awan heitech launching fujitsu [compatibility mode] (small)

Post on 18-Jul-2015

95 Views

Category:

Technology

3 Downloads

Preview:

Click to see full reader

TRANSCRIPT

������������A�BCDEF�BD��E�������CA�FD��D�A� �FA���������B�CCA��A���D���DE��BCDEF��DE��A���

����E�A��� !

William Ho (Regional Senior Consultant)

Fujitsu (Malaysia) Sdn.Bhd.BCCE, BCCLA, CBCP, CCSKV2.1, CCSKV3, CISA,

CISM, CRISC, CITPM, MBCI, ITIL,VCP, TOGAF

Exchange 2013

“Consumerisation of Cloud:From Cloudy to Clear Skies”

�������� AB�C�D�

Prepared for the Journey

"�A�F�

• Introduction

• On Boarding Cloud- Challenges

• On Boarding Cloud- Addressing the Challenges

3 Copyright 2013 FUJITSU LIMITED

����EF������A����A��

4 Copyright 2013 FUJITSU LIMITED

Service

NaaS

Private

#��$D��F����BCDEF�� B�CCA��A��

Deployment

Architecture

Deployment

Architecture

B�CCA��A��

• Selection of Suitable Deployment Models

• Protection of Data, Security and ConcernsSecuritySecurity

Clear

Objectives

Clear

Objectives• Understanding Your Cloud Aspiration

• Roles & Responsibilities PeoplePeople

6 Copyright 2013 FUJITSU LIMITED

� Understanding Your Cloud Aspiration

� Selecting Deployment Model

� Data Protection, Security and Concerns

� Understanding Roles and ResponsibilitiesService

NaaS

Private

#��$D��F����BCDEF�� B�CCA��A��

#%&A����A��D��'�%�������BCDEF(

����������

• )���������A�*A�����A���+���F�

�A�D������D��CA,���(

• -AFE������D�����F�������������

�D����D�D�A����D��FA���F(�

• "CCD.�����/��D���D��FA��A����C����

��F��A��D����A�A����D�FA���F��D��

�A����A�(

• B�A��A�����A����D��A���A��%C����

���D����D�(

8 Copyright 2013 FUJITSU LIMITED

-A�F���D��BCDEF(

9

Agility and Flexibility Control

BUSINESS Needs IT Needs

9 Copyright 2013 FUJITSU LIMITED

Service

NaaS

Private

� Understanding Your Cloud Aspiration

� Selecting Deployment Model

� Data Protection, Security and Concerns

� Understanding Roles and Responsibilities

BCDEF�0A�CD��A��

����������AB

',�CE���A�A����D��A��

D��FA���F�����%�C���A�

CD�EF�A������

#��FA���F��A�DE��A�1����C�%�C���

)��AF�A����D��A��

C����������

-A2E��A��������C�B�����C����A���A��

BCDEF��A�E��.�����#��3��F�����A��A�

BD���DC�D���A�E�������F��EF��

$��AF�D��%���������E�C�4���D�

5����AF�D��FA���F����C���

���CDA��BA�CD�EF�A������

',�CE���A1�%E��D��AF�%�������F������

5����AF�D��FA���F����C���

',�A����A������E%C����CDEF

BA��A������D����A���A�������A��CDEF

6D���%�C����D���D�CD����D�

���AD�F������B�A��CD�EF�A������

���D��������

6E%C���7�6�����A��CDEF

11 Copyright 2013 FUJITSU LIMITED

Service

NaaS

Private

� Understanding Your Cloud Aspiration

� Selecting Deployment Model

� Data Protection, Security and Concerns

� Understanding Roles and Responsibilities

8A�A����9��0���

���������

��B�D���DA���F�F

���A���B�A�B

����A�����A��B�

C���� �B�����!�����"����AD

�F�#CD�����ADEADB

���A��ADEADB

$�B��ABB�!%%��F�����

��B�A�B�

&�!C��CA�%�A�������DF�A�

���F��F�B��'�����BA���()��

A����#A$�*��A�+,

!%%��F������ADEAD

��D���DA���F�F

�F�F�FBA���B�A�B

&�-.���DF�A���$/��

'���D�����)��-.,

�F�F�FBA��ADEAD

�A�D����"�

���AD���B�A�B

&�EA�����0B���DD�D���0B

�F�A����D�%�����1A�B��

"����AD�BADA�B,

�A�D������B�A�B

�F�F��������F����B

�0+� �'C���B�A�B

�2C#�D�%�����ADEAD

��F����ADEADB

���DF0A�"�$F1�%�

��B�A�B

�0+��!3#3!�

$F1�%���B�A�B

������������A�B�CC�D�A��CEDF����AB��A�F�A��D��E��ED���AE��A������������������A��AB��E���E����D����������������D�������

13 Copyright 2013 FUJITSU LIMITED

B�CCA��A��

• 8���F����.�CC�%A���D�AF

• 8D�.�CC�%A����A������

• 8A�A�.�CC����%A���D�AF

• 8����D���DC����A�����C��A

• 8D�����A��D���%CA��D���A�E����

• "�A��A�A����F���������C�F���D��

• 6�D�A����D���A�D�����F���

• 0����)A�E�����)A��A����D�

DataDataDataDataCreationCreationCreationCreationDataDataDataDataSecuritySecuritySecuritySecurityLifecycleLifecycleLifecycleLifecycleForForForForCloud ComputingCloud ComputingCloud ComputingCloud ComputingDataStorage

DataDataDataDataUsageUsageUsageUsageDataDataDataDataSharingSharingSharingSharingDataDataDataDataArchiveArchiveArchiveArchiveDataDataDataDataDisposalDisposalDisposalDisposal

14 Copyright 2013 FUJITSU LIMITED

Logical Platform ADivision A

)A��A����D��:���DC���D��

• The Access Control Feature controls the access between tenants and platforms

• Address Translation Function can hide secure server information

• The Anomaly IPS feature protects each platform from flooding-attacks

Physical ServerPhysical Server

FUJITSU Server PRIMERGY

Deploy

FUJITSU Server PRIMERGY

Service user of division B

Logical Platform

Division B

Internet

Improved network security for customers, projects & divisions

Logical Platform B

NS Appliance(*)NS Appliance(*)

FUJITSU Server PRIMERGY

Physical ServerPhysical Server

NS Appliance(*)NS Appliance(*)

15

15 Copyright 2013 FUJITSU LIMITED

0����6�D�A���D�� '�������D�

� Encrypts drive data in ETERNUS DX

� Able to select Fujitsu’s unique encryption scheme or 128-bitAES encryption

Encrypt confidential information in drives

EncryptionEncryption is specified

on a LUN basis

Encryption

Unencrypted data

Encryption

Encryption

Encryption Encryption

Encryption Encryption

Encryption

Encryption

Encryption

Encryption

Encryption

Encryption setting and management

Prevents information leakage

Server A Server B Server C

Fujitsu’s unique encryption scheme- Less performance degradation than 128bit AES- Closed unique technology ensures the safety

Encryption

AES (Advanced Encryption Standard) is an encryption standard of the Federal Information Processing Standards

Data removal

protection

ETERNUS DX400 S2 series

16 Copyright 2013 FUJITSU LIMITED

Service

NaaS

Private

� Understanding Your Cloud Aspiration

� Selecting Deployment Model

� Data Protection, Concerns and Challenges

� Understanding Roles and Responsibilities

18

-DCA����F�-A��D���%�C���A�

Source: Cloud Security Alliance

18 Copyright 2013 FUJITSU LIMITED

BEC�E��C���F�-DCA��"F&E���A���

19 Copyright 2011 FUJITSU LIMITED

Capacity Management

• Workload placement

planning

• Service continuity mgmt

Service Developers:

• APIs, connectors,

Java

• Integration

Sourcing Management

• Multi-supplier mgmt

• Service governance

• Financial controls

• Comparative analysis

Security professionals

• Information Security

Mgmt

• Sourcing security

Service Managers

• Service portfolio mgmt

• Service governance

• Financial Costing /

cost recovery model

• Service brokerage

Business Relationship Mgmt

• Business Analyst

• Demand management

• Benefit realization

• Cloud Alliance Manager

Cloud Federation &

Aggregation

• Technologist &

cloud federation

architect

Enterprise Architecture Team

• Cloud Computing Architect

• Virtualization SME

Governance & Compliance

• Risk Management

• COBIT, Controls, policies,

processes, procedures

• Internal Audit

• Cloud Risk and

Compliance

� On Boarding the Cloud- Addressing the Challenges

B�CCA��A��

Clear

Objectives

Clear

Objectives• Understanding Your Cloud Aspiration

Clarify business, culture, economic objectives, priorities, and desired outcomes

Biz-IT data gathering and analysis

Identify critical interdependency, processes, applications, etc

Assess the infrastructure readiness for Cloud

Cloud -Role and Responsibilities

Clarify expectation for cloud resources.

Data Management Analysis and identification

Note : Please check with Fujitsu regarding related services

21 Copyright 2013 FUJITSU LIMITED

Deployment

Architecture

Deployment

Architecture

B�CCA��A�

• Selection of Suitable Deployment Models

Traditional(On-Premise)

Traditional(On-Premise)

Storage

Server HW

Networking

vServers

Databases

Virtualization

Runtimes

Applications

Security & Integration

Use

r M

an

age

d

(Infrastructure(as a Service))

(Infrastructure(as a Service))

Storage

Server HW

Networking

vServers

Databases

Virtualization

Runtimes

Applications

Security & IntegrationUse

rs

(Platform(as a Service))

(Platform(as a Service))

Storage

Server HW

Networking

vServers

Databases

Virtualization

Runtimes

Applications

Security & Integration

Pu

blic

/Priv

ate

Use

rs

Software(as a Service)

Software(as a Service)

Storage

Server HW

Networking

vServers

Databases

Virtualization

Runtimes

Applications

Security & Integration

Hardware/Service

abstracted

Dynamic capacity

and pricing

Seamless scaling

up or down

Systems re-

purposing

Hardware/Service

abstracted

Dynamic capacity

and pricing

Seamless scaling

up or down

Systems re-

purposing

Hardware/Service

abstracted

Dynamic capacity

and pricing

Seamless scaling

up or down

Systems re-

purposing

Hardware/Service

abstracted

Dynamic capacity

and pricing

Seamless scaling

up or down

Systems re-

purposing

Hardware,

software &

Service

abstracted

Dynamic capacity

and pricing

Seamless scaling

up or down

Systems re-

purposing

Hardware,

software &

Service

abstracted

Dynamic capacity

and pricing

Seamless scaling

up or down

Systems re-

purposingIn

fras

truc

tur

e

Note : Please check with Fujitsu regarding related services

22 Copyright 2013 FUJITSU LIMITED

B�CCA��A��

• Protection of Data, Security and ConcernsSecuritySecurity

Note : Please check with Fujitsu regarding related services Source : Cloud Security Alliance

23 Copyright 2013 FUJITSU LIMITED

B�CCA��A��

• Roles & ResponsibilitiesPeoplePeople

Note : Please check with Fujitsu regarding related services

24 Copyright 2013 FUJITSU LIMITED

)������/D�D��D.�8����DE

25

EducationExpansion/Bridging

���A���D�6�D�����A

Implementation;A���%�C������EF�

"����A��E�A0A����

Cloud Initiation and on boarding

Cloud – Technical Convincement

Cloud –Technical Adoption

Cloud Expansion/Extension

Scenarios

Scenarios

Scenarios

Scenarios –– ––

Serv

ice

Serv

ice

Serv

ice

Serv

ice

Mappin

gs

Mappin

gs

Mappin

gs

Mappin

gs

Customization

Cate

r for y

our e

very

scenario

s

Cate

r for y

our e

very

scenario

s

Cate

r for y

our e

very

scenario

s

Cate

r for y

our e

very

scenario

s

Note : Please check with Fujitsu regarding related services

25 Copyright 2013 FUJITSU LIMITED

Thank You

top related