
system (systems, applications, network and the overall user
experience 24x7x365 to ensure the highest possible uptime
and performance
Cloud Integration
19
• Migrating enterprise applications to the cloud starts with a
comprehensive strategy, but success is only achieved through
detailed planning and strong technical execution
• Uni Systems provides comprehensive professional services
geared to help enterprises migrate applications to the cloud
• Capitalizing on numerous real world, production, enterprise
deployments, we understand that cloud computing typically
represents as significant an operational challenge as a
technical one
Define Analyse Design Develop Test Deploy Manage
Enterprise-Cloud Focused Development
20
• Realizing the full potential of a modern cloud computing environment
requires a thorough understanding of an application, from the operating
system all the way up the application stack
• Uni Systems„ Cloud Application Development Services team possesses
deep experience
• Our team has developed, customized, and deployed hundreds of
applications based on various open source and proprietary MVC
frameworks and Content Management Systems (CMS).
Cloud Strategy
21
• Critical Path Questions Addressed:
– What cloud strategy should I adopt to transform my environment over
time?
– Which applications should I put in the cloud and what benefit would I
gain?
– How do we migrate our applications?
– What cloud solution is best for our requirements?
– How can we secure and backup our data?
– How can we create a Disaster Recovery strategy?
– How well prepared is our organization to support cloud?
– How and when should we integrate SaaS applications?
– How do we monitor and manage a cloud?
Uni Systems Cloud Assessment workshop
The alternative path: Application or Platform domain
selection
22
A single or a few initial domains could be “fast- tracked” through the
above process, while it takes place at a more measured pace for the rest
of the environment :
• Identify suitable target applications or services in the current
landscape, identify and address the governance and risk issues;
• Build a business case
• Architect the change in the business application landscape
• Develop new forms of availability/continuity/ contingency
management processes to handle the new delivery model;
• Implement an acceptance environment
• Ensure that the knowledge gained is captured for use elsewhere.
Uni|Cloud Portfolio
Uni|Apps
Cloud on demand Apps
Uni|Desktop
Desktop as a Service
Uni|On-Board
Cloud on Boarding
Uni|Root
Monitoring as a Service
Uni|Vault
Backup & Business
Continuity as a Service
Uni|Workplace
Test & Development environment
as a Service
Uni|DBaaS
RDBMS as a Service
Uni|MaaS
Middleware as a Service
Uni|E-Invoicing Uni|HCMaaS
Human Capital Mangmt as a Service
Uni|PAYaaS
Payroll as a Service
Uni|Cloud- IaaS
Uni Systems Next Generation
Hybrid Enterprise Cloud
Storage –TBA
Uni|Cloud- SaaS
Uni|Cloud- PaaS
Success Story #1: Uni Systems Cloud VDR Solution
Success Story #2 : Uni|Desktop as a Service
• Complete hosted experience
• Any device, anywhere
• Integrated apps on-demand
DaaS: More Than Just a “Desktop”
Microsoft Office & Email &Lync
Anti-Virus
Hosted Desktop
Hosted Desktops
Multi-AppSSO(Receiver)
DeliverytoAnyDevice
SessionPortability
BusinessContinuity
DataSecurity,Sovereignty
High-DefUserExperience
Added-Value for
Hosted Apps/Desktops
LoB&VerticalApps
Hosted a la carte Apps
Mobile Device
Management
Cloud Data Storage
Additional
Hosted Services
27
User
ARCHIVING@CONNECT
a, b &
PDF
E-mail receipt. Not
recommended
Invoice receipt via
e-invoice web portal
service
Success Story #3: Uni|e-Invoicing
28
• Compliant with the Greek Legislations
• Automates & Improves the invoicing procedure
• Secure / Trusted transmission and receipt of invoices
• It informs the sender when the recipient downloads or open the invoice
• Centralized invoice management
• Can be applied to all issued invoices
• Reduces the traditional invoicing cost for B2B transactions
- Printers Operation & Consumables
- Archiving Infrastructure
- Archiving / Retrieval Procedure
- Preparation & Postal Services
- Management
Success Story #3: Uni|e-Invoicing
Uni|Cloud success stories
Customer Type of Services
Major Financial Institution Disaster Site Hosting, Operations room
Major Shipping Organizations VDR, BCP, Multi hop, Uni-Desktop
ISP White labeling engagment
Media PaaS
Governmental Institution (EU) PaaS, PCaS
Manufacturing VDR, Uni-Desktop
More than 6 Financial Institutes PAYroll as a Service
Major ISV Provider PCaaS PCI Class
Copyright © 2014 Uni Systems
www.unicloud.gr

More Related Content

What's hot

Executing on the promise of the Internet of Things (IoT)
Executing on the promise of the Internet of Things (IoT)Executing on the promise of the Internet of Things (IoT)
Executing on the promise of the Internet of Things (IoT)Dell World
 
Client Security Strategies To Defeat Advanced Threats
Client Security Strategies To Defeat Advanced ThreatsClient Security Strategies To Defeat Advanced Threats
Client Security Strategies To Defeat Advanced ThreatsDell World
 
Client solutions for the modern workforce
Client solutions for the modern workforceClient solutions for the modern workforce
Client solutions for the modern workforceDell World
 
Focus on business, not backups
Focus on business, not backupsFocus on business, not backups
Focus on business, not backupsDell World
 
Channel Partners: Lead with Dell Software Solutions
Channel Partners: Lead with Dell Software SolutionsChannel Partners: Lead with Dell Software Solutions
Channel Partners: Lead with Dell Software SolutionsDell World
 
Dell Cloud Manager Overview
Dell Cloud Manager OverviewDell Cloud Manager Overview
Dell Cloud Manager OverviewDell World
 
Cloud computing adoption in sap technologies
Cloud computing adoption in sap technologiesCloud computing adoption in sap technologies
Cloud computing adoption in sap technologiessveldanda
 
Lorraine Morgan: Factors affecting the adoption of cloud computing
Lorraine Morgan: Factors affecting the adoption of cloud computingLorraine Morgan: Factors affecting the adoption of cloud computing
Lorraine Morgan: Factors affecting the adoption of cloud computingCBOD ANR project U-PSUD
 
