Академический Документы
Профессиональный Документы
Культура Документы
Bryan Doerr
Chief Technology Officer
Savvis
Ken Owens
Vice President
Security and Virtualization Technology
Savvis
Bryan Doerr
Chief Technology Officer, Savvis
4
What is the Largest Barrier
to Adoption of Cloud Services?
Cloud
computing Cloud
isn’t like grid computing
or client- is like
– Usage-based billing online music
server
– Automatic delivery vs. CDs
– Minimal/no commitment
– Customer controlled
service provisioning/
modification/termination
Not a new
A new way
technology
to obtain
data center
services
Savvis Proprietary & Confidential 7
Cloud Computing
Beyond the Hype
• Today
– Decision to outsource often reduces
to preference-based
◦ Benefits are real, but seen as risky
by some
Tomorrow
– Decision will be obvious
◦ Compelling benefit/substantially
reduced perceived risk
Acceptance of virtualization
Software-as-a-Service
center resources
Technologies
IaaS
• Granular capacity & billing
“pay for usage”
• Specify and Deploy
customer
Private Cloud Dedicated Cloud
customer
customer
customer
Public Cloud
Savvis Proprietary & Confidential 12
Infrastructure-as-a-Service Clouds
Multi-Tenancy Models And Cost Structure
Hosted
Current Internal “Clouds” Dedicated Clouds Public Clouds
Customer
Costs
Streamlined Opex Avoided Opex Avoided Opex
Personnel
Opex
6
Security 7
Data Access/Mobility
Cloud computing is
IT Leaders
not yet secure enough
(US)
for the Enterprise
IT Leaders
(Global)
44%
56%
36%
64%
Agree
Disagree
Source: Independent research undertaken by Vanson Bourne in 2009, surveying 314 CIOs, CTOs, IT Directors
and heads of IT of global businesses based in the US, UK, and Singapore.
Savvis Proprietary & Confidential 16
Securing the Cloud
Ken Owens
Vice President
Security and Virtualization Technology, Savvis
17
“Be Careful Up There!”
Concerns About Cloud Computing Security Abound
• Virtual-machine escapes
• Virtual-machine hopping
• Virtual-server sprawl
• Compliance Concerns
– Auditing events
– VM Mobility
• Defense in Depth
– Continue to leverage proven security strategies
• Availability SLAs
Perimeter Security
• Managed Firewall
Cloud & Virtual Intrusion Detection
• Multi-Tiered Firewall Environments • Network IDS
• Host IDS
• Mitigation
• Worm Detection / Prevention • Integrity Monitoring
Dedicated
Security
DDoS Detection/
Perimeter Security
• Managed Firewall
Threat & Log • Firewall Care Email Protection
• Multi-Tiered Firewall • Anti-Virus
Management Security Mgmt. • Anti-Spam
• Log Management Service
Intrusion Detection • Patch Management • Content Filtering
• Threat Management Service • Reporting/Logging
• Network IDS Customer • Image Filtering
• Vulnerability Scanning • Vulnerability Scanning
• NIDS Care • URL Filtering
• Host IDS
Data
• Integrity Monitoring
Secure Access
• IP VPN
• Strong Authentication
Secure Access
• IP VPN
• Strong Authentication
Incident Management
• Incident Response
30
Savvis Cloud Services Portfolio
Dedicated Cloud Open Cloud
Project Spirit
Compute Compute
Billing Terms Monthly + 1/2/3yr Terms Monthly+ 1/2/3yr Terms Hourly & Monthly
Drag-and-drop designer
Demo at www.savvis.com
Data Analysis
1. Analytics Company (Data Analysis Workload)
Runtime (000)
• Burst compute to run large projects fast
Compute Instances
(Web Serving Workload)
• Selected Savvis for security and enterprise
attributes 4
20
• Granular growth with increased users 3
2
Time
4. Unified Comm’s Company (Workgroup Workload)
50
Granular growth
1
100
1000
250
2000
• Evaluating for conversion to a SaaS model
1500
500
Compute Instances
0
Cloud Instances
Time
Savvis Proprietary & Confidential 35
Q&A
36
For more information …
www.savvis.net
Thank You.
© 2009 Savvis, Inc. All rights reserved. Savvis® is the registered trademark of Savvis Communications Corporation. 37