Академический Документы
Профессиональный Документы
Культура Документы
October 2012
This ESG White Paper was commissioned by NEC and is distributed under license from ESG.
2012 by The Enterprise Strategy Group, Inc. All Rights Reserved.
Contents
Executive Summary ...................................................................................................................................... 3
Cloud in a Vault (CiaV) Powered by NECs Nblock Infrastructure ............................................................................ 3 NEC Nblock Integrated IT Infrastructure as the Foundation .................................................................................... 4
Growth of IaaS .............................................................................................................................................. 6 Challenges Remaining ................................................................................................................................... 7 Security Challenges ....................................................................................................................................... 7 Third-party Security Services ........................................................................................................................ 8
Internal Skills Gap ..................................................................................................................................................... 8 Global Skills Gap ....................................................................................................................................................... 9
Security Services Offered with CiaV ........................................................................................................... 10 Cost Savings with CiaV ................................................................................................................................ 10
Capital Expense Savings .......................................................................................................................................... 10 Operating Expense Savings..................................................................................................................................... 11 Strategic SLA Benefits ............................................................................................................................................. 11 Retractability .......................................................................................................................................................... 11
All trademark names are property of their respective companies. Information contained in this publication has been obtained by sources The Enterprise Strategy Group (ESG) considers to be reliable but is not warranted by ESG. This publication may contain opinions of ESG, which are subject to change from time to time. This publication is copyrighted by The Enterprise Strategy Group, Inc. Any reproduction or redistribution of this publication, in whole or in part, whether in hard-copy format, electronically, or otherwise to persons not authorized to receive it, without the express consent of The Enterprise Strategy Group, Inc., is in violation of U.S. copyright law and will be subject to an action for civil damages and, if applicable, criminal prosecution. Should you have any questions, please contact ESG Client Relations at 508.482.0188.
Executive Summary
While still not as established as software-as-a-service (SaaS), infrastructure-as-a-service (IaaS) has gained noticeable mindshare in 2012, with 27% of organizations either using or planning to use IaaS, up from 17% in 2011. Many organizations continue to look for alternatives to mitigate the capital and operational expenses associated with traditional IT hardware deployments.1 For the purposes of this white paper, ESG defined IaaS as follows: Iaas is a computing model in which the equipmentincluding servers, storage, and networking componentsused to support an organizations operations is hosted by a service provider and made available to customers over a network, typically the internet. The service provider owns the equipment and is responsible for housing, running, and maintaining it, with the client typically paying on a per-use basis. This white paper concludes:
Acquiring network security through an IaaS offering is a viable strategy for many IT organizations. More than half of the respondents to an ESG survey either currently use or plan to use IaaS. This is a significant increase in visibility and usage for an offering that did not even exist a few years ago. IaaS is a cost-effective approach towards augmenting the network security skill sets. Competent network security personnel do not exist in adequate numbers for the jobs available. These resources are difficult to recruit and train. Significant capital and operating expenses can be saved through use of the right IaaS. The advantages of outsourcing do accrue in the case of IaaS, from the ability to refocus strategy on IT initiatives to the flexibility of optimal tactical resource allocation.
Source: ESG Research Report, 2012 IT Spending Intentions Survey, January 2012. All other ESG research references and charts in this white paper come from this report, unless otherwise noted.
To create a virtual infrastructure, service providers can piece together, test, configure, and deploy different components built by different vendors. This do it yourself (DIY) approach can take advantage of existing hardware and vendor relationships and provide best of breed flexibility. But it may not be best use of time and resources. Reference architectures can simplify the build process and take much of the guesswork and testing out of the equation, but they still require effort from IT and/or system integrators. Also, reference architectures may only operate under documented and certified design specifications. CiaV is a private cloud offering that combines the NEC Nblock integrated IT infrastructure with security, compliance (including PCI, HIPAA, ISO, and HI-TRUST), and monitoring in a hosted environment. CiaV enables organizations to align business projects with infrastructure coststhey can consume infrastructure as needed and incur monthly operational expenses only, without incurring capital expenses for equipment. The CiaV offering provides real market differentiators over other cloud computing offeringsaccountability, real dollar SLAs protection, and retractability (which guarantees that the customer can take possession of the entire infrastructure and their data with 72 hours of notice).
Here are some reasons IT organizations should consider CiaV powered by NEC Nblock infrastructure for IaaS:
NEC Nblock infrastructure offers a hybrid approach to integrated computing for service providers, enabling them to combine various NEC solutions into a single unit using NEC best practices. Since all components are NEC products, they are optimized for tight integration. Additional NEC components can be added or upgraded as requirements change, making the solution more flexible than other integrated stacks. NEC enterprise servers, powered by Intel Xeon E7 Family processors, can accommodate up to 2TB of memory and 160 threads with modular in-box partitioning in a single 7U chassis. Representing the fifth generation enterprise server architecture from NEC, the Express5800/1000 servers provide configuration flexibility, capacity, reliability, and availability. These features and robust performance characteristics
exploit the inherent functionality of the Intel Xeon processor series. NEC uses Intels Machine Check Architecture (MCA) to keep the servers running, even in the event of memory module failure.
