best moves to surf a virtual future max peterson waves of the future nasa it summit 2011

Post on 21-Dec-2015

214 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Best moves to surf a virtual future

Max PetersonWaves of the futureNASA IT Summit 2011

2 Confidential

$440B2011 IT spending in

emerging markets - an increase of 10.4% over 2010

35 ZBBy 2020, the Digital Universe will be 44 times as big as it was in 2009

3B

People will connect electronically via mobile or Internet technology by 2014

$42BWorldwide spendingon Cloud Servicesby 2012

7B

The confluence of connected devices, predicted to be reached by 2017s

Welcome to the Virtual Era

Drivers of transformation for the Virtual Era

2010sVIRTUAL ERA

Virtualization

Consolidation + Abstraction

Unprecedented Data Growth

Manage, optimize, and monetize data

Cloud

Step-function increases in efficiencyand flexibility.

Convergence

From network through systems management

Mobility

Billions of end-points

3

4

Navigating the Virtual Era to help NASA meet the needs of

today andtomorrow

Architecting IT for the Mission

5

1.Information over process

2.IT embedded in business services

3.Externalized service delivery

4.Greater business partner responsibility

5.Diminished standalone IT role

6

Cloud

A Few Hyperscale CloudsCarr “Big Switch” Theory

Many Smaller Clouds“ SaaS Builders” & Corporate CloudsWhite Labels on Hyperscale Clouds

Clo

ud S

ize

Evolution of the cloud ecosystem

Number of Clouds Servicing Demand10’s 1000’s

S

L

7

Platform as a Service

Application Components as a Service

How IT will evolve towards ITaaSReal TimeInfrastructure

IntelligentCapacity

OptimizeSeparate Consolidate Contain

Data CenterAutomation

Server Consolidation

Test and Development

Computing Clouds

Leading Edge Today

Abstraction

Virtual Infrastructure

ManagementMonitoringCompliance

Orchestration(internal)Choreography(external)

Self-Service

On-DemandScalability

Policy-BasedWorkloads

Federation

Abstraction

Virtual Infrastructure

ManagementMonitoringCompliance

Orchestration(internal)

Self-Service

Abstraction

Virtual Infrastructure

ManagementMonitoringCompliance

Abstraction

Virtual Infrastructure

Abstraction

Private Cloud Model

8

Key innovations and trends are enabling solutions

9

IT

Transforming how they build, manage

& deliver

DEVELOPERS

Transforming how they consume IT

END USERS

Transforming how they use IT services

Increased Mobility Multi-Device Virtualization Convergence

Flexible Sourcing

Platform Oriented

Programming

Web-Based Applications

New App Frameworks

and Platforms

Web-based App Delivery Self-Service Self-Service

SaaSClient

Virtualization

Mobile Device Mgmt

Mobile Applications

Server Virtualization

Private Cloud (IaaS)

Public Cloud Services (IaaS)

Private Cloud (PaaS)

Public Cloud Services (PaaS)

Key trends enabling and/or driving the transformation

Current Market Embodiments of Cloud

10

Fluid Data(Credit: NOAA/GFDL)

11

Organizations are frustrated with the rigid boundaries of their existing storage systems.

Data has gone from super scarce to super abundant

…is Fluid Data.

The right data in the right place at the right time at the right cost

12

Storage pain points

Data growth is out of control, waste capacity with inefficient utilization

80% of data is inactive

$

$$

$$$

System complex and inflexible to manage

Data recovery is difficult, slow

12:1512:00

11:45

Replication is costly, unreliable

Forklift upgrades, risk of technology obsolescence

13

Strategic storage visionSeamless, automated, optimized data movement across the infrastructure

CloudRemoteoffsite

storage

Object-based

archiveBackupto tape

Backupto disk

Appservers

Primarystorage

ONSITE

NETWORK

14

Getting started today with a Fluid Data Architecture

Storage consolidation and virtualizationTiering, dedupe, automate, data movement

Application optimizationPreserve

Data protectionSecurity, classify, archive, preserve/maintain, automate

Disaster recoverySearch, restore, preserve, protect

Data retention and governanceArchive, classify, search, protect, preserve/maintain, security

15

1616

Consumerization of IT

Consumerization of IT isinevitable…

Greater worker choiceMore mobility

More devices with fewer restrictionsEnablement of new applications

Blending of work and personal devicesCultural enablement through technology

enablement

Rise of social media and newtech-focused

business models

Blurring of work

and home

The emergence

of new mobile devices

Changing employee

expectations of IT

17

…in today’s changing workplace

1. Source: Gartner, http://www.itbusinessedge.com/cm/blogs/all/no-surprise-google-at-forefront-of-consumerization-of-it/?cs=113732. Source: IDC, Impact of the Dramatic Increase in Devices on the Cost to Support, January 2009 3. Source: Gartner: Predicts 2010: PC End-User Issues, December 4, 20094. Source: Facebook, http://www.facebook.com/press/info.php?statistics5. Source: Unisys, Unisys Consumerization of IT Benchmark Study, 2010

Technology Workforce#1Consumerization of IT will make the

biggest impact on enterprise IT in thenext decade (Gartner 1)

Active users on Facebook. If it were a country, it would be 3rd largest in the

world (Facebook and world population data 4)

610M+

Percentage growth in the numberof devices IT is expected to support

by 2012 (IDC 2)

66% Workers that ranked technology

tools provided as critical in choosingan employer(Unisys 5 )

>50%

Percentage of enterprise PC configurations that will use at least one desktop virtualization technology by the

end of 2012 (Gartner 3)

60% Number of workers using smartphones

for work between 2009 & 2014(IDC via Unisys 5)

2x

Percentage of enterprises still running Windows XP71.7%

18

The power to do more

Analysis

Security

Back-End

BYOD

What’s behind the device is what’s important

19

Enterprise-class security

Enterprise-class management

Cross-platform app automation

=

Security20

Who wants to guess the date of the first publicly disclosed

hypervisor exploit?

21

What do you worry about?

COO“We need a better flow of security information into our development

cycles”

VP or Director of IT

“We need to comply with the PCI DSS

6.6 application security requirement”

CSO, CISO“I need visibility into my network so I can sleep better at night and fast response in the event of attack”

CIO“I need to effectively manage application risk with the same headcount”

22

23

Recommendations

Assess security

of cloud services providers

Assess security of any 3rd party virtual appliance images

Impact of a violation

at various layers / in various components

security trade-offs

between Public, Private and Hybrid cloud service delivery

modelsManage cloud

provider’s network access controls

Investigate new cloud-based security

solutions

Monitor Logs from cloud deployments

Trade-off of direct operational control vs. need to increase visibility and transparency

Proactively address securityThe most effective security services requires a strong combination of the right technology, people and processes.

Focus on the core threats not the noise

• Use advanced correlation in real time, to eliminate false alarms• Get filtered, prioritized, and customized threat and vulnerability

information with actionable remediation guidance• Utilize un-metered, un-tiered access to certified security

professionals that resolve issues on the first call 80% of the time

Security is more than just

compliance

• Focus on being secure, and compliance will follow• Use a security services foundation with compliance expertise for

assessment, gap analysis, remediation and reporting

Security must be

more expert & 24/7/365

• Processes 13B security events and 30k malware instances every day

• Apply knowledge from elite security researchers and global real-time visibility across thousands of client networks

• Use malware analysis and reverse engineering to develop countermeasures to active and potential threats

24

25

Surfing the Virtual Era

Not about what IT can do it’s about how you

accomplish your mission

26

Q&A:Thank you foryour time

top related