Simplifying Systems Management
Simplifying Systems ManagementSimplifying Systems Management
Simplifying Systems ManagementDell World
 
Blue Central and the world of End User Computing
Blue Central and the world of End User ComputingBlue Central and the world of End User Computing
Blue Central and the world of End User ComputingBlue Central
 
Privacy issues in the cloud final
Privacy issues in the cloud   finalPrivacy issues in the cloud   final
Privacy issues in the cloud finalguest50a642f
 
The Data Center Is The Heartbeat of Today's IT Transformation (ENT215) | AWS ...
The Data Center Is The Heartbeat of Today's IT Transformation (ENT215) | AWS ...The Data Center Is The Heartbeat of Today's IT Transformation (ENT215) | AWS ...
The Data Center Is The Heartbeat of Today's IT Transformation (ENT215) | AWS ...Amazon Web Services
 
4° Sessione VMware Horizon: la piattaforma per l’erogazione e la gestione di ...
4° Sessione VMware Horizon: la piattaforma per l’erogazione e la gestione di ...4° Sessione VMware Horizon: la piattaforma per l’erogazione e la gestione di ...
4° Sessione VMware Horizon: la piattaforma per l’erogazione e la gestione di ...Jürgen Ambrosi
 
The Enterprise Internet of Things: Think Security First
The Enterprise Internet of Things: Think Security FirstThe Enterprise Internet of Things: Think Security First
The Enterprise Internet of Things: Think Security FirstDell World
 
Cloud computing boi fair 9jan2012
Cloud computing boi fair 9jan2012Cloud computing boi fair 9jan2012
Cloud computing boi fair 9jan2012punyagup
 
Contrast cbt cloud computing - v.2
Contrast cbt cloud computing - v.2Contrast cbt cloud computing - v.2
Contrast cbt cloud computing - v.2contrastcbt
 
Cloud Computing - Beyond the Hype
Cloud Computing - Beyond the HypeCloud Computing - Beyond the Hype
Cloud Computing - Beyond the HypeRH
 
GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...
GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...
GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...Happiest Minds Technologies
 

What's hot (20)

Executing on the promise of the Internet of Things (IoT)
Executing on the promise of the Internet of Things (IoT)Executing on the promise of the Internet of Things (IoT)
Executing on the promise of the Internet of Things (IoT)
 
Client Security Strategies To Defeat Advanced Threats
Client Security Strategies To Defeat Advanced ThreatsClient Security Strategies To Defeat Advanced Threats
Client Security Strategies To Defeat Advanced Threats
 
Client solutions for the modern workforce
Client solutions for the modern workforceClient solutions for the modern workforce
Client solutions for the modern workforce
 
Focus on business, not backups
Focus on business, not backupsFocus on business, not backups
Focus on business, not backups
 
Channel Partners: Lead with Dell Software Solutions
Channel Partners: Lead with Dell Software SolutionsChannel Partners: Lead with Dell Software Solutions
Channel Partners: Lead with Dell Software Solutions
 
Dell Cloud Manager Overview
Dell Cloud Manager OverviewDell Cloud Manager Overview
Dell Cloud Manager Overview
 
Cloud computing adoption in sap technologies
Cloud computing adoption in sap technologiesCloud computing adoption in sap technologies
Cloud computing adoption in sap technologies
 
Democratizing IT Automation in a Multi-Cloud World
Democratizing IT Automation in a Multi-Cloud WorldDemocratizing IT Automation in a Multi-Cloud World
Democratizing IT Automation in a Multi-Cloud World
 
Lorraine Morgan: Factors affecting the adoption of cloud computing
Lorraine Morgan: Factors affecting the adoption of cloud computingLorraine Morgan: Factors affecting the adoption of cloud computing
Lorraine Morgan: Factors affecting the adoption of cloud computing
 
Simplifying Systems Management
Simplifying Systems ManagementSimplifying Systems Management
Simplifying Systems Management
 
Get your house on order
Get your house on orderGet your house on order
Get your house on order
 
Blue Central and the world of End User Computing
Blue Central and the world of End User ComputingBlue Central and the world of End User Computing
Blue Central and the world of End User Computing
 
Privacy issues in the cloud final
Privacy issues in the cloud   finalPrivacy issues in the cloud   final
Privacy issues in the cloud final
 
The Data Center Is The Heartbeat of Today's IT Transformation (ENT215) | AWS ...
The Data Center Is The Heartbeat of Today's IT Transformation (ENT215) | AWS ...The Data Center Is The Heartbeat of Today's IT Transformation (ENT215) | AWS ...
The Data Center Is The Heartbeat of Today's IT Transformation (ENT215) | AWS ...
 
4° Sessione VMware Horizon: la piattaforma per l’erogazione e la gestione di ...
4° Sessione VMware Horizon: la piattaforma per l’erogazione e la gestione di ...4° Sessione VMware Horizon: la piattaforma per l’erogazione e la gestione di ...
4° Sessione VMware Horizon: la piattaforma per l’erogazione e la gestione di ...
 
The Enterprise Internet of Things: Think Security First
The Enterprise Internet of Things: Think Security FirstThe Enterprise Internet of Things: Think Security First
The Enterprise Internet of Things: Think Security First
 
Cloud computing boi fair 9jan2012
Cloud computing boi fair 9jan2012Cloud computing boi fair 9jan2012
Cloud computing boi fair 9jan2012
 
Contrast cbt cloud computing - v.2
Contrast cbt cloud computing - v.2Contrast cbt cloud computing - v.2
Contrast cbt cloud computing - v.2
 
Cloud Computing - Beyond the Hype
Cloud Computing - Beyond the HypeCloud Computing - Beyond the Hype
Cloud Computing - Beyond the Hype
 
GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...
GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...
GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...
 

