aiim cloud webinar - emc corporation
Post on 24-Jan-2015
511 Views
Preview:
DESCRIPTION
TRANSCRIPT
In association with: Presented by:
Your Journey into the Cloud: Optimize your
Mission Critical Systems
Presented June 6, 2012
In association with: Presented by:
About AIIM
AIIM is the Global Community of Information Professionals
We provide the education, research, and certification that
information professionals need to manage and share
information assets in an era of mobile, social, cloud, and big data.
Learn more about AIIM at www.aiim.org
In association with: Presented by:
About AIIM
www.aiim.org/research
Research/Industry watch
www.aiim.org/training www.aiim.org/membersonly
Check out your professional member benefits
Visit AIIM’s video library at
www.aiim.org/videos
With more than 100 snapshots on all things Information Management
Secure Your Success
Demonstrate your ability to address and manage today’s information challenges
www.aiim.org/certification
Become a
In association with: Presented by:
Follow AIIM on
AIIM Community – @aiimcommunity
John Mancini – @jmancini77
Atle Skjekkeland – @skjekkeland
Laurence Hart – @piewords
Peggy Winton – @pwwinton
Bryant Duhon – @bduhon
Jesse Wilkins – @jessewilkins
Nick Inglis – @nickinglis
Theresa Resek – @tmresek
Beth Mayhew – @bethmayhew
Thedra White – @thedrawhite
#aiim
#aiimwebinar
#infomgmt
#ecm
In association with: Presented by:
AIIM Presents:
Host: Theresa Resek – Director, AIIM Webinars
Shadrach White – Founder, cloudPWR
Andrea Leggett – Global Product Marketing, EMC OnDemand, IIG
Your Journey into the Cloud: Optimize your Mission Critical Systems
In association with: Presented by:
APPLICATIONS
PLATFORM
INFRASTRUCTURE
Many Choices…
In association with: Presented by:
HYBRIDPRIVATE
DEPLOYMENT
PUBLIC
APPLICATIONS
PLATFORMS
INFRASTRUCTURE
The Cloud Demystified
In association with: Presented by:
ECM in the Cloud
Return on Investment DR | Reliability | Scalability | Mobility
Management Overhead Patch | Security | Version
Complexity UI | Dashboard | Integration
In association with: Presented by:
Physical Data Center 7x24x365
System Monitoring
Change Control
Governance
Security
In association with: Presented by:
Personal Identifiable InformationFERPA, HIPAA, PTI, FISMA, PIP
Data ControlWhere is the Data?Who Has Access?Single Tenant v. Multi-TenantAuditing & Tracking
Data Privacy
In association with: Presented by:
Legacy Applications v. Web Services
How much data is being transmitted
What kind of data?
Data Encryption
Integration
In association with: Presented by:
OLD WAY
MONTHS
Weeks Task
5 Acquire hardware 2 Rack and cable hardware2 Install operating systems1 Install DBs1 Install application servers1 Install batch scheduler1 Install DEV servers3 Record and test desktop installation1 Push install desktop products to
locked- down desktops1 Install TEST servers2 Install PROD servers2 Configure backup, monitoring3 Test PROD fault tolerance, backup, monitoring
HOURS
Minutes Task15 Log in, review, and approve work order60 Monitor provisioning progress15 Sanity test provisioned environment30 Configure secure network to customer site
NEW WAY
Traditional | Cloud
In association with: Presented by:
CENTRALIZED DISTRIBUTED Scanning Workstation
Image Processing
File Caching
Scheduled Batch Processing
Full Page | Thumbnails
Upload RealTime – High Bandwidth Scheduled – Low Bandwidth Metering with checksum
Multi-function devices
Digital Snapshots
Desktop Scanning
Print to PDF
File Browsing
Capture
In association with: Presented by:
Migration v. Bridge
On Premise Apps
Cloud 2 Cloud
Security Models - SAML
Hybrid Connections
In association with: Presented by:
SharingCollaborationMobilitySocial
ManagingCheck in/outVersion ControlRecords
Management