NEC Fault Tolerant Servers The sixth generation FT series utilizes patented hardware lockstep technology to deliver up to 99.999% continuous uptime and full redundancy in all components. The FT provides availability, virtual CPU performance, and data integrity and preservation in hardware. NEC M-Series SAN Storage Built for reliability, efficiency, scalability, and ease of operation, the NEC MSeries storage provides 8GFC, 10GbE/1GbE iSCSI, and 6G SAS connectivity. M-Series supports enterprise and nearline SAS HDDs and SSDs in the same enclosure for flexible, tiered storage, and scales up to 1152TB with up to 48GB of cache. Enterprise functionality includes snapshots, replication, WORM, thin provisioning and non-disruptive management. MAID technology enables reduced energy consumption as idle disks are powered down. NEC HYDRAstor Grid Storage This third generation scale-out grid storage system is designed to deliver extremely scalable backup and archiving performance, with global deduplication for capacity efficiency and multi-generational hardware compatibility. NEC ProgrammableFlow Software-defined Networking (SDN) Next-generation data networking using open standards and advanced functionality to deliver the scalable, elastic network resources needed for virtualized and cloud environments. The solution leverages OpenFlow technology to deliver policy-based, intelligent data networking to ensure optimal performance and service delivery. It provides simple, centralized network control, and tracks network conditions to optimize performance according to custom policies. 365/24/7 remote monitoring and managed services come directly from NEC. Since NEC provides everything in the infrastructure from soup to nuts, customers have one throat to choke when they need support.
Growth of IaaS
ESG asked survey respondents about their current and planned use of IaaS and found that 27% of organizations currently leverage these services in some form, and another 24% plan to do so (see Figure 3). As was the case with SaaS, usage of IaaS has increased noticeably, jumping from 17% in 2011 to 27% in 2012 (see Figure 4). Perhaps more significantly, the number of organizations with no plans or interest in cloud infrastructure services has dropped from 34% at the beginning of 2011 to 19% at the outset of 2012. Clearly a number of organizations feel that IaaS has matured sufficiently to the point that, if theyre not currently using it, its nevertheless a viable option as part of their IT strategy.2 Figure 3. Usage Trends for Infrastructure-as-a-Service (IaaS) Please indicate your organization's usage of or plans for infrastructure-as-a-service (IaaS). (Percent of respondents, N=614)
No use, plans, or interest at this time, 19% Don't know, 2% Currently use, 27%
Figure 4. Usage of Infrastructure-as-a-Service(IaaS) Increases from 2011 to 2012 Usage of infrastructure-as-a-service (IaaS), 2011 vs. 2012. (Percent of respondents)
30% 25% 20% 15% 10% 5% 0%
27%
17%
2011 (N=611)
2012 (N=614)
Source: Enterprise Strategy Group, 2012.
Source: ESG Research Report, Public Cloud Computing Trends, March 2012.
Year over year spending on IaaS growth is accelerating. According to recent ESG research3, among outsourced offerings, only SaaS is growing more rapidly than IaaS. The marketplace has ratified IaaS as a viable solution. Cost reduction benefits provided by IaaS are manifold. In an age when its already assumed that IT can do more with less every year, the cost reduction benefits inherent in IaaS are hard to ignore. Some other entity owns and operates (and maintains and updates) an infrastructure (i.e., cloud) for a monthly fee, all inclusive. Whats more, if it becomes strategic to do so, it is now eminently possible to take the infrastructure back in house with very little notice. One service provider for an entire platform has numerous intrinsic advantages. Perhaps the single most important advantage of IaaS is having one throat to choke in case anything goes wrong. Any opportunity to avoid the finger-pointing that goes on in many support scenarios is a huge boon to senior managements ability to sleep well at night.
Challenges Remaining
IaaS has things to prove before its universally accepted. One key criterion of success is longevity, and IaaS is a nascent rather than established platform. The exponential expansion of IT into every aspect of modern business has presented plenty of challenges. Here are some crucial features that IaaS must have to become firmly established:
Security is a grave threat to reliability. IT executives are no longer nave about the dangers posed by many well-documented types of security breaches. IaaS vendors need to be at the top of the class in terms of information security, across the board. Scalability is a mountain and no one knows its height. The fact that processing power has doubled every 18 months for three decades has great impact on the expectations of computer users. If an IaaS program lacks documented proof of scalability, it will fail. Resiliency is the antidote to business continuity concerns. Business interruptions strike fear into the hearts of C-level executives. Any IaaS offering that doesnt include resiliency guarantees will not be successful.
