Upload
david-strom
View
491
Download
1
Embed Size (px)
Citation preview
How to make the move to the hybrid cloud
David StromTechtarget/Dimension Data event
February 2016
2
My background
• Contributor to SearchSecurity since 2000
• Former Editor-in-Chief at Network Computing, Tom’s Hardware.com
• Toiled in end-user computing since the 1980s
• Written two computer network technology books, thousands of articles
3
Agenda
• The different ways IT shops are moving to the cloud
• The evolution of the enterprise application• 4 key decision points to ponder• Misperceptions and the security blame game• Case studies• Key takeaways, suggestions and lessons
learned
4
The evolution of the cloud
5
Yesterday’s on-premises data center
6
Initial server virtualization
7
Moving your apps to the public cloud
8
9
Building hybrid clouds
10
Managed or colocated facilities
11
4 key infrastructure choices
12
1. Can your current internal apps be converted into something with a Web front end?
13
2. Can your business logic be hosted elsewhere and scale?
14
3. Can you provide security as a service layer for your apps?
15
4. Can you virtualize each of your servers without losing performance, security and reliability?
16
The evolution of the enterprise app
17
File sharing in the cloud
18
19
20
4 key decision points in moving to the hybrid cloud
21
1. What is your response time for issue resolution and other internal support needs?
22
2. Can you calculate your app-level return on investment?
23
24
3. What is your end-to-end app latency?
• Endpoints aren't fixed like they are for most on-premise situations
• The cloud infrastructure may not be optimally connected to your own
25
Latency (more)
• Applications are becoming more virtualized • Users are becoming more distributed too • IT may not be completely aware of the
ultimate end users and application owners
26
4. What is the frequency of overall infrastructure outages?
27
Consider these three issues
• How your servers are configured, • What kinds of monitoring tools you are using
to ensure that they aren’t breeched, • Whether your applications have built-in
security or not
28
Cloud misperceptions
• The cloud isn’t as secure as on-premises servers
• Data can easily be stolen from clouds, so personal info shouldn’t reside there
29
30
Things you can’t blame on the cloud
• Insecure Web applications• Lax network intrusion detection and
monitoring • Bad password policies
31
Case studies
• Engagency.com• American Red Cross• CrazyforEducation.com• Missouri Delta Dental• Unisys and ING• Beth Israel Medical Center• MotleyFool.com• Boeing’s cloud evaluation matrix
32
Engagency.com: scaling up
33
34
CrazyForEducation.com: incremental cloud
35
Missouri Delta Dental: encryption management
36
Unisys and ING: Data center consolidation
37
Beth Israel: The accidental cloud
38
Motley Fool: Provisioning issues
39
40
Takeaways
• It is all about speed of app delivery• The rate of evolution varies tremendously for each
business, and for departments within each business• There is no single monolithic app• There is also no single cloud situation
41
More takeaways
• Mobile devices have become the defacto computing endpoint
• IT staffs will have to evolve and become more collaborative
• Everything becomes browser-based, even mainframe apps • Availability and disaster recovery needs to be baked into
everything• Self-service portals become more important
42
Changing nature of today’s IT world
43
44
45
46
It is all about the apps
47
48
Solutions
• Use a cloud mgmt platform• Tighten access controls• Find and eliminate link redundancies• Secure your web apps – all of them!• Use stronger authentications
49
1. Employ a cloud management platform
50
2. Understand your access controls to all cloud-based resources
51
3. Test your cloud infrastructure continually
52
4. Make your Web-based applications more secure
53
54
Exploits haven’t changed much over the years!
55
“Blind” SQL Injection!
56
5. Use stronger authentication
57
The reality
Cloud environments can be more or less secure:• How they are configured• Who has access to them• What kinds of encryption methods are used to
protect their data and • The sensitivity of the data itself
58
Wrapping up
Thanks for listening to our seminar, and do share your own experiences about your own hybrid cloud migration strategies.Presentation slides available:• http://slideshare.net/davidstromFeel free to contact me at:• [email protected] • http://strominator.com • @dstrom on Twitter