SlideShare una empresa de Scribd logo
1 de 28
THE EVOLUTION
                                                                     OF VIRTUAL
                                                                     MENTALITY
                                                                     Darrell Hyde
                                                                     Director of Architecture, Hosting.com




1   © Hosting.com | This document is confidential and proprietary.
2   © Hosting.com | This document is confidential and proprietary.
Our Foundation




                                      *    **


                                                                     *   *
                                                                         *

                                                                             * 2012 * 2012 Deployments
                                                                                    Deployments
                                                                                        * 2013 Deployments




3   © Hosting.com | This document is confidential and proprietary.
Cloud Enterprise Overview

    Launched in 2009
    Built on VMware vShpere 5
    Powered by:
              Juniper MX / EX Routing and Switching
              EMC CX4 and VNX Storage
              Dell R-Series Servers
    Supporting over 2600 VMs across over 180
     physical servers
    Distributed across 5 locations

4    © Hosting.com | This document is confidential and proprietary.
VIRTUAL MENTALITY 1.0
                   VS.
          VIRTUAL MENTALITY 2.0

5   © Hosting.com | This document is confidential and proprietary.
Virtual Mentality 1.0
    Adapt old service delivery mechanisms to
     fit virtual infrastructure

    Treat virtual machines like physical
     machines

    Force customers to understand physical
     network topology

6   © Hosting.com | This document is confidential and proprietary.
Service Delivery Goals
    Complete service parity
            Firewall + IDS
            VPN
            Load Balancing

    Hybrid from the start
            Customers can spin up VMs in existing VLANs
            New VMs can live behind existing firewalls
            New VMs can live in existing SLB pools

7   © Hosting.com | This document is confidential and proprietary.
How did we get there?
8   © Hosting.com | This document is confidential and proprietary.
How did we get there?
9   © Hosting.com | This document is confidential and proprietary.
How did we get there?
10   © Hosting.com | This document is confidential and proprietary.
What problems did this create?

     Complicated layer 2 topology
     “You guys have a lot of VLANs.”
     Pain for customers who want to adopt in-
      line services
     Increased operational overhead
     Tight coupling of services with network
      topology
     High rate of change

11   © Hosting.com | This document is confidential and proprietary.
Virtual Mentality 2.0

     Leverage the hypervisor to offload
      services

     Less dependency on network topology

     Simpler provisioning experience for
      customers


12   © Hosting.com | This document is confidential and proprietary.
Cloud Firewall

     Security policy decoupled from network
      topology

     Customers can provision and manage the
      product independent of network topology

     Zero-impact install experience

     Self-service user interface
13   © Hosting.com | This document is confidential and proprietary.
Best of Breed Technology and Approach

                VLANs & Physical                                               Traditional                                        Purpose Built
      1         Segmentation                                         2         Security Agents                              3     Virtual Security



           VM1           VM2            VM3                              VM1         VM2         VM3                            VM1           VM2              VM3




                                                                                                                                                                     ESX/ESXi Host
                                                                                                            ESX/ESXi Host
                                                     ESX/ESXi Host




                                VS                                                         VS
                                                                                                                                      Virtual Security Layer

                                                                                                                                                      VS
                   HYPERVISOR                                                    HYPERVISOR




                                                                                                                                        HYPERVISOR

                                                                               Regular Thick Agent for FW


      Complex VLAN networking; Lacks                                 Tedious agent installation on each                     Seamless hypervisor integration;
     hypervisor visibility; High overhead                            VM; significant performance issues                     Optimized performance; Dynamic
                                                                                                                                        security



14   © Hosting.com | This document is confidential and proprietary.
Shared Customer Pod




15   © Hosting.com | This document is confidential and proprietary.
Shared Customer Pod




16   © Hosting.com | This document is confidential and proprietary.
Shared Customer Pod




17   © Hosting.com | This document is confidential and proprietary.
Shared Customer Pod




18   © Hosting.com | This document is confidential and proprietary.
Easily Scales to Support Growth




