SlideShare una empresa de Scribd logo
1 de 27
Trepidation in Moving to
the Cloud
Dave Sobel
CