SlideShare a Scribd company logo
1 of 18
Secure Cloud Infrastructure and Next-Generation Data Centers
– An Interactive Discussion




    Get a smarter, more strategic approach to security and cloud scaling
    in this must-attend, interactive, thought leadership event for enterprise
    technology and security decision makers.

    Second in a three-part series for IS and IT management professionals responsible for
    virtualization and data center security, architecture, management, and optimization


 © 2012, HyTrust, Inc. www.hytrust.com   1975 W. El Camino Real, Suite 203, Mountain View, CA 94040   Phone: 650-681-8100 / email: info@hytrust.com
                                                                                                                                                      1
Overview

 Meet the Experts
 Discussion topics:
        Next-generation data centers, and the future of IT infrastructure
        Key business drivers for virtualization security
        Proactive, collaborative best-practices to protect your brand, IP, and “real
           security”
 Summary
 Q&A




© 2012, HyTrust, Inc. www.hytrust.com                                                   2
Meet the Experts

 Hemma Prafullchandra, CTO/SVP Products, HyTrust, Inc.

 Janakan Rajendran, CIO, Global Net Access

 Bob West, CEO, Echelon One

 Eric Chiu, President/Founder, HyTrust, Inc.




© 2012, HyTrust, Inc. www.hytrust.com                     3
Discussion: Data Center of the Future – 3 year Vision

                                             “Rented” Cloud
             SaaS Application                 Infrastructure        Self-Service




                                                           Access
                                          Identity            and
                                                            Usage
Consolidation &                                  IT as a
 Virtualization                                                          Ubiquitous Access
                                                 Service

                                          Data              Cost




      End result of datacenter transformation: IT is delivered as-a-service;
  Role of Corporate IT is transformed from operational to control / governance
  © 2012, HyTrust, Inc. www.hytrust.com                                                      4
Discussion: Future of IT Infrastructure?

   Intel Cloud Builders Reference Architecture
   HyTrust, VMware, and Intel

   PCI-Compliant Cloud Reference Architecture
   Cisco, VMware, Trend Micro, HyTrust, Savvis, and Coalfire

   NIST SP800-125: Guide to Security for Full Virtualization
   Technologies

   Cisco Validated Design
   Cisco, RSA, EMC, VCE, and HyTrust




© 2012, HyTrust, Inc. www.hytrust.com                          5
Audience Poll

      When are you planning your next server refresh?
       Within 12 months as part of a full data center re-architecture
       Within 12 months as standalone server refresh
       Greater than 12 months as part of a full data center re-architecture
       Greater than 12 months as standalone server refresh
       No server refresh or data center re-architecture planned
       Unknown




© 2011, HyTrust, Inc. www.hytrust.com                                          6
Discussion: Key Drivers and Business Trends?

  Virtualize More…

 Analyst research shows market is now 52% virtualized,
  with many organizations goaled to be 75% virtualized
  by 2014. *

  Virtualize More Securely…

  There are now more than 800,000 vSphere admins.**

  “Virtualization increases security risk by 60%.”***
*Forrester Research CISO’s Guide to Virtualization Security 2012
** VMware, Vmworld presentation with EMC, Vmware, HyTrust 2011
***Gartner; “From Secure Virtualization to Secure Private Clouds”; Neil MacDonald & Thomas J. Bittman; 13 October 2010

  © 2012, HyTrust, Inc. www.hytrust.com                                                                                  7
Organizations are rapidly adopting virtualization
                                including mission-critical workloads
                             100%




                                                   Cost Savings                                          Compliance Risk
                                                                                                                  Enterprise Platform
% of Workloads Virtualized




                                                                                        Extensive Production

                                                                  Limited Production
                                                                                                   Mission-Critical Workloads

                                       Develop/Test

                                                                            Non-Mission-Critical Workloads
                             0%




                                       Non-Compliant              Limited Compliance         Compliant               Best-Practice

                                                                                       Management & Automation Tools Become Necessary




                                                                                                                                        8
                                    © 2012, HyTrust, Inc. www.hytrust.com
Discussion: How Best to Align Broader Objectives?

