1 / 18

From Datacenter to Device: Security in the Enterprise 2012 and Beyond

From Datacenter to Device: Security in the Enterprise 2012 and Beyond. Dr. Stephen Herrod, CTO February 27, 2012. The New Reality for Users. Apps & Data Everywhere. Diverse Access Points. Universal App Catalog and Workflow. Browser. Windows Legacy App s. Windows. SaaS Services.

rafer
Télécharger la présentation

From Datacenter to Device: Security in the Enterprise 2012 and Beyond

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. From Datacenter to Device: Security in the Enterprise 2012 and Beyond Dr. Stephen Herrod, CTO February 27, 2012

  2. The New Reality for Users Apps & Data Everywhere DiverseAccess Points Universal App Catalog and Workflow Browser Windows Legacy Apps Windows SaaS Services Broker Mac iOS Mobile Apps Android Entitlements, Policies and Reporting Data Services

  3. The New Reality Diverse Apps Management DiverseAccess Enterprise App Catalog and Workflow Browser Windows Legacy Apps Windows (Physical) SaaS Services Broker Mac (Physical) iOS Mobile Apps Android Entitlements, Policies and Reporting Data Services

  4. The New Reality Diverse Apps Management DiverseAccess Enterprise App Catalog and Workflow Browser Windows Legacy Apps Windows (Physical) SaaS Services Broker sherrod Mac (Physical) iOS Mobile Apps Android Entitlements, Policies and Reporting Data Services

  5. The New Reality Diverse Apps Management DiverseAccess Enterprise App Catalog and Workflow Browser Windows Legacy Apps Windows (Physical) SaaS Services Broker Mac (Physical) iOS Mobile Apps Android Entitlements, Policies and Reporting Data Services

  6. The New Reality

  7. Server +Network + Storage

  8. Trends Driving the Evolution of the Datacenter % Virtualized (Installed workloads WW)

  9. Installed Base of VMs is Rapidly Growing Projected 80 million VMs in 2014 WW Installed Physical and Logical Servers VMs decoupling from HW Source: IDC, Game Changing Virtual Technology : The Evolution of Virtualization and the Cloud, 2011

  10. Convergence is Happening on Many Fronts Converged IO • 40Gb, 100Gb bandwidth • Eliminates dedicated IO, HBA costs • Increases responsibility for intelligent management of the shared pipe Convergence on x86 processors • Network, storage, encryption, graphics functions increasingly integrated into general purpose CPUs Converged systems • Integrated compute, storage, IO, management in a box • Intelligently managed by software • Scalable, Lowered OPEX

  11. The Result? Hyper-density! • In 2014, a single rack could hold ~20,000 VMs! • Run a 5,000 employee company on a rack the size of a dorm fridge! • New opportunities • All applications on a common infrastructure • Including many infrastructure functions that today require specialized hardware. • New challenges! • Today’s security model breaks

  12. Why is it breaking? Port-Based Security Desktop Access 1 Density behind the switch 2 More (and Fewer!) Ports to Protect Mobile HTTP/S Tunnelling • RPC • Git • IMAP • Dropbox • … 3 Virtualization and Mobility

  13. 3. Virtualization and Mobility

  14. The New Model

  15. Defense in Depth Protect the VM Content

  16. Defense in Depth Protect the Logical Apps

  17. Defense in Depth Protect the Logical Datacenter

  18. A Challenge and an Opportunity for Vendors! 1 Existing investments hold 2 More app context = better security! 3 Efficient use of resources 4 Simplified, more integrated management

More Related