Phil Van Etten CEO, GOING TO THE CLOUD. INTRODUCTION Former CEO, President of Sygate and Azaleos...

Preview:

Citation preview

Phil Van Etten

CEO,

GOING TO THE CLOUD

INTRODUCTION Former CEO, President of Sygate and Azaleos

currently CEO of Netmail - Netmail cloud

Cloud Adaption Huge

65% Of American Companies Have Multiple Clouds88% Will Increase Cloud Usage66% Still cite security concerns as a blocker to cloud adoption (IDG)

The Rapid Adoption By Amazon Cloud Services From

Book Seller To $10 Billion Cloud Service Company

Session Goals and Objectives

1.Assess the risk of adoption cloud service;

2.Compare different cloud provider offerings;

3.Obtain assurance from selected cloud providers;

4.Reduce the assurance burden on cloud providers;

Is the cloud right for you?• Analyzed the cost savings

• Is your application ready for the cloud

• Security

• Data sovereignty

• The right vendor(s)

• Scalability/Lock-in

• Contract execution

Considerations for cloud deployment • Selection of cloud provider. Requirements, reputation, cost.

• Determination for managed service provider.

• Nature and sensitivity of data (data sovereignty).

• SLA, Responsibility Matrix, Response Time, Specific Application Matrix

• Security

• Time of deployment

THE TECHNOLOGY WORLD IS DIVIDED INTO TWO

WORLDS

ON – Premise Applications

OFF – Premise Applications

Future: How To Connect The Two Worlds

Public CloudVersus

Private Cloud

Cost/Cloud Economics Versus Data Risk

A TALE OF TWO CLOUDS

Plan

User

DataSecurity

Considerations for planning a move to the cloud

• About managing the people.

• Show that you are going to a better place!!…

• Show that management is behind it.

• Make it a movement.

• Set expectations.

USERS

Plan Your Cloud Adoption

• What Applications • Big Bang Approach | Migration of

Data• Calendar The Event • Economics• Back-up Plan• Data Protection

Single MigrationLess Disruption to users / Lower Migration Costs

Cost Reduction

Evaluate your Infrastructure

AD

Am I structured

properly?

If its built or configured wrong it will surely fail

Plan your Device Strategy

• Security And Bandwidth

Plan for Operations Afterwards

The Responsibilities Shift From Managing An It Environment To Managing a Vendor

Clean-up Before You Go

Old users, inactive users, resources, object naming, proxy

access/delegates.

Potential Security Exposure

Data Movement StrategiesDATA

Its all About The Data

SECURITY• Gateway security/Authentication and access • Cloud security/Malicious insider

• How vulnerable Are You?

• Loss of governance

• Data protection/Incomplete data deletion

3rd Party Assessments Work

Recommended