          Recent VMware Executive Brief
                         CFO                                CIO                                      Implications for CSO
Cost                     Cost transparency                  Do more with the                         Limited or no budget
                                                            same/less budget
                                                                                                     (Need very compelling event,
                         Forecast accuracy                  Resource planning                        or to tightly align to revenue
                                                                                                     generation)
Agility                  Investment analysis                Modernize legacy IT                      Accountable for security
                                                                                                     solution that matches agility of
                                                            Select the right cloud                   virtualization
                                                            strategy

Risk                     Mitigate potential                 Gain control over                        Accountable for security of
                         corporate risk                     IT workload leakage to                   virtual assets that
                                                                                                     Do Not exist yet.
                         Adhere to security                 Manage data and
                         and Compliance                     application
                                                            security
VMware /CFOWorld , “Aligning CFO and CIO Priorities” 2011    http://www.vmware.com/files/pdf/cloud/VMware_CFOWorld_Aligning_CFO_CIO.pdf

       © 2012, HyTrust, Inc. www.hytrust.com                                                                                              9
Key Drivers to Protect Brand and Secure IP


87%                               Percentage of companies that
                                  have experienced a data breach
                                 — IT Compliance
                                 Institute




48%                              Percent of all breaches that
                                 involved privileged user misuse
                                 — Verizon report, 2010




74%                              Percentage of breached companies
                                 who lost customers as a result of the
                                 breach
                                 — IT Compliance
                                 Institute




© 2012, HyTrust, Inc. www.hytrust.com                                    10
Discussion: Future of IT Talent?

   What does the skillset of future IT professionals look like?

   Dice.com Survey: Top-ten “Tough-to-fill” IT Skills:
   #1 Security
   #2 Virtualization




© 2012, HyTrust, Inc. www.hytrust.com                             11
Audience Poll

      What security concern ranks highest in importance in your
      virtualized environments heading into 2012?
       Lack of automation (admin is brought in for every update and change)
       Self service for line of businesses to access/manage their virtual machines
       Strength of security policies and processes around access and change controls
       Insider threat – either malicious or errant
       Logging and reporting tools for audit and/or forensics purposes
       All of the above




© 2012, HyTrust, Inc. www.hytrust.com

© 2011, HyTrust, Inc. Inc. www.hytrust.com                                              12
   © 2012, HyTrust, www.hytrust.com
Best Practices and Guidance – What Can You Do Today?

Consider the right access for the right people in your virtual environs
 Cut back or eliminate access rights for those not on the projects
 Manage the networks as well
 Take full inventory on regular basis

Automate to drive scalability
 Consider management tools to streamline workflow
 Drive security policy automation to prevent mistakes




 © 2012, HyTrust, Inc. www.hytrust.com                               13
Best Practices and Guidance – What Can You Do Today?

Create the business case for change
 Show costs of Not doing it (i.e. 87%)
 Be proactive and collaborative with IT, Security to understand and
  identify the business problem
 Create a plan

Don’t be scared!




    © 2012, HyTrust, Inc. www.hytrust.com                              14
    hemma@hytrust.com
    jrajendran@gnax.net
    bob.west@echelonone.net
    eric@hytrust.com
    sales@hytrust.com


© 2012, HyTrust, Inc. www.hytrust.com   15
    hemma@hytrust.com
    jrajendran@gnax.net
    bob.west@echelonone.net
    eric@hytrust.com
    sales@hytrust.com


© 2012, HyTrust, Inc. www.hytrust.com   16
    hemma@hytrust.com
    jrajendran@gnax.net
    bob.west@echelonone.net
    eric@hytrust.com
    sales@hytrust.com


© 2012, HyTrust, Inc. www.hytrust.com   17
    hemma@hytrust.com
    jrajendran@gnax.net
    bob.west@echelonone.net
    eric@hytrust.com
    sales@hytrust.com


© 2012, HyTrust, Inc. www.hytrust.com   18

More Related Content

More from HyTrust

PCI-DSS Compliant Cloud - Design & Architecture Best Practices
PCI-DSS Compliant Cloud - Design & Architecture Best PracticesPCI-DSS Compliant Cloud - Design & Architecture Best Practices
PCI-DSS Compliant Cloud - Design & Architecture Best PracticesHyTrust
 
S24 – Virtualiza.on Security from the Auditor Perspec.ve
S24 – Virtualiza.on Security from the Auditor Perspec.veS24 – Virtualiza.on Security from the Auditor Perspec.ve
S24 – Virtualiza.on Security from the Auditor Perspec.veHyTrust
 
G12: Implementation to Business Value
G12: Implementation to Business ValueG12: Implementation to Business Value
G12: Implementation to Business ValueHyTrust
 
IBM X-Force 2010 Trend and Risk Report-March 2011
IBM X-Force 2010 Trend and Risk Report-March 2011IBM X-Force 2010 Trend and Risk Report-March 2011
IBM X-Force 2010 Trend and Risk Report-March 2011HyTrust
 
PCI Compliance and Cloud Reference Architecture
PCI Compliance and Cloud Reference ArchitecturePCI Compliance and Cloud Reference Architecture
PCI Compliance and Cloud Reference ArchitectureHyTrust
 
Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...
Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...
Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...HyTrust
 
Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
Secure and Scale Your Virtual Infrastructure While Meeting Compliance MandatesSecure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
Secure and Scale Your Virtual Infrastructure While Meeting Compliance MandatesHyTrust
 
Implementing ID Governance in Complex Environments-HyTrust & CA Technologies
Implementing ID Governance in Complex Environments-HyTrust & CA Technologies Implementing ID Governance in Complex Environments-HyTrust & CA Technologies
Implementing ID Governance in Complex Environments-HyTrust & CA Technologies HyTrust
 
HyTrust-FISMA Compliance in the Virtual Data Center
HyTrust-FISMA Compliance in the Virtual Data CenterHyTrust-FISMA Compliance in the Virtual Data Center
HyTrust-FISMA Compliance in the Virtual Data CenterHyTrust
 
HyTrust and VMware-Providing a Secure Virtual Infrastructure
HyTrust and VMware-Providing a Secure Virtual Infrastructure HyTrust and VMware-Providing a Secure Virtual Infrastructure
HyTrust and VMware-Providing a Secure Virtual Infrastructure HyTrust
 

More from HyTrust (10)

PCI-DSS Compliant Cloud - Design & Architecture Best Practices
PCI-DSS Compliant Cloud - Design & Architecture Best PracticesPCI-DSS Compliant Cloud - Design & Architecture Best Practices
PCI-DSS Compliant Cloud - Design & Architecture Best Practices
 
S24 – Virtualiza.on Security from the Auditor Perspec.ve
S24 – Virtualiza.on Security from the Auditor Perspec.veS24 – Virtualiza.on Security from the Auditor Perspec.ve
S24 – Virtualiza.on Security from the Auditor Perspec.ve
 
G12: Implementation to Business Value
G12: Implementation to Business ValueG12: Implementation to Business Value
G12: Implementation to Business Value
 
IBM X-Force 2010 Trend and Risk Report-March 2011
IBM X-Force 2010 Trend and Risk Report-March 2011IBM X-Force 2010 Trend and Risk Report-March 2011
IBM X-Force 2010 Trend and Risk Report-March 2011
 
PCI Compliance and Cloud Reference Architecture
PCI Compliance and Cloud Reference ArchitecturePCI Compliance and Cloud Reference Architecture
PCI Compliance and Cloud Reference Architecture
 
Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...
Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...
Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...
 
Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
Secure and Scale Your Virtual Infrastructure While Meeting Compliance MandatesSecure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
 
Implementing ID Governance in Complex Environments-HyTrust & CA Technologies
Implementing ID Governance in Complex Environments-HyTrust & CA Technologies Implementing ID Governance in Complex Environments-HyTrust & CA Technologies
Implementing ID Governance in Complex Environments-HyTrust & CA Technologies
 
HyTrust-FISMA Compliance in the Virtual Data Center
HyTrust-FISMA Compliance in the Virtual Data CenterHyTrust-FISMA Compliance in the Virtual Data Center
HyTrust-FISMA Compliance in the Virtual Data Center
 
HyTrust and VMware-Providing a Secure Virtual Infrastructure
HyTrust and VMware-Providing a Secure Virtual Infrastructure HyTrust and VMware-Providing a Secure Virtual Infrastructure
HyTrust and VMware-Providing a Secure Virtual Infrastructure
 

Recently uploaded

Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 

Recently uploaded (20)

Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 

Secure Cloud Infrastructure and Next-Generation Data Centers – An Interactive Discussion

  • 1. Secure Cloud Infrastructure and Next-Generation Data Centers – An Interactive Discussion Get a smarter, more strategic approach to security and cloud scaling in this must-attend, interactive, thought leadership event for enterprise technology and security decision makers. Second in a three-part series for IS and IT management professionals responsible for virtualization and data center security, architecture, management, and optimization © 2012, HyTrust, Inc. www.hytrust.com 1975 W. El Camino Real, Suite 203, Mountain View, CA 94040 Phone: 650-681-8100 / email: info@hytrust.com 1
  • 2. Overview  Meet the Experts  Discussion topics:  Next-generation data centers, and the future of IT infrastructure  Key business drivers for virtualization security  Proactive, collaborative best-practices to protect your brand, IP, and “real security”  Summary  Q&A © 2012, HyTrust, Inc. www.hytrust.com 2
  • 3. Meet the Experts  Hemma Prafullchandra, CTO/SVP Products, HyTrust, Inc.  Janakan Rajendran, CIO, Global Net Access  Bob West, CEO, Echelon One  Eric Chiu, President/Founder, HyTrust, Inc. © 2012, HyTrust, Inc. www.hytrust.com 3
  • 4. Discussion: Data Center of the Future – 3 year Vision “Rented” Cloud SaaS Application Infrastructure Self-Service Access Identity and Usage Consolidation & IT as a Virtualization Ubiquitous Access Service Data Cost End result of datacenter transformation: IT is delivered as-a-service; Role of Corporate IT is transformed from operational to control / governance © 2012, HyTrust, Inc. www.hytrust.com 4
  • 5. Discussion: Future of IT Infrastructure? Intel Cloud Builders Reference Architecture HyTrust, VMware, and Intel PCI-Compliant Cloud Reference Architecture Cisco, VMware, Trend Micro, HyTrust, Savvis, and Coalfire NIST SP800-125: Guide to Security for Full Virtualization Technologies Cisco Validated Design Cisco, RSA, EMC, VCE, and HyTrust © 2012, HyTrust, Inc. www.hytrust.com 5
  • 6. Audience Poll When are you planning your next server refresh?  Within 12 months as part of a full data center re-architecture  Within 12 months as standalone server refresh  Greater than 12 months as part of a full data center re-architecture  Greater than 12 months as standalone server refresh  No server refresh or data center re-architecture planned  Unknown © 2011, HyTrust, Inc. www.hytrust.com 6
  • 7. Discussion: Key Drivers and Business Trends? Virtualize More… Analyst research shows market is now 52% virtualized, with many organizations goaled to be 75% virtualized by 2014. * Virtualize More Securely… There are now more than 800,000 vSphere admins.** “Virtualization increases security risk by 60%.”*** *Forrester Research CISO’s Guide to Virtualization Security 2012 ** VMware, Vmworld presentation with EMC, Vmware, HyTrust 2011 ***Gartner; “From Secure Virtualization to Secure Private Clouds”; Neil MacDonald & Thomas J. Bittman; 13 October 2010 © 2012, HyTrust, Inc. www.hytrust.com 7