19   © Hosting.com | This document is confidential and proprietary.
Provides Additional Security at Layer 2




20   © Hosting.com | This document is confidential and proprietary.
User Experience

     1. Simple ordering process
             Less than 15 clicks from order to secure
             Ready to manage in less than 10 minutes


     2. Group VMs based on role or application

     3. Create policies


21   © Hosting.com | This document is confidential and proprietary.
Step 1: Ordering




22   © Hosting.com | This document is confidential and proprietary.
Step 2: Create groups




23   © Hosting.com | This document is confidential and proprietary.
Step 3: Create policies




24   © Hosting.com | This document is confidential and proprietary.
Step 3: Create policies




25   © Hosting.com | This document is confidential and proprietary.
Step 3: Create policies




26   © Hosting.com | This document is confidential and proprietary.
Conclusion

     • Hypervisor isn’t just another endpoint on
       your network – it’s an extension of it

     • Customers think of security in terms of
       applications, not networks

     • Virtualization allows you to decouple
       services from the network

27   © Hosting.com | This document is confidential and proprietary.
Thank you!



                                                          Questions?
                    Darrell Hyde – darrell@hosting.com




28   © Hosting.com | This document is confidential and proprietary.

Más contenido relacionado

Destacado

Virtual Machines
Virtual MachinesVirtual Machines
Virtual MachinesJoa Ebert
 
What is Kernel, basic idea of kernel
What is Kernel, basic idea of kernelWhat is Kernel, basic idea of kernel
What is Kernel, basic idea of kernelNeel Parikh
 
Characteristics of a network operating system
Characteristics of a network operating systemCharacteristics of a network operating system
Characteristics of a network operating systemRon McGary
 
Network Operating System
Network Operating SystemNetwork Operating System
Network Operating Systemisma ishak
 
System Booting Process overview
System Booting Process overviewSystem Booting Process overview
System Booting Process overviewRajKumar Rampelli
 
Network operating system
Network operating systemNetwork operating system
Network operating systemMuhammad Shahid
 
Booting of Computer System
Booting of Computer SystemBooting of Computer System
Booting of Computer SystemArzath Areeff
 
Kernel mode vs user mode in linux
Kernel mode vs user mode in linuxKernel mode vs user mode in linux
Kernel mode vs user mode in linuxSiddique Ibrahim
 
SQLcl overview - A new Command Line Interface for Oracle Database
SQLcl overview - A new Command Line Interface for Oracle DatabaseSQLcl overview - A new Command Line Interface for Oracle Database
SQLcl overview - A new Command Line Interface for Oracle DatabaseJeff Smith
 
booting steps of a computer
booting steps of a computerbooting steps of a computer
booting steps of a computerAnusha Babooa
 
Booting Android: bootloaders, fastboot and boot images
Booting Android: bootloaders, fastboot and boot imagesBooting Android: bootloaders, fastboot and boot images
Booting Android: bootloaders, fastboot and boot imagesChris Simmonds
 
Shell structures- advanced building construction
Shell structures- advanced building constructionShell structures- advanced building construction
Shell structures- advanced building constructionShweta Modi
 

Destacado (15)

Virtual Machines
Virtual MachinesVirtual Machines
Virtual Machines
 
Virtual machine
Virtual machineVirtual machine
Virtual machine
 
What is Kernel, basic idea of kernel
What is Kernel, basic idea of kernelWhat is Kernel, basic idea of kernel
What is Kernel, basic idea of kernel
 
Characteristics of a network operating system
Characteristics of a network operating systemCharacteristics of a network operating system
Characteristics of a network operating system
 
Network Operating System
Network Operating SystemNetwork Operating System
Network Operating System
 
System Booting Process overview
System Booting Process overviewSystem Booting Process overview
System Booting Process overview
 
Network operating system
Network operating systemNetwork operating system
Network operating system
 
Booting of Computer System
Booting of Computer SystemBooting of Computer System
Booting of Computer System
 
Network operating system
Network operating systemNetwork operating system
Network operating system
 