Similar to The most trusted, proven enterprise-class Cloud:Closer than you think

Insurtech, Cloud and Cybersecurity - Chartered Insurance Institute
Insurtech, Cloud and Cybersecurity -  Chartered Insurance InstituteInsurtech, Cloud and Cybersecurity -  Chartered Insurance Institute
Insurtech, Cloud and Cybersecurity - Chartered Insurance InstituteHenrique Centieiro
 
Cloud computing and data security
Cloud computing and data securityCloud computing and data security
Cloud computing and data securityMohammed Fazuluddin
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourleyGovCloud Network
 
Security & Compliance in the Cloud [2019]
Security & Compliance in the Cloud [2019]Security & Compliance in the Cloud [2019]
Security & Compliance in the Cloud [2019]Tudor Damian
 
Radu crahmaliuc 23feb2012
Radu crahmaliuc 23feb2012Radu crahmaliuc 23feb2012
Radu crahmaliuc 23feb2012Agora Group
 
Shared responsibility - a model for good cloud security
Shared responsibility - a model for good cloud securityShared responsibility - a model for good cloud security
Shared responsibility - a model for good cloud securityAndy Powell
 
Lecture on Cloud Computing at Mumbai Education Trust Mumbai , India
Lecture on Cloud Computing at Mumbai Education Trust Mumbai , India Lecture on Cloud Computing at Mumbai Education Trust Mumbai , India
Lecture on Cloud Computing at Mumbai Education Trust Mumbai , India amodkadam
 
Cloud Computing in Business and facts
Cloud Computing in Business and factsCloud Computing in Business and facts
Cloud Computing in Business and factsArun Ganesh
 
The wonders of Cloud Computing.pptx
The wonders of Cloud Computing.pptxThe wonders of Cloud Computing.pptx
The wonders of Cloud Computing.pptxOmSatpathy
 
Shared responsibility - a model for good cloud security
Shared responsibility - a model for good cloud securityShared responsibility - a model for good cloud security
Shared responsibility - a model for good cloud securityJisc
 
Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Mark Williams
 
Building Cloud capability for startups
Building Cloud capability for startupsBuilding Cloud capability for startups
Building Cloud capability for startupsSekhar Mohanty
 
Cloud Computing (Lecture 1 & 2).pptx
Cloud Computing (Lecture 1 & 2).pptxCloud Computing (Lecture 1 & 2).pptx
Cloud Computing (Lecture 1 & 2).pptxMuhammadArslan799356
 
Understanding The Cloud For Enterprise Businesses, an eBook from Triaxil!
Understanding The Cloud For Enterprise Businesses, an eBook from Triaxil!Understanding The Cloud For Enterprise Businesses, an eBook from Triaxil!
Understanding The Cloud For Enterprise Businesses, an eBook from Triaxil!Ezhilarasan Natarajan
 
Understanding The Cloud For Enterprise Businesses.
Understanding The Cloud For Enterprise Businesses. Understanding The Cloud For Enterprise Businesses.
Understanding The Cloud For Enterprise Businesses. Triaxil
 
Group 39 presentation cloud computing
Group 39 presentation cloud computingGroup 39 presentation cloud computing
Group 39 presentation cloud computingDeepak Shukla
 
Securing Apps & Data in the Cloud by Spyders & Netskope
Securing Apps & Data in the Cloud by Spyders & NetskopeSecuring Apps & Data in the Cloud by Spyders & Netskope
Securing Apps & Data in the Cloud by Spyders & NetskopeAhmad Abdalla
 
Cloud vs On-prem Data Warehouse.pdf
Cloud vs On-prem Data Warehouse.pdfCloud vs On-prem Data Warehouse.pdf
Cloud vs On-prem Data Warehouse.pdfAmeliaWong21
 

Similar to The most trusted, proven enterprise-class Cloud:Closer than you think (20)

Insurtech, Cloud and Cybersecurity - Chartered Insurance Institute
Insurtech, Cloud and Cybersecurity -  Chartered Insurance InstituteInsurtech, Cloud and Cybersecurity -  Chartered Insurance Institute
Insurtech, Cloud and Cybersecurity - Chartered Insurance Institute
 
Cloud computing and data security
Cloud computing and data securityCloud computing and data security
Cloud computing and data security
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourley
 
Security & Compliance in the Cloud [2019]
Security & Compliance in the Cloud [2019]Security & Compliance in the Cloud [2019]
Security & Compliance in the Cloud [2019]
 
Radu crahmaliuc 23feb2012
Radu crahmaliuc 23feb2012Radu crahmaliuc 23feb2012
Radu crahmaliuc 23feb2012
 
Shared responsibility - a model for good cloud security
Shared responsibility - a model for good cloud securityShared responsibility - a model for good cloud security
Shared responsibility - a model for good cloud security
 
Lecture on Cloud Computing at Mumbai Education Trust Mumbai , India
Lecture on Cloud Computing at Mumbai Education Trust Mumbai , India Lecture on Cloud Computing at Mumbai Education Trust Mumbai , India
Lecture on Cloud Computing at Mumbai Education Trust Mumbai , India
 
Cloud Computing in Business and facts
Cloud Computing in Business and factsCloud Computing in Business and facts
Cloud Computing in Business and facts
 
The wonders of Cloud Computing.pptx
The wonders of Cloud Computing.pptxThe wonders of Cloud Computing.pptx
The wonders of Cloud Computing.pptx
 
Shared responsibility - a model for good cloud security
Shared responsibility - a model for good cloud securityShared responsibility - a model for good cloud security
Shared responsibility - a model for good cloud security
 
Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Cloud Security: A matter of trust?
Cloud Security: A matter of trust?
 
Building Cloud capability for startups
Building Cloud capability for startupsBuilding Cloud capability for startups
Building Cloud capability for startups
 
Cloud Computing (Lecture 1 & 2).pptx
Cloud Computing (Lecture 1 & 2).pptxCloud Computing (Lecture 1 & 2).pptx
Cloud Computing (Lecture 1 & 2).pptx
 
3.pptx
3.pptx3.pptx
3.pptx
 
Understanding The Cloud For Enterprise Businesses, an eBook from Triaxil!
Understanding The Cloud For Enterprise Businesses, an eBook from Triaxil!Understanding The Cloud For Enterprise Businesses, an eBook from Triaxil!
Understanding The Cloud For Enterprise Businesses, an eBook from Triaxil!
 
