security in the cloud
DESCRIPTION
Presentation of Red Hat about security in the cloud at Zarafa SummerCamp 2011TRANSCRIPT
ZARAFA SUMMERCAMP 2011 | SECURITY IN THE CLOUD1
RED HAT: Security In The Cloud
Robert Loos
ISV Business Development Manager
Patrick van der Bleek
Solution Architect
ZARAFA SUMMERCAMP 2011 | SECURITY IN THE CLOUD2
THE GROWING NEED FOR THE CLOUD
67% of IT budgets slashed in 2009
85% of computing capacity is idle
70% of IT budget spent maintaining legacy infrastructure, not delivering new capabilities
50% of CIOs say they're understaffed
46% of IT execs say meeting SLAs “more or much more” difficult and costly
14% annual decline in IT execs who say they are becoming “more strategic” to their organization
Data from Industry sources
I.T. infrastructure is at a breaking point
ZARAFA SUMMERCAMP 2011 | SECURITY IN THE CLOUD3
PHASE 1: CONSOLIDATE
VIRTUALIZEYOURSERVERS
Virtualize your physical hardware to achieve higher utilization, consolidation, and flexibility. Virtualization increases the utilization of physical servers and provides a foundation for cloud computing.
PHASE 2: AUTOMATE
BUILD A PRIVATE CLOUD
As you expand your use of virtualization, build a private cloud to manage the scale and complexity.
A private cloud abstracts multiple instances of virtual resources into elastic pools of computation with self-provisioning and scalable services.
PHASE 3: UTILITY
ADD APUBLIC CLOUDAs you expand your use of cloud computing, add public cloud providers delivered as a utility to increase capacity and lower costs.
Red Hat's cloud architecture lets you manage and integrate various virtualization systems and public cloud providers together. This allows you to leverage public cloud computing as a utility.
ZARAFA SUMMERCAMP 2011 | SECURITY IN THE CLOUD4
ZARAFA SUMMERCAMP 2011 | SECURITY IN THE CLOUD5
“Our decade-long partnership with Red Hat has always been focused on customer value and innovation. Today, we are extending this partnership to include cloud computing – broadening our reach and answering the strong customer demand for cloud computing services, Red Hat Enterprise Virtualization is an optimal hypervisor technology for the infrastructure offerings on the IBM cloud.”
- Maria Azua, VP Cloud Computing Enablement at IBM
RED HAT CLOUD CUSTOMERS
ZARAFA SUMMERCAMP 2011 | SECURITY IN THE CLOUD6
“Red Hat Enterprise Virtualization provides the high availability, reliability, security and scalability that we desired for the foundation of our new cloud offering. We believe that Red Hat Enterprise Virtualization is the efficient virtualization technology to run the workloads that our enterprise customers will deploy on our cloud service today.”
- Masato Minamisawa, executive manager of IP Technology Department, Business Network Services Division
at NTT Communications
RED HAT CLOUD CUSTOMERS
ZARAFA SUMMERCAMP 2011 | SECURITY IN THE CLOUD7
“Red Hat gets it. In kernel virtualization, virtualization management, the application orchestration and cloud abstraction layers, Red Hat gets it. Red Hat is giving customers the opportunity to innovate [in different ways] and leverage them where it makes sense.”
- Derek Chan, Digital Operations, DreamWorks
“At DreamWorks Animation, cutting-edge technology is a key enabler to our creative ambition. Red Hat’s Cloud Foundations provides a compelling platform to enable our cloud strategy giving us the ability to quickly scale our compute needs to meet the demands of our productions."
— Ed Leonard, DreamWorks Animation’s CTO
RED HAT CLOUD CUSTOMERS
ZARAFA SUMMERCAMP 2011 | SECURITY IN THE CLOUD8
By deploying Red Hat Enterprise Linux in their cloud environment, the Symbian Foundation improved its ability to scale with business changes, new requirements and peaks in website traffic without the need to invest more heavily in additional onsite software and hardware resources.
Additionally, performance and manageability have increased with the greater ease of use and improved support delivered with Red Hat Enterprise Linux, combined with the solution’s ability to handle heavy, mission-critical workloads.
- Symbian Foundation
RED HAT CLOUD CUSTOMERS
ZARAFA SUMMERCAMP 2011 | SECURITY IN THE CLOUD9
Public cloud: Non-technical considerations
● Government regulations
● Provider security policies
● Access control
● Disaster recovery
● Provider viability
● Physical data location
ZARAFA SUMMERCAMP 2011 | SECURITY IN THE CLOUD10
Private cloud: Technical considerations
● Access control
● Multi-tenant situation
● Application Security
● Private – public transitions
ZARAFA SUMMERCAMP 2011 | SECURITY IN THE CLOUD11
Red Hat Cloud future
● Vision
● Solutions● OpenShift● CloudForms
ZARAFA SUMMERCAMP 2011 | SECURITY IN THE CLOUD12
Red Hat Confidential, Internal Only, Not for Distribution 13
Questions