Kernel mode vs user mode in linux
Kernel mode vs user mode in linuxKernel mode vs user mode in linux
Kernel mode vs user mode in linux
 
Virtual machine
Virtual machineVirtual machine
Virtual machine
 
SQLcl overview - A new Command Line Interface for Oracle Database
SQLcl overview - A new Command Line Interface for Oracle DatabaseSQLcl overview - A new Command Line Interface for Oracle Database
SQLcl overview - A new Command Line Interface for Oracle Database
 
booting steps of a computer
booting steps of a computerbooting steps of a computer
booting steps of a computer
 
Booting Android: bootloaders, fastboot and boot images
Booting Android: bootloaders, fastboot and boot imagesBooting Android: bootloaders, fastboot and boot images
Booting Android: bootloaders, fastboot and boot images
 
Shell structures- advanced building construction
Shell structures- advanced building constructionShell structures- advanced building construction
Shell structures- advanced building construction
 

Similar a The Evolution of Virtual Mentality

Juniper and VMware: Taking Data Centre Networks to the Next Level
Juniper and VMware: Taking Data Centre Networks to the Next LevelJuniper and VMware: Taking Data Centre Networks to the Next Level
Juniper and VMware: Taking Data Centre Networks to the Next LevelJuniper Networks
 
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...Ixia
 
Desktopvirtualisatie met VMware View, de laatste ontwikkelingen
Desktopvirtualisatie met VMware View, de laatste ontwikkelingenDesktopvirtualisatie met VMware View, de laatste ontwikkelingen
Desktopvirtualisatie met VMware View, de laatste ontwikkelingenUNIT4 IT Solutions
 
What’s new in vShield 5
What’s new in vShield 5What’s new in vShield 5
What’s new in vShield 5Eric Sloof
 
Vmware Seminar Security & Compliance for the cloud with Trend Micro
Vmware Seminar Security & Compliance for the cloud with Trend MicroVmware Seminar Security & Compliance for the cloud with Trend Micro
Vmware Seminar Security & Compliance for the cloud with Trend MicroGraeme Wood
 
Vss Security And Compliance For The Cloud
Vss Security And Compliance For The CloudVss Security And Compliance For The Cloud
Vss Security And Compliance For The CloudGraeme Wood
 
Webinar: eFolder Expert Series: Five Technologies from AppAssure to Boost You...
Webinar: eFolder Expert Series: Five Technologies from AppAssure to Boost You...Webinar: eFolder Expert Series: Five Technologies from AppAssure to Boost You...
Webinar: eFolder Expert Series: Five Technologies from AppAssure to Boost You...Dropbox
 
Onboarding For Public Private And Hybrid Clouds Aws 30.04.09
Onboarding For Public Private And Hybrid Clouds Aws 30.04.09Onboarding For Public Private And Hybrid Clouds Aws 30.04.09
Onboarding For Public Private And Hybrid Clouds Aws 30.04.09Chris Purrington
 
CloudPassage Overview
CloudPassage OverviewCloudPassage Overview
CloudPassage OverviewCloudPassage
 
How Multi-Cloud Load Balancing Automates Application Delivery and Drives Oper...
How Multi-Cloud Load Balancing Automates Application Delivery and Drives Oper...How Multi-Cloud Load Balancing Automates Application Delivery and Drives Oper...
How Multi-Cloud Load Balancing Automates Application Delivery and Drives Oper...Avi Networks
 
VMware and Trend Micro, partnering to revolutionise virtualised security
VMware and Trend Micro, partnering to revolutionise virtualised securityVMware and Trend Micro, partnering to revolutionise virtualised security
VMware and Trend Micro, partnering to revolutionise virtualised securityArrow ECS UK
 
Future of the Cloud: Cloud Platform APIs are the Business of Computing
Future of the Cloud: Cloud Platform APIs are the Business of ComputingFuture of the Cloud: Cloud Platform APIs are the Business of Computing
Future of the Cloud: Cloud Platform APIs are the Business of ComputingReadWrite
 