Understanding The Cloud For Enterprise Businesses.
Understanding The Cloud For Enterprise Businesses. Understanding The Cloud For Enterprise Businesses.
Understanding The Cloud For Enterprise Businesses.
 
Cloud capability for startups
Cloud capability for startupsCloud capability for startups
Cloud capability for startups
 
Group 39 presentation cloud computing
Group 39 presentation cloud computingGroup 39 presentation cloud computing
Group 39 presentation cloud computing
 
Securing Apps & Data in the Cloud by Spyders & Netskope
Securing Apps & Data in the Cloud by Spyders & NetskopeSecuring Apps & Data in the Cloud by Spyders & Netskope
Securing Apps & Data in the Cloud by Spyders & Netskope
 
Cloud vs On-prem Data Warehouse.pdf
Cloud vs On-prem Data Warehouse.pdfCloud vs On-prem Data Warehouse.pdf
Cloud vs On-prem Data Warehouse.pdf
 

More from Uni Systems S.M.S.A.

Uni Systems for Power Platform.pptx
Uni Systems for Power Platform.pptxUni Systems for Power Platform.pptx
Uni Systems for Power Platform.pptxUni Systems S.M.S.A.
 
Microsoft Fabric Intro D Koutsanastasis
Microsoft Fabric Intro D KoutsanastasisMicrosoft Fabric Intro D Koutsanastasis
Microsoft Fabric Intro D KoutsanastasisUni Systems S.M.S.A.
 
Create Unique Experiences through a CRM Approach St Kontos
Create Unique Experiences through a CRM Approach St Kontos Create Unique Experiences through a CRM Approach St Kontos
Create Unique Experiences through a CRM Approach St Kontos Uni Systems S.M.S.A.
 
Bring your data to the era of AI D. Agagiotis.pdf
Bring your data to the era of AI D. Agagiotis.pdfBring your data to the era of AI D. Agagiotis.pdf
Bring your data to the era of AI D. Agagiotis.pdfUni Systems S.M.S.A.
 
Innovative approaches with AI, Data Analytics & CRM
Innovative approaches with AI, Data Analytics & CRMInnovative approaches with AI, Data Analytics & CRM
Innovative approaches with AI, Data Analytics & CRMUni Systems S.M.S.A.
 
Change the Business Landscape with Voice of Customer.pdf
Change the Business Landscape with Voice of Customer.pdfChange the Business Landscape with Voice of Customer.pdf
Change the Business Landscape with Voice of Customer.pdfUni Systems S.M.S.A.
 
Change the Business Landscape with Voice of Customer
Change the Business Landscape with Voice of CustomerChange the Business Landscape with Voice of Customer
Change the Business Landscape with Voice of CustomerUni Systems S.M.S.A.
 
The Evolution in Customer Experience: Migration to Cloud for Contact Center
The Evolution in Customer Experience: Migration to Cloud for Contact CenterThe Evolution in Customer Experience: Migration to Cloud for Contact Center
The Evolution in Customer Experience: Migration to Cloud for Contact CenterUni Systems S.M.S.A.
 
The Evolution of Customer Experience
The Evolution of Customer Experience The Evolution of Customer Experience
The Evolution of Customer Experience Uni Systems S.M.S.A.
 
Using cloud native development to achieve digital transformation
Using cloud native development to achieve digital transformationUsing cloud native development to achieve digital transformation
Using cloud native development to achieve digital transformationUni Systems S.M.S.A.
 

More from Uni Systems S.M.S.A. (20)

Microsoft Power Platform.pptx
Microsoft Power Platform.pptxMicrosoft Power Platform.pptx
Microsoft Power Platform.pptx
 
Uni Systems for Power Platform.pptx
Uni Systems for Power Platform.pptxUni Systems for Power Platform.pptx
Uni Systems for Power Platform.pptx
 
D365 Demonstration CRM G Aspiotis
D365 Demonstration CRM G AspiotisD365 Demonstration CRM G Aspiotis
D365 Demonstration CRM G Aspiotis
 
AI pitch SSideri
 AI pitch SSideri  AI pitch SSideri
AI pitch SSideri
 
Microsoft Fabric Intro D Koutsanastasis
Microsoft Fabric Intro D KoutsanastasisMicrosoft Fabric Intro D Koutsanastasis
Microsoft Fabric Intro D Koutsanastasis
 
Create Unique Experiences through a CRM Approach St Kontos
Create Unique Experiences through a CRM Approach St Kontos Create Unique Experiences through a CRM Approach St Kontos
Create Unique Experiences through a CRM Approach St Kontos
 
Bridging The Gap D Karystinos
 Bridging The Gap D Karystinos Bridging The Gap D Karystinos
Bridging The Gap D Karystinos
 
Bring your data to the era of AI D. Agagiotis.pdf
Bring your data to the era of AI D. Agagiotis.pdfBring your data to the era of AI D. Agagiotis.pdf
Bring your data to the era of AI D. Agagiotis.pdf
 
How AI Transforms Businesses
How AI Transforms BusinessesHow AI Transforms Businesses
How AI Transforms Businesses
 
Innovative approaches with AI, Data Analytics & CRM
Innovative approaches with AI, Data Analytics & CRMInnovative approaches with AI, Data Analytics & CRM
Innovative approaches with AI, Data Analytics & CRM
 
Medallia VoC in action .pdf
Medallia VoC in action .pdfMedallia VoC in action .pdf
Medallia VoC in action .pdf
 
CX Powered by Uni Systems.pdf
CX Powered by Uni Systems.pdfCX Powered by Uni Systems.pdf
CX Powered by Uni Systems.pdf
 
Change the Business Landscape with Voice of Customer.pdf
Change the Business Landscape with Voice of Customer.pdfChange the Business Landscape with Voice of Customer.pdf
Change the Business Landscape with Voice of Customer.pdf
 
CX Powered by Uni Systems
CX Powered by Uni SystemsCX Powered by Uni Systems
CX Powered by Uni Systems
 
Change the Business Landscape with Voice of Customer
Change the Business Landscape with Voice of CustomerChange the Business Landscape with Voice of Customer
Change the Business Landscape with Voice of Customer
 
Medallia VoC in action
Medallia VoC in actionMedallia VoC in action
Medallia VoC in action
 
The Evolution in Customer Experience: Migration to Cloud for Contact Center
The Evolution in Customer Experience: Migration to Cloud for Contact CenterThe Evolution in Customer Experience: Migration to Cloud for Contact Center
The Evolution in Customer Experience: Migration to Cloud for Contact Center
 
The Evolution of Customer Experience
The Evolution of Customer Experience The Evolution of Customer Experience
The Evolution of Customer Experience
 
Using cloud native development to achieve digital transformation
Using cloud native development to achieve digital transformationUsing cloud native development to achieve digital transformation
Using cloud native development to achieve digital transformation
 
Microsoft: Invent with Purpose
Microsoft: Invent with PurposeMicrosoft: Invent with Purpose
Microsoft: Invent with Purpose
 

Recently uploaded

Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 

Recently uploaded (20)

Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 

The most trusted, proven enterprise-class Cloud:Closer than you think

  • 1. The most trusted, proven enterprise-class Cloud: Closer than you think Antony Cassano, ITS Department Manager
  • 2. IT needs to become smarter … get new choices • Some use the word “Cloud” to describe new consumption and delivery models • Regardless of terminology, it is clear that these new models are emerging for the enterprise – even if they were first inspired by consumer Internet services • The current security & performance requirements for enterprise cloud implementations, create new choices of cloud deployment models and types of Cloud providers, with Cloud integration, execution & operation capabilities
  • 3. What is an Enterprise Class Cloud? 3 Is it just another cloud with a marketing spin? Absolutely not! Replaces while delivering the benefits of a cloud-based approach — multi-tenant isolation, on-demand delivery, and dynamic scale An Enterprise Class Cloud, is designed to meet or exceed the security, perform ance, and business SLAs of infrastructure
  • 4. Potential Customer Profiles • Internal cost awareness • Focus on business, not IT • Modern (non legacy) business applications • Staff need application and/or desktop access BYOD, Mobility • Flexibility a priority • Interested in latest technologies • Data security a priority • Large IT staff • Multiple or custom applications • Staff/execs not interested in anywhere, any device/SaaS/cloud • Stuck to desk/old business ideas • Slow to adopt technology • Unaware of security issues • Business Non aware of actual IT Costs Today’s ideal customer Today’s challenging customer
  • 5. Support all Cloud flavors 5
  • 6. Key attributes of an Enterprise Class Cloud 6 Enterprise-Class Security Business Continuity Assured Performance SLAs Complex Network Routing Compliance Resource Pooling
  • 7. Security in the Cloud: Is it Pie in the Sky? 7 Why is cloud perceived to be insecure? What are the real security risks? What can be done to mitigate those risks?
  • 8. Data security is of the highest importance 8 ee-quarters (77%) would rather host their data in a but latent facility than in a facility that guarantees top ess secure (9%). my d ta” ranks  ngst all factors y DMs when osting provider, rformance. ecurity is of the highest ance for CA and UK DMs Factors Considered In Order of Importance (Total Sample) n-in-ten (69%) agree: willing to incur latency to  ure data sovereignty. ” 2 Eight-in-ten (81%) say: t is important to know precisely where their data is stored. “Security of my data” ranks highest amongst all factors considered by DMs when selecting a hosting provider, even over performance. “Eight-in-ten (81%) say: It is important to know precisely where their data is stored.” More than three-quarters (77%) would rather host their data in a highly secure, but latent facility than in a facility that guarantees top speeds but is less secure “44% are confused by privacy and security laws.” US Patriot Act *Survey prepared by March Communications January 2014, The Impact of the NSA on Hosting Decision Makers in the UK and Canada. “Further, despite companies’ strong reaction to the NSA scandal, many say that they don’t fully understand current data laws, with 60% admitting they don’t know as much as they should about data privacy laws.”
  • 9. Data the “crown jewels” asset 9 In addition to the intrinsic value of data to the Enterprise, there are very frequently a number of regulatory issues to be considered: • Location of data • Access to data • Ownership of data: The US, the UK, and much of the EU have divergent rules about ownership of data stored on corporate networks • Intellectual property laws: protection of intellectual property varies widely from jurisdiction to jurisdiction. • Privacy and confidentiality laws: authorities in different jurisdictions take widely different views of the degree of privacy and confidentiality.
  • 10. Questions that the Enterprise must consider 10 • Can I audit the service provider at any time, or only by prior arrangement? • Who, other than employees of my company, will have access to the data and what kind of access will it be? • How long will the recovery process take and who is responsible? • What kind of tools are available for me to audit the cloud provider‟s handling of my data? • How and when will the data be backed up? • Who is responsible for initiating the recovery process when data is lost? • Does the service provider have the certifications typical for a provider of such services (especially ISO9001 and ISO27001)? • Transparency
  • 11. Cloud provider should have ready answers 11 • Where are your data centers physically located? • Which data center(s) will be used to store my data? • Where will my backups be stored? • Will my data be replicated to a remote location? If so, where? • If my data is replicated remotely, will I be able to resume processing from there in the event of a complete data center outage? If so, in what timeframe? • What is the network architecture (a) between customers and the cloud? And (b) between cloud data centers? • Are all the data centers in the cloud owned by the provider? If not, who owns them and what else is processed in those data centers?
  • 12. 12 While there are many more questions to be asked, a cloud provider that cannot or will not share the answers to this sort of question is unlikely to be an appropriate partner for mission critical production workloads So what is Uni Systems doing to mitigate those risks? Looking forward