Sharing | Managing
In association with: Presented by:
LEGACY CLOUD M/F Accounting
Email Collaboration
DC Infrastructure
CAPEX
Driving Change: Mobile BYOD SaaS App Sprawl Social Business
SalesForce, WorkDay, Intuit
GoogleApps, Box
App Driven Solutions
OPEX
Adapting Quickly: Web Services – Oauth |SAML Freemium Trials Born Social
Old School | New School
In association with: Presented by:
Private
Application Storage
OS | Security
Database
Private
Application
Database
OS | Security
Storage
Network
Application Storage
OS | Security
Database
Private
Application Storage
OS | Security
Database
Private
Physical Infrastructure
Public
In association with: Presented by:
Content Value for Cloud Offerings
Individual Organization
Value
Low
High
Access
Minimal ECM Functionality
Basic ECM Functionality
Full ECM Functionality
Source: “Can Google Solve Your ECM Problems?” Forrester Research, Inc., July 28, 2011
Casual
Controlled
Regulated
Governance
In association with: Presented by:
Enterprise Sync, Share & Collaboration in the Cloud
• Business Requirements Seamless File and Folder Sync File Sharing and Collaboration Enterprise Mobile Access
IT Requirements Administrator Control Enterprise Security and Reliability Easy Deployment and End-User Support
In association with: Presented by:
Full Enterprise Content Management
• Business Requirements Information Governance Controls (e.g. Records Management) Content Lifecycle Management Business Process Management Critical Mobile Access
• IT Requirements Same As Above Plus… Seamless Integration to ERP On-Premise System System Auditability Performance
In association with: Presented by: 22
ITLIMITATIONS
USERDEMANDS
HARDWARE COSTLY AND CUMBERSOME
CONTROL CONTENT
RISK ADVERSITYSLOWS PRODUCTIVITY
ANYWHERE, ANYTIME, ANY DEVICE
ONLINE AND OFFLINE
DATA CONVERGENCE
In association with: Presented by:
AccelerateApplication
Deployment Time
AchieveFlexible Computing
Capacity
ReduceOperationalOverhead
IN THE CLOUDGETTING IT RIGHT
In association with: Presented by:
Case Study
• Solution - Invoice processing
• We are ‘Accountants’
• Managing performance, not servers
• Tighter SLA than we could put in place with our internal IT group
• ‘Bought licenses?’
In association with: Presented by:
10 Critical Questions to Ask Your Cloud Provider
1. What is your data encryption philosophy and how, specifically, do you encrypt data?
2. How do you manage the encryption keys?
3. What certifications for data protection have you attained?
4. How much data replication is enough, and what level of data durability do you provide?
5. How much control do I retain over my data?
6. How do you ensure client (endpoint) security?
7. Can I leverage existing credentials and password policies and disable access immediately?
8. How do you isolate and safeguard my data from that of other clients?
9. How is activity in my account monitored and documented?
10. Can you continue to provide protection as my workloads evolve?
In association with: Presented by:
Next Steps1. Contact Us:
www.emc.com/ondemand2. Need Help Understanding Your
Potential TCO?3. See how Lahey Clinic
leverages EMC OnDemand for Patient Records
4. Talk to a Cloud broker
In association with: Presented by:
Shadrach White
www.cloudPWR.com
@shadrachwhite
Thank You
In association with: Presented by:
This survey will open in a new window. (or click here)
Tell us how we did today, and offer suggestions for topics of future events.
Survey
In association with: Presented by:
Upcoming Webinars
June 13thBig Data, Big Hype: Why the Business Should Care
June 21stResponding to and Capitalizing on the Latest Trends in Data Capture
Register Today at www.aiim.org/webinars
Or check out our Webinar Archive at www.aiim.org/WebinarArchive
top related