Future of the Cloud: Cloud Platform APIs are the Business of Computing
Future of the Cloud: Cloud Platform APIs are the Business of ComputingFuture of the Cloud: Cloud Platform APIs are the Business of Computing
Future of the Cloud: Cloud Platform APIs are the Business of ComputingTriompheConsulting
 
Transformace IT s technologiemi VMware
Transformace IT s technologiemi VMwareTransformace IT s technologiemi VMware
Transformace IT s technologiemi VMwareMarketingArrowECS_CZ
 
2021 二月份 Veeam 與解決方案概觀
2021 二月份 Veeam 與解決方案概觀 2021 二月份 Veeam 與解決方案概觀
2021 二月份 Veeam 與解決方案概觀 Wales Chen
 
V mwarev sphere5.1notes-v2
V mwarev sphere5.1notes-v2V mwarev sphere5.1notes-v2
V mwarev sphere5.1notes-v2karanamsaibabu
 
V c loudapi_coffeetalk__pimplaskar_may2010
V c loudapi_coffeetalk__pimplaskar_may2010V c loudapi_coffeetalk__pimplaskar_may2010
V c loudapi_coffeetalk__pimplaskar_may2010Pablo Roesch
 
VMware Tanzu Introduction
VMware Tanzu IntroductionVMware Tanzu Introduction
VMware Tanzu IntroductionVMware Tanzu
 
Transform Your Business with VMware Cloud on AWS, an Integrated Hybrid Approa...
Transform Your Business with VMware Cloud on AWS, an Integrated Hybrid Approa...Transform Your Business with VMware Cloud on AWS, an Integrated Hybrid Approa...
Transform Your Business with VMware Cloud on AWS, an Integrated Hybrid Approa...Amazon Web Services
 

Similar a The Evolution of Virtual Mentality (20)

Juniper and VMware: Taking Data Centre Networks to the Next Level
Juniper and VMware: Taking Data Centre Networks to the Next LevelJuniper and VMware: Taking Data Centre Networks to the Next Level
Juniper and VMware: Taking Data Centre Networks to the Next Level
 
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
 
Desktopvirtualisatie met VMware View, de laatste ontwikkelingen
Desktopvirtualisatie met VMware View, de laatste ontwikkelingenDesktopvirtualisatie met VMware View, de laatste ontwikkelingen
Desktopvirtualisatie met VMware View, de laatste ontwikkelingen
 
What’s new in vShield 5
What’s new in vShield 5What’s new in vShield 5
What’s new in vShield 5
 
Vmware Seminar Security & Compliance for the cloud with Trend Micro
Vmware Seminar Security & Compliance for the cloud with Trend MicroVmware Seminar Security & Compliance for the cloud with Trend Micro
Vmware Seminar Security & Compliance for the cloud with Trend Micro
 
Vss Security And Compliance For The Cloud
Vss Security And Compliance For The CloudVss Security And Compliance For The Cloud
Vss Security And Compliance For The Cloud
 
Webinar: eFolder Expert Series: Five Technologies from AppAssure to Boost You...
Webinar: eFolder Expert Series: Five Technologies from AppAssure to Boost You...Webinar: eFolder Expert Series: Five Technologies from AppAssure to Boost You...
Webinar: eFolder Expert Series: Five Technologies from AppAssure to Boost You...
 
Onboarding For Public Private And Hybrid Clouds Aws 30.04.09
Onboarding For Public Private And Hybrid Clouds Aws 30.04.09Onboarding For Public Private And Hybrid Clouds Aws 30.04.09
Onboarding For Public Private And Hybrid Clouds Aws 30.04.09
 
VMware vSphere5.1 Training
VMware vSphere5.1 TrainingVMware vSphere5.1 Training
VMware vSphere5.1 Training
 
CloudPassage Overview
CloudPassage OverviewCloudPassage Overview
CloudPassage Overview
 
How Multi-Cloud Load Balancing Automates Application Delivery and Drives Oper...
How Multi-Cloud Load Balancing Automates Application Delivery and Drives Oper...How Multi-Cloud Load Balancing Automates Application Delivery and Drives Oper...
How Multi-Cloud Load Balancing Automates Application Delivery and Drives Oper...
 