  • 13. Uni|Cloud : Enterprise Class Transparency Cloud 13 • Transparency • Reliability • Trusted Advisor • Strong market partnerships • Synergies • Business Development • Security/Legal/Compliance
  • 14. Uni Systems Secure Cloud Services… Built with Reliability in mind ISO 27001:2005 •Hosting Services for Information and Communication Technology (ICT) equipment and high-availability office facilities in the Company’s Data Centre •Cloud Services including Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS) •Professional Services including the design, installation, administration and technical support of ICT
  • 15. Reliability of Operations People Security Aware NDA Agreement Processes Business Continuity Mgmt Availability Management Professional Services Background checked Operational & Change Control Managed Backup Access Control Mgmt SLA Mgmt Monitoring Secure Information exchange Audit Logging Quality Assurance Data Deletion Mgmt
  • 16. Uni|Cloud : Private Compute-as-a-Service 17 Our Customers can take advantage of our hybrid cloud capabilities, blending multi-tenant cloud with private cloud and traditional management services, all in a single solution • Enterprise Performance • Availability SLA (end to end) • Industry standard technology including (Microsoft, Citrix, HP, EMC, Cisco) • Enterprise Security and Compliance • Full logical Isolation between tenants • Virtual Private Clouds with user-determined public internet connectivity • Unique customizable network & WEB application firewalls for security • VPN admin for all equipment • Role based permissions, Audit logs for environmental changes
  • 17. Uni|Cloud : Private Compute-as-a-Service 18 • Fully managed Service • Comprehensive, ongoing management of the entire private cloud • Management of the underlying Oss, Virtualization stacks, hardware • Uni Systems Data‟s management process for Cloud availability and performance • Ongoing software lifecycle management • Uni Systems multipoint root cause analysis monitoring system (systems, applications, network and the overall user experience 24x7x365 to ensure the highest possible uptime and performance
  • 18. Cloud Integration 19 • Migrating enterprise applications to the cloud starts with a comprehensive strategy, but success is only achieved through detailed planning and strong technical execution • Uni Systems provides comprehensive professional services geared to help enterprises migrate applications to the cloud • Capitalizing on numerous real world, production, enterprise deployments, we understand that cloud computing typically represents as significant an operational challenge as a technical one Define Analyse Design Develop Test Deploy Manage
  • 19. Enterprise-Cloud Focused Development 20 • Realizing the full potential of a modern cloud computing environment requires a thorough understanding of an application, from the operating system all the way up the application stack • Uni Systems„ Cloud Application Development Services team possesses deep experience • Our team has developed, customized, and deployed hundreds of applications based on various open source and proprietary MVC frameworks and Content Management Systems (CMS).
  • 20. Cloud Strategy 21 • Critical Path Questions Addressed: – What cloud strategy should I adopt to transform my environment over time? – Which applications should I put in the cloud and what benefit would I gain? – How do we migrate our applications? – What cloud solution is best for our requirements? – How can we secure and backup our data? – How can we create a Disaster Recovery strategy? – How well prepared is our organization to support cloud? – How and when should we integrate SaaS applications? – How do we monitor and manage a cloud? Uni Systems Cloud Assessment workshop
  • 21. The alternative path: Application or Platform domain selection 22 A single or a few initial domains could be “fast- tracked” through the above process, while it takes place at a more measured pace for the rest of the environment : • Identify suitable target applications or services in the current landscape, identify and address the governance and risk issues; • Build a business case • Architect the change in the business application landscape • Develop new forms of availability/continuity/ contingency management processes to handle the new delivery model; • Implement an acceptance environment • Ensure that the knowledge gained is captured for use elsewhere.
  • 22. Uni|Cloud Portfolio Uni|Apps Cloud on demand Apps Uni|Desktop Desktop as a Service Uni|On-Board Cloud on Boarding Uni|Root Monitoring as a Service Uni|Vault Backup & Business Continuity as a Service Uni|Workplace Test & Development environment as a Service Uni|DBaaS RDBMS as a Service Uni|MaaS Middleware as a Service Uni|E-Invoicing Uni|HCMaaS Human Capital Mangmt as a Service Uni|PAYaaS Payroll as a Service Uni|Cloud- IaaS Uni Systems Next Generation Hybrid Enterprise Cloud Storage –TBA Uni|Cloud- SaaS Uni|Cloud- PaaS
  • 23. Success Story #1: Uni Systems Cloud VDR Solution
  • 24. Success Story #2 : Uni|Desktop as a Service • Complete hosted experience • Any device, anywhere • Integrated apps on-demand
  • 25. DaaS: More Than Just a “Desktop” Microsoft Office & Email &Lync Anti-Virus Hosted Desktop Hosted Desktops Multi-AppSSO(Receiver) DeliverytoAnyDevice SessionPortability BusinessContinuity DataSecurity,Sovereignty High-DefUserExperience Added-Value for Hosted Apps/Desktops LoB&VerticalApps Hosted a la carte Apps Mobile Device Management Cloud Data Storage Additional Hosted Services
  • 26. 27 User ARCHIVING@CONNECT a, b & PDF E-mail receipt. Not recommended Invoice receipt via e-invoice web portal service Success Story #3: Uni|e-Invoicing
  • 27. 28 • Compliant with the Greek Legislations • Automates & Improves the invoicing procedure • Secure / Trusted transmission and receipt of invoices • It informs the sender when the recipient downloads or open the invoice • Centralized invoice management • Can be applied to all issued invoices • Reduces the traditional invoicing cost for B2B transactions - Printers Operation & Consumables - Archiving Infrastructure - Archiving / Retrieval Procedure - Preparation & Postal Services - Management Success Story #3: Uni|e-Invoicing
  • 28. Uni|Cloud success stories Customer Type of Services Major Financial Institution Disaster Site Hosting, Operations room Major Shipping Organizations VDR, BCP, Multi hop, Uni-Desktop ISP White labeling engagment Media PaaS Governmental Institution (EU) PaaS, PCaS Manufacturing VDR, Uni-Desktop More than 6 Financial Institutes PAYroll as a Service Major ISV Provider PCaaS PCI Class
  • 29. Copyright © 2014 Uni Systems www.unicloud.gr