Security Challenges
The concept of featuring security features, expertise, and support as the leading edge of an IaaS product produces cloud in a vault solutions. The consensus is that security may be the toughest IT challenge on the horizon. As the notion of the cloud is pervasive, a way to distinguish one from another is to emphasize just how secure its vault is. Here are some aspects of a secure IaaS:
Security-as-a-service is a category of IaaS in which security is central. Compliance is often a component of security-as-a-service. Numerous organizations across countless verticals are required to comply with standards that range from PCI to HIPAA to ISO. Rolling specific compliance auditing into this kind of offering can set it apart from its competition. Reporting on security events provides important transparency. Forensics on threat-handling and other triage of potential security events provides value to IaaS customers. Physical security is an obvious yet vital component. IaaS vendors operate the type of enterprise-class facilities that make physical security a given. With all the other worries on the minds of IT executives, physical security needs to be part and parcel of IaaS. General security services are offered out of the box. A baseline of security services is bundled into IaaS products. Customers can request additional features if they so desire.
Source: ESG Research Report, 2012 IT Spending Intentions Survey, January 2012.
No, 33%
4 5
Source: ESG Research Report, Security Management and Operations: Changes on the Horizon, July 2012. Ibid.
Figure 6. How Use of Third-party Professional/Managed Services has Changed How has your organizations use of third-party professional or managed security services changed over the past 24 months? (Percent of respondents, N=196) Dont know / no opinion, 1% Increased Decreased substantially, 16% substantially, 1%
Decreased somewhat, 6%
Ibid.
10
Given the shortage of security skills, it is not surprising that 62% of enterprises plan on using third-party professional or managed security services in 2012. Additionally, 16% of large organizations say that their use of third-party professional or managed services has increased substantially over the past 24 months while 42% say that their use of third-party professional or managed services has increased somewhat over the same period. Security management and operations leaders are most active here36% say that their use of third-party providers has increased substantially over the past 24 months. The top four security services currently used by organizations are security design (33% of organizations), security/risk management/regulatory compliance assessments (30%), network monitoring (30%), and threat management intelligence (30%). Combined with the security skills shortage, security management complexity and urgency is driving a sharp increase in enterprise use of professional and managed security services in areas such as security architecture design, threat intelligence, and network monitoring.7
With CiaV there is zero capital expense to the customer. Organizations need to factor in the cost for a capital purchase comparable to CiaV. What other strategic initiatives could be addressed with said capital? Because NEC engineers and manufactures every component used in the technology stack, it can deliver it at a price point that cannot be met by multi-vendor offerings. A recent use case was brought to the attention of ESG that illustrates this point well. A customer requested a competitive quote for disaster recovery; the CiaV offering
Ibid.
11
(servers, storage, network, and replication appliance) was one-third the price of the storage alone from another vendor.
CiaV requires one simple monthly payment. Fostering simplicity in the complex world of IT can be a very good thing. Organizations considering CiaV need to consider the resource costs necessary to support the infrastructure on their own: a 24/7 NOC, engineering and support personnel on staff, plus training to stay current. There are significant costs to operate a data center, including maintenance contracts and services, electricity for power (UPS/CRAC/PDU/emergency systems/security controls/genset/fuel), and cooling. In addition, expenses related to circuit installation and ongoing bandwidth consumption are certainly not optional if you own and manage your own infrastructure. Maintenance contract costs account for as much as 20% of the original capital expenditure annually. Software must be licensed and renewed. Audit and compliance represent additional areas where investments must be made. Failure to comply with PCI, HIPAA, and other standards can have grave financial repercussions. The sheer volume of material management costs money and distracts from more strategic concerns. Whats more, on top of a network operations center, organizations will need a dedicated security team to manage, including 24/7 incident response.
Retractability
Organizations that outsource business- or mission-critical applications with highly sensitive data (medical, legal or employee records, for example), must consider the real possibility that they may find themselves in a situation where they must bring those assets back in-house. Migrating tens or hundreds of terabytes of sensitive data from the cloud provider back to the businesss internal data center introiduces a tremendous amount of risk and expense in the form of infrastructure and bandwidth costs as well as the extended time window required to move very large data sets. Retractability is the contractual right of an organization using CiaV to bring the entire infrastructure in-house with 72 hours of notice. This enables organizations to take advantage of the many benefits of outsourcing via a service provider, while retaining control over their outsourced assets. CiaV is the only private cloud service with a 72-hour retractability clause ESG has encountered as of this writing.
12