VMware and Trend Micro, partnering to revolutionise virtualised security
VMware and Trend Micro, partnering to revolutionise virtualised securityVMware and Trend Micro, partnering to revolutionise virtualised security
VMware and Trend Micro, partnering to revolutionise virtualised security
 
Future of the Cloud: Cloud Platform APIs are the Business of Computing
Future of the Cloud: Cloud Platform APIs are the Business of ComputingFuture of the Cloud: Cloud Platform APIs are the Business of Computing
Future of the Cloud: Cloud Platform APIs are the Business of Computing
 
Future of the Cloud: Cloud Platform APIs are the Business of Computing
Future of the Cloud: Cloud Platform APIs are the Business of ComputingFuture of the Cloud: Cloud Platform APIs are the Business of Computing
Future of the Cloud: Cloud Platform APIs are the Business of Computing
 
Transformace IT s technologiemi VMware
Transformace IT s technologiemi VMwareTransformace IT s technologiemi VMware
Transformace IT s technologiemi VMware
 
2021 二月份 Veeam 與解決方案概觀
2021 二月份 Veeam 與解決方案概觀 2021 二月份 Veeam 與解決方案概觀
2021 二月份 Veeam 與解決方案概觀
 
V mwarev sphere5.1notes-v2
V mwarev sphere5.1notes-v2V mwarev sphere5.1notes-v2
V mwarev sphere5.1notes-v2
 
V c loudapi_coffeetalk__pimplaskar_may2010
V c loudapi_coffeetalk__pimplaskar_may2010V c loudapi_coffeetalk__pimplaskar_may2010
V c loudapi_coffeetalk__pimplaskar_may2010
 
VMware Tanzu Introduction
VMware Tanzu IntroductionVMware Tanzu Introduction
VMware Tanzu Introduction
 
Transform Your Business with VMware Cloud on AWS, an Integrated Hybrid Approa...
Transform Your Business with VMware Cloud on AWS, an Integrated Hybrid Approa...Transform Your Business with VMware Cloud on AWS, an Integrated Hybrid Approa...
Transform Your Business with VMware Cloud on AWS, an Integrated Hybrid Approa...
 

Más de Juniper Networks

Why Juniper, Driven by Mist AI, Leads the Market
 Why Juniper, Driven by Mist AI, Leads the Market Why Juniper, Driven by Mist AI, Leads the Market
Why Juniper, Driven by Mist AI, Leads the MarketJuniper Networks
 
Experience the AI-Driven Enterprise
Experience the AI-Driven EnterpriseExperience the AI-Driven Enterprise
Experience the AI-Driven EnterpriseJuniper Networks
 
How AI Simplifies Troubleshooting Your WAN
How AI Simplifies Troubleshooting Your WANHow AI Simplifies Troubleshooting Your WAN
How AI Simplifies Troubleshooting Your WANJuniper Networks
 
Real AI. Real Results. Mist AI Customer Testimonials.
Real AI. Real Results. Mist AI Customer Testimonials.Real AI. Real Results. Mist AI Customer Testimonials.
Real AI. Real Results. Mist AI Customer Testimonials.Juniper Networks
 
Are you able to deliver reliable experiences for connected devices
Are you able to deliver reliable experiences for connected devicesAre you able to deliver reliable experiences for connected devices
Are you able to deliver reliable experiences for connected devicesJuniper Networks
 
Stop Doing These 5 Things with Your SD-WAN
Stop Doing These 5 Things with Your SD-WANStop Doing These 5 Things with Your SD-WAN
Stop Doing These 5 Things with Your SD-WANJuniper Networks
 
Securing IoT at Scale Requires a Holistic Approach
Securing IoT at Scale Requires a Holistic ApproachSecuring IoT at Scale Requires a Holistic Approach
Securing IoT at Scale Requires a Holistic ApproachJuniper Networks
 
Smart Solutions for Smart Communities: What's Next & Who's Responsible?
Smart Solutions for Smart Communities: What's Next & Who's Responsible?Smart Solutions for Smart Communities: What's Next & Who's Responsible?
Smart Solutions for Smart Communities: What's Next & Who's Responsible?Juniper Networks
 
Are You Ready for Digital Cohesion?
Are You Ready for Digital Cohesion?Are You Ready for Digital Cohesion?
Are You Ready for Digital Cohesion?Juniper Networks
 
Juniper vSRX - Fast Performance, Low TCO
Juniper vSRX - Fast Performance, Low TCOJuniper vSRX - Fast Performance, Low TCO
Juniper vSRX - Fast Performance, Low TCOJuniper Networks
 
SDN and NFV: Transforming the Service Provider Organization
SDN and NFV: Transforming the Service Provider OrganizationSDN and NFV: Transforming the Service Provider Organization
SDN and NFV: Transforming the Service Provider OrganizationJuniper Networks
 
Navigating the Uncertain World Facing Service Providers - Juniper's Perspective
Navigating the Uncertain World Facing Service Providers - Juniper's PerspectiveNavigating the Uncertain World Facing Service Providers - Juniper's Perspective
Navigating the Uncertain World Facing Service Providers - Juniper's PerspectiveJuniper Networks
 
vSRX Buyer’s Guide infographic - Juniper Networks
vSRX Buyer’s Guide infographic - Juniper Networks vSRX Buyer’s Guide infographic - Juniper Networks
vSRX Buyer’s Guide infographic - Juniper Networks Juniper Networks
 
NFV Solutions for the Telco Cloud
NFV Solutions for the Telco Cloud NFV Solutions for the Telco Cloud
NFV Solutions for the Telco Cloud Juniper Networks
 
Juniper SRX5800 Infographic
Juniper SRX5800 InfographicJuniper SRX5800 Infographic
Juniper SRX5800 InfographicJuniper Networks
 
Infographic: 90% MetaFabric Customer Satisfaction
Infographic: 90% MetaFabric Customer SatisfactionInfographic: 90% MetaFabric Customer Satisfaction
Infographic: 90% MetaFabric Customer SatisfactionJuniper Networks
 
Infographic: Whack Hackers Lightning Fast
Infographic: Whack Hackers Lightning FastInfographic: Whack Hackers Lightning Fast
Infographic: Whack Hackers Lightning FastJuniper Networks
 
High performance data center computing using manageable distributed computing
High performance data center computing using manageable distributed computingHigh performance data center computing using manageable distributed computing
High performance data center computing using manageable distributed computingJuniper Networks
 

Más de Juniper Networks (20)

Why Juniper, Driven by Mist AI, Leads the Market
 Why Juniper, Driven by Mist AI, Leads the Market Why Juniper, Driven by Mist AI, Leads the Market
Why Juniper, Driven by Mist AI, Leads the Market
 
Experience the AI-Driven Enterprise
Experience the AI-Driven EnterpriseExperience the AI-Driven Enterprise
Experience the AI-Driven Enterprise
 
How AI Simplifies Troubleshooting Your WAN
How AI Simplifies Troubleshooting Your WANHow AI Simplifies Troubleshooting Your WAN
How AI Simplifies Troubleshooting Your WAN
 
Real AI. Real Results. Mist AI Customer Testimonials.
Real AI. Real Results. Mist AI Customer Testimonials.Real AI. Real Results. Mist AI Customer Testimonials.
Real AI. Real Results. Mist AI Customer Testimonials.
 
SD-WAN, Meet MARVIS.
SD-WAN, Meet MARVIS.SD-WAN, Meet MARVIS.
SD-WAN, Meet MARVIS.
 
