Upload
christopher-peters
View
221
Download
0
Tags:
Embed Size (px)
Citation preview
Phil Van Etten
CEO,
GOING TO THE CLOUD
INTRODUCTION Former CEO, President of Sygate and Azaleos
currently CEO of Netmail - Netmail cloud
Cloud Adaption Huge
65% Of American Companies Have Multiple Clouds88% Will Increase Cloud Usage66% Still cite security concerns as a blocker to cloud adoption (IDG)
The Rapid Adoption By Amazon Cloud Services From
Book Seller To $10 Billion Cloud Service Company
Session Goals and Objectives
1.Assess the risk of adoption cloud service;
2.Compare different cloud provider offerings;
3.Obtain assurance from selected cloud providers;
4.Reduce the assurance burden on cloud providers;
Is the cloud right for you?• Analyzed the cost savings
• Is your application ready for the cloud
• Security
• Data sovereignty
• The right vendor(s)
• Scalability/Lock-in
• Contract execution
Considerations for cloud deployment • Selection of cloud provider. Requirements, reputation, cost.
• Determination for managed service provider.
• Nature and sensitivity of data (data sovereignty).
• SLA, Responsibility Matrix, Response Time, Specific Application Matrix
• Security
• Time of deployment
THE TECHNOLOGY WORLD IS DIVIDED INTO TWO
WORLDS
ON – Premise Applications
OFF – Premise Applications
Future: How To Connect The Two Worlds
Public CloudVersus
Private Cloud
Cost/Cloud Economics Versus Data Risk
A TALE OF TWO CLOUDS
Plan
User
DataSecurity
Considerations for planning a move to the cloud
• About managing the people.
• Show that you are going to a better place!!…
• Show that management is behind it.
• Make it a movement.
• Set expectations.
USERS
Plan Your Cloud Adoption
• What Applications • Big Bang Approach | Migration of
Data• Calendar The Event • Economics• Back-up Plan• Data Protection
Single MigrationLess Disruption to users / Lower Migration Costs
Cost Reduction
Evaluate your Infrastructure
AD
Am I structured
properly?
If its built or configured wrong it will surely fail
Plan your Device Strategy
• Security And Bandwidth
Plan for Operations Afterwards
The Responsibilities Shift From Managing An It Environment To Managing a Vendor
Clean-up Before You Go
Old users, inactive users, resources, object naming, proxy
access/delegates.
Potential Security Exposure
Data Movement StrategiesDATA
Its all About The Data
SECURITY• Gateway security/Authentication and access • Cloud security/Malicious insider
• How vulnerable Are You?
• Loss of governance
• Data protection/Incomplete data deletion
3rd Party Assessments Work