  • 8. Organizations are rapidly adopting virtualization including mission-critical workloads 100% Cost Savings Compliance Risk Enterprise Platform % of Workloads Virtualized Extensive Production Limited Production Mission-Critical Workloads Develop/Test Non-Mission-Critical Workloads 0% Non-Compliant Limited Compliance Compliant Best-Practice Management & Automation Tools Become Necessary 8 © 2012, HyTrust, Inc. www.hytrust.com
  • 9. Discussion: How Best to Align Broader Objectives? Recent VMware Executive Brief CFO CIO Implications for CSO Cost Cost transparency Do more with the Limited or no budget same/less budget (Need very compelling event, Forecast accuracy Resource planning or to tightly align to revenue generation) Agility Investment analysis Modernize legacy IT Accountable for security solution that matches agility of Select the right cloud virtualization strategy Risk Mitigate potential Gain control over Accountable for security of corporate risk IT workload leakage to virtual assets that Do Not exist yet. Adhere to security Manage data and and Compliance application security VMware /CFOWorld , “Aligning CFO and CIO Priorities” 2011 http://www.vmware.com/files/pdf/cloud/VMware_CFOWorld_Aligning_CFO_CIO.pdf © 2012, HyTrust, Inc. www.hytrust.com 9
  • 10. Key Drivers to Protect Brand and Secure IP 87% Percentage of companies that have experienced a data breach — IT Compliance Institute 48% Percent of all breaches that involved privileged user misuse — Verizon report, 2010 74% Percentage of breached companies who lost customers as a result of the breach — IT Compliance Institute © 2012, HyTrust, Inc. www.hytrust.com 10
  • 11. Discussion: Future of IT Talent? What does the skillset of future IT professionals look like? Dice.com Survey: Top-ten “Tough-to-fill” IT Skills: #1 Security #2 Virtualization © 2012, HyTrust, Inc. www.hytrust.com 11
  • 12. Audience Poll What security concern ranks highest in importance in your virtualized environments heading into 2012?  Lack of automation (admin is brought in for every update and change)  Self service for line of businesses to access/manage their virtual machines  Strength of security policies and processes around access and change controls  Insider threat – either malicious or errant  Logging and reporting tools for audit and/or forensics purposes  All of the above © 2012, HyTrust, Inc. www.hytrust.com © 2011, HyTrust, Inc. Inc. www.hytrust.com 12 © 2012, HyTrust, www.hytrust.com
  • 13. Best Practices and Guidance – What Can You Do Today? Consider the right access for the right people in your virtual environs  Cut back or eliminate access rights for those not on the projects  Manage the networks as well  Take full inventory on regular basis Automate to drive scalability  Consider management tools to streamline workflow  Drive security policy automation to prevent mistakes © 2012, HyTrust, Inc. www.hytrust.com 13
  • 14. Best Practices and Guidance – What Can You Do Today? Create the business case for change  Show costs of Not doing it (i.e. 87%)  Be proactive and collaborative with IT, Security to understand and identify the business problem  Create a plan Don’t be scared! © 2012, HyTrust, Inc. www.hytrust.com 14
  • 15. hemma@hytrust.com  jrajendran@gnax.net  bob.west@echelonone.net  eric@hytrust.com  sales@hytrust.com © 2012, HyTrust, Inc. www.hytrust.com 15
  • 16. hemma@hytrust.com  jrajendran@gnax.net  bob.west@echelonone.net  eric@hytrust.com  sales@hytrust.com © 2012, HyTrust, Inc. www.hytrust.com 16
  • 17. hemma@hytrust.com  jrajendran@gnax.net  bob.west@echelonone.net  eric@hytrust.com  sales@hytrust.com © 2012, HyTrust, Inc. www.hytrust.com 17
  • 18. hemma@hytrust.com  jrajendran@gnax.net  bob.west@echelonone.net  eric@hytrust.com  sales@hytrust.com © 2012, HyTrust, Inc. www.hytrust.com 18