Are you able to deliver reliable experiences for connected devices
Are you able to deliver reliable experiences for connected devicesAre you able to deliver reliable experiences for connected devices
Are you able to deliver reliable experiences for connected devices
 
Stop Doing These 5 Things with Your SD-WAN
Stop Doing These 5 Things with Your SD-WANStop Doing These 5 Things with Your SD-WAN
Stop Doing These 5 Things with Your SD-WAN
 
Securing IoT at Scale Requires a Holistic Approach
Securing IoT at Scale Requires a Holistic ApproachSecuring IoT at Scale Requires a Holistic Approach
Securing IoT at Scale Requires a Holistic Approach
 
Smart Solutions for Smart Communities: What's Next & Who's Responsible?
Smart Solutions for Smart Communities: What's Next & Who's Responsible?Smart Solutions for Smart Communities: What's Next & Who's Responsible?
Smart Solutions for Smart Communities: What's Next & Who's Responsible?
 
What's Your IT Alter Ego?
What's Your IT Alter Ego?What's Your IT Alter Ego?
What's Your IT Alter Ego?
 
Are You Ready for Digital Cohesion?
Are You Ready for Digital Cohesion?Are You Ready for Digital Cohesion?
Are You Ready for Digital Cohesion?
 
Juniper vSRX - Fast Performance, Low TCO
Juniper vSRX - Fast Performance, Low TCOJuniper vSRX - Fast Performance, Low TCO
Juniper vSRX - Fast Performance, Low TCO
 
SDN and NFV: Transforming the Service Provider Organization
SDN and NFV: Transforming the Service Provider OrganizationSDN and NFV: Transforming the Service Provider Organization
SDN and NFV: Transforming the Service Provider Organization
 
Navigating the Uncertain World Facing Service Providers - Juniper's Perspective
Navigating the Uncertain World Facing Service Providers - Juniper's PerspectiveNavigating the Uncertain World Facing Service Providers - Juniper's Perspective
Navigating the Uncertain World Facing Service Providers - Juniper's Perspective
 
vSRX Buyer’s Guide infographic - Juniper Networks
vSRX Buyer’s Guide infographic - Juniper Networks vSRX Buyer’s Guide infographic - Juniper Networks
vSRX Buyer’s Guide infographic - Juniper Networks
 
NFV Solutions for the Telco Cloud
NFV Solutions for the Telco Cloud NFV Solutions for the Telco Cloud
NFV Solutions for the Telco Cloud
 
Juniper SRX5800 Infographic
Juniper SRX5800 InfographicJuniper SRX5800 Infographic
Juniper SRX5800 Infographic
 
Infographic: 90% MetaFabric Customer Satisfaction
Infographic: 90% MetaFabric Customer SatisfactionInfographic: 90% MetaFabric Customer Satisfaction
Infographic: 90% MetaFabric Customer Satisfaction
 
Infographic: Whack Hackers Lightning Fast
Infographic: Whack Hackers Lightning FastInfographic: Whack Hackers Lightning Fast
Infographic: Whack Hackers Lightning Fast
 
High performance data center computing using manageable distributed computing
High performance data center computing using manageable distributed computingHigh performance data center computing using manageable distributed computing
High performance data center computing using manageable distributed computing
 

Último

The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 

Último (20)

The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 

The Evolution of Virtual Mentality

  • 1. THE EVOLUTION OF VIRTUAL MENTALITY Darrell Hyde Director of Architecture, Hosting.com 1 © Hosting.com | This document is confidential and proprietary.
  • 2. 2 © Hosting.com | This document is confidential and proprietary.
  • 3. Our Foundation * ** * * * * 2012 * 2012 Deployments Deployments * 2013 Deployments 3 © Hosting.com | This document is confidential and proprietary.
  • 4. Cloud Enterprise Overview Launched in 2009 Built on VMware vShpere 5 Powered by:  Juniper MX / EX Routing and Switching  EMC CX4 and VNX Storage  Dell R-Series Servers Supporting over 2600 VMs across over 180 physical servers Distributed across 5 locations 4 © Hosting.com | This document is confidential and proprietary.
  • 5. VIRTUAL MENTALITY 1.0 VS. VIRTUAL MENTALITY 2.0 5 © Hosting.com | This document is confidential and proprietary.
  • 6. Virtual Mentality 1.0 Adapt old service delivery mechanisms to fit virtual infrastructure Treat virtual machines like physical machines Force customers to understand physical network topology 6 © Hosting.com | This document is confidential and proprietary.
  • 7. Service Delivery Goals Complete service parity Firewall + IDS VPN Load Balancing Hybrid from the start Customers can spin up VMs in existing VLANs New VMs can live behind existing firewalls New VMs can live in existing SLB pools 7 © Hosting.com | This document is confidential and proprietary.
  • 8. How did we get there? 8 © Hosting.com | This document is confidential and proprietary.
  • 9. How did we get there? 9 © Hosting.com | This document is confidential and proprietary.
  • 10. How did we get there? 10 © Hosting.com | This document is confidential and proprietary.
  • 11. What problems did this create? Complicated layer 2 topology “You guys have a lot of VLANs.” Pain for customers who want to adopt in- line services Increased operational overhead Tight coupling of services with network topology High rate of change 11 © Hosting.com | This document is confidential and proprietary.
  • 12. Virtual Mentality 2.0 Leverage the hypervisor to offload services Less dependency on network topology Simpler provisioning experience for customers 12 © Hosting.com | This document is confidential and proprietary.
  • 13. Cloud Firewall Security policy decoupled from network topology Customers can provision and manage the product independent of network topology Zero-impact install experience Self-service user interface 13 © Hosting.com | This document is confidential and proprietary.
  • 14. Best of Breed Technology and Approach VLANs & Physical Traditional Purpose Built 1 Segmentation 2 Security Agents 3 Virtual Security VM1 VM2 VM3 VM1 VM2 VM3 VM1 VM2 VM3 ESX/ESXi Host ESX/ESXi Host ESX/ESXi Host VS VS Virtual Security Layer VS HYPERVISOR HYPERVISOR HYPERVISOR Regular Thick Agent for FW Complex VLAN networking; Lacks Tedious agent installation on each Seamless hypervisor integration; hypervisor visibility; High overhead VM; significant performance issues Optimized performance; Dynamic security 14 © Hosting.com | This document is confidential and proprietary.
  • 15. Shared Customer Pod 15 © Hosting.com | This document is confidential and proprietary.
  • 16. Shared Customer Pod 16 © Hosting.com | This document is confidential and proprietary.
  • 17. Shared Customer Pod 17 © Hosting.com | This document is confidential and proprietary.
  • 18. Shared Customer Pod 18 © Hosting.com | This document is confidential and proprietary.
  • 19. Easily Scales to Support Growth 19 © Hosting.com | This document is confidential and proprietary.
  • 20. Provides Additional Security at Layer 2 20 © Hosting.com | This document is confidential and proprietary.
  • 21. User Experience 1. Simple ordering process Less than 15 clicks from order to secure Ready to manage in less than 10 minutes 2. Group VMs based on role or application 3. Create policies 21 © Hosting.com | This document is confidential and proprietary.
  • 22. Step 1: Ordering 22 © Hosting.com | This document is confidential and proprietary.
  • 23. Step 2: Create groups 23 © Hosting.com | This document is confidential and proprietary.
  • 24. Step 3: Create policies 24 © Hosting.com | This document is confidential and proprietary.
  • 25. Step 3: Create policies 25 © Hosting.com | This document is confidential and proprietary.
  • 26. Step 3: Create policies 26 © Hosting.com | This document is confidential and proprietary.
  • 27. Conclusion • Hypervisor isn’t just another endpoint on your network – it’s an extension of it • Customers think of security in terms of applications, not networks • Virtualization allows you to decouple services from the network 27 © Hosting.com | This document is confidential and proprietary.
  • 28. Thank you! Questions? Darrell Hyde – darrell@hosting.com 28 © Hosting.com | This document is confidential and proprietary.