Editor's Notes

  1. Key Attributes of an Enterprise Class Cloud when Compared to a Commodity Public CloudEnterprise-Class SecurityEnterprise Class Cloud security must meet (or exceed) existing enterprise security standards. In a cloud environment, this means additional protections must be put in place to isolate sensitive information in shared environments. Cloud Infrastructure must be designed so that only well-known users and systems have visibility. Business entities must be screened and vetted as legitimate prior to gaining access to the cloud. Assured Performance SLAsApplications require compute, storage, and network resources to process data and interact with other workloads across the corporate landscape. When resources are unavailable due to contention on a shared system, it typically has a very negative impact on the end user's experience. This is especially true of limited resources like storage I/O or network bandwidth, and usually rears its ugly head with highly transactional and mission-critical applications. Enterprise Class Clouds must ensure the application quality of service so that critical workloads are never compromised by the requirements of lower priority workloads on the same cloud. Complex Network RoutingOnce a trusted network is connected to the Enterprise Class Cloud, the client should be able to manage its networking, whether physical or virtual. Enterprise customers require extensive domain management up to, within, and across nodes of an Enterprise Class Cloud. This allows for a "virtual" extension of the trusted network all the way to the virtual machines and storage resources assigned to the client - enabling a trusted hybrid cloud. ComplianceBusiness applications are typically subject to regulations and audits, whether driven by statutory, industry, or corporate governance requirements. Resource PoolingCIOs and IT Directors typically serve many masters. They're under pressure to deliver the efficiency of shared resources and cost savings. Within an organization, business leaders have individual budgets for funding both new initiatives and ongoing activities. In order to properly account for costs and efficiency across departments, an Enterprise Class Cloud needs to be able to group and charge workloads by both functional and physical pools. Enterprises and departments should also be charged only for what they actually use - in small time slices. This should be independent of virtual machines, as budgets are set by business result, not by the allocated virtual machine. Business ContinuityCorporations are obligated to consider the implications of recovering from equipment failure or disaster. 
  2. Location of data: in many countries, financial data must physically remain at all times within the jurisdiction of the relevant regulatory authorities. • Access to data: only certain people may have access to sensitive personal and financial information, and this access must be monitored and logged such that it is auditable at all times. • Ownership of data: The US, the UK, and much of the EU have divergent rules about ownership of data stored on corporate networks. In the US, it is generally the case that the company owns all data created by its employees and stored on corporate systems, while in France, the reverse is true. Thus if a French company stores employee emails on a server in the US, and is subsequently subpoena’d by the authoritiestoprovideaccesstothatdata,itisguiltyofanoffenceinFranceifitreleasesthedata,and guilty of an offence in the US if it does not. • Intellectual property laws: protection of intellectual property varies widely from jurisdiction to jurisdiction. A company accustomed to operating within the IP framework of the EU who stored sensitive information about new products on servers in certain Asian or African countries might have little recourse when it found imitations of those products being locally produced as soon as the original product was launched. • Privacy and confidentiality laws: as the recent spate of regulatory actions against the makers of a popular business smartphone has shown, authorities in different jurisdictions take widely different views of the degree of privacy and confidentiality that an enterprise can assume when its data is in transit 3 .
  3. Given the range and complexity of the data-related concerns outlined in the previous section, it is evident that the number one concern of any enterprise migrating to the cloud should be the location of its data. But knowing where the data is physically stored is only the first step in ensuring that it is secure. There are a number of other questions that the Enterprise must consider before storing data in the cloud: • How and when will the data be backed up? • Who is responsible for initiating the recovery process when data is lost? • How long will the recovery process take? • Who, other than employees of my company, will have access to the data and what kind of access will it be? • What kind of tools are available for me to audit the cloud provider’s handling of my data? • Can I audit the service provider at any time, or only by prior arrangement? Does the service provider have the certifications typical for a provider of such services (especially ISO9001 and ISO27001)? • Does the service provider have industry-specific certifications relevant to my industry (e.g. FISMA in the US, or NHS N3 in the UK)?
  4. Physically separate each customer’s data onto separate physical disks, even if using virtual storage solutions Provide as a service all Security elements to securely logical separate VDC’s of our customers.Provides Secure remote access and one time password access to SystemsEnd to End Encryption to to selective Workloads or subsystemsOnly store that data in data centers known to and approved by the customer for that data Manage the back-up and/or replication of that data in a predictable manner, as set out in either published terms and conditions or a bespoke SLA Provide an advisory service as an integral part of the onboarding process to ensure that the customer’s security requirements are fully understood and reflected in the migration process and the deployment architecture Provide full audit capability at all times so that the customer can ensure compliance with the terms and conditions or the bespoke SLA.
  5. Physically separate each customer’s data onto separate physical disks, even if using virtual storage solutions Provide as a service all Security elements to securely logical separate VDC’s of our customers.Provides Secure remote access and one time password access to SystemsEnd to End Encryption to to selective Workloads or subsystemsOnly store that data in data centers known to and approved by the customer for that data Manage the back-up and/or replication of that data in a predictable manner, as set out in either published terms and conditions or a bespoke SLA Provide an advisory service as an integral part of the onboarding process to ensure that the customer’s security requirements are fully understood and reflected in the migration process and the deployment architecture Provide full audit capability at all times so that the customer can ensure compliance with the terms and conditions or the bespoke SLA.
  6. Unisystems offers a full complement of cloud strategy and professional services. Through these professional service offerings, we partner with your organization to provide expertise in selecting a cloud strategy, accelerate cloud adoption, simplify migration and design business-grade cloud architectures.
  7. An alternative path: application domain selection As per the previous description of determining and deploying pilot applications to go to cloud, that approach can actually take place in parallel. A single or a few initial domains could be “fast- tracked” through the above process, while it takes place at a more measured pace for the rest of the environment Here the process would include: identify suitable target applications or services in the current landscape, including their need- ed interfaces;identify and address the governance and risk issues; build a business case;build a new service level management (SLM) capability to handle the new delivery model; architect the change in the business applica- tion landscape;develop new forms of availability/continuity/ contingency management processes to han- dle the new delivery model; implement an acceptance environment in the cloud context, to test usability;migrate the live environment, possibly per group of users; ensure that the knowledge gained is captured for use elsewhere.
  8. Service providers (Citrix Service Provider’s) can easily deliver the power of hosted enterprise desktops and applications from the cloud to SMBs, offering them the services they want in a simple, pay-as-you-go model. Cloud-hosted Desktops-as-a-Service (DaaS) is a tremendous opportunity for service providers to expand beyond traditional service offerings—email, web portals, etc.—to a more comprehensive bundle built around the desktop that includes apps, data protection, IT services and business continuity. With DaaS, SMBs enjoy the same any device, anywhere freedom; high-definition computing experience and workshifting lifestyles available in the enterprise.Top benefits: Expand your business with a hosted virtual desktop, complete with office productivity and line of business appsWindows 7 experience with XenApp Hosted Shared Desktop scalability and cost ENTEPRISE-PROVEN INFASTRUCTURE delivers scalability, security and controlSIMPLE, AUTOMATED MANAGEMENT lowers administration costs and increases marginsHigh-definition, virtual computing for the best user experience on any device, anywhere
  9. Desktop-as-a-Service (DaaS) is a complete hosted IT solution, available as a cloud service.Citrix Service Providers deliver DaaSas a comprehensive bundle of hosted desktops, apps, data and IT services. Before you think that “DaaS” is just a desktop, consider (a) It doesn’t JUST have to be a desktop(click) It can be about hosting apps separate from – or in addition to – a desktop(click) It can include added value services beyond what traditional physical desktops provide(click) It can include other added services such as data and Mobile Device Management
  10. Why switch from traditional IT to the cloud?There are many reasons why organisations of all sizes and types are adopting this model of IT. It provides a way to increase capacity or add capabilities on the fly without investing in new infrastructure, training new personnel, or licensing new software. Ultimately, it can save companies a considerable amount of money...Removal / reduction of capital expenditureCustomers can avoid spending large amounts of capital on purchasing and installing their IT infrastructure or applications by moving to the cloud model. Capital expenditure on IT reduces available working capital for other critical operations and business investments. Cloud computing offers a simple operational expense that is easier to budget for month-by-month, and prevents money being wasted on depreciating assets. Additionally, customers do not need to pay for excess resource capacity in-house to meet fluctuating demand.Reduced administration costsIT solutions can be deployed extremely quickly and managed, maintained, patched and upgraded remotely by your service provider. Technical support is provided round the clock by reputable providers like Unisystems for no extra charge, reducing the burden on IT staff. This means that they are free to focus on business-critical tasks, and businesses can avoid incurring additional manpower and training costs. IT giant IBM has pointed out that cloud computing allows organisations to streamline procurement processes, and eliminates the need to duplicate certain computer administrative skills related to setup, configuration, and support.Improved resource utilizationCombining resources into large clouds reduces costs and maximisesutilisation by delivering resources only when they are needed. Businesses needn’t worry about over-provisioning for a service whose use does not meet their predictions, or under-provisioning for one that becomes unexpectedly popular. Moving more and more applications, infrastructure, and even support into the cloud can free up precious time, effort and budgets to concentrate on the real job of exploiting technology to improve the mission of the company. It really comes down to making better use of your time – focusing on your business and allowing cloud providers to manage the resources to get you to where you need to go. Sharing computing power among multiple tenants can improve utilisation rates, as servers are not left idle, which can reduce costs significantly while increasing the speed of application development. A side effect of this approach is that computer capacity rises dramatically, as customers do not have to engineer for peak loads.Economies of scaleCloud computing customers can benefit from the economies of scale enjoyed by providers, who typically use very large-scale data centres operating at much higher efficiency levels, and multi-tenant architecture to share resources between many different customers. This model of IT provision allows them to pass on savings to their customers.Scalability on demandScalability and flexibility are highly valuable advantages offered by cloud computing, allowing customers to react quickly to changing IT needs, adding or subtracting capacity and users as and when required and responding to real rather than projected requirements. Even better, because cloud-computing follows a utility model in which service costs are based on actual consumption, you only pay for what you use. Customers benefit from greater elasticity of resources, without paying a premium for large scale.Quick and easy implementationWithout the need to purchase hardware, software licences or implementation services, a company can get its cloud-computing arrangement off the ground in minutes.Helps smaller businesses competeHistorically, there has been a huge disparity between the IT resources available to small businesses and to enterprises. Cloud computing has made it possible for smaller companies to compete on an even playing field with much bigger competitors. ‘Renting’ IT services instead of investing in hardware and software makes them much more affordable, and means that capital can instead be used for other vital projects. Providers like Unisystems take enterprise technology and offer SMBs services that would otherwise cost hundreds of thousands of pounds for a low monthly fee.Quality of serviceYour selected vendor should offer 24/7 customer support and an immediate response to emergency situations.Guaranteed uptime, SLAs.Always ask a prospective provider about reliability and guaranteed service levels – ensure your applications and/or services are always online and accessible.Anywhere AccessCloud-based IT services let you access your applications and data securely from any location via an internet connection. It’s easier to collaborate too; with both the application and the data stored in the cloud, multiple users can work together on the same project, share calendars and contacts etc. It has been pointed out that if your internet connection fails, you will not be able to access your data. However, due to the ‘anywhere access’ nature of the cloud, users can simply connect from a different location – so if your office connection fails and you have no redundancy, you can access your data from home or the nearest Wi-Fi enabled point. Because of this, flexible / remote working is easily enabled, allowing you to cut overheads, meet new working regulations and keep your staff happy!Technical SupportA good cloud computing provider will offer round the clock technical support. Unisystems customers, for instance, are assigned one of our support pods, and all subsequent contact is then handled by the same small group of skilled engineers, who are available 24/7. This type of support model allows a provider to build a better understanding of your business requirements, effectively becoming an extension of your team.Disaster recovery / backupRecent research has indicated that around 90% of businesses do not have adequate disaster recovery or business continuity plans, leaving them vulnerable to any disruptions that might occur. Providers like Unisystems can provide an array of disaster recovery services, from cloud backup (allowing you to store important files from your desktop or office network within their data centres) to having ready-to-go desktops and services in case your business is hit by problems. Hosted Desktops (or Hosted VDI) from Unisystems, for example, mean you don’t have to worry about worry about data backup or disaster recovery, as this is taken care of as part of the service. Files are stored twice at different remote locations to ensure that there's always a copy available 24 hours a day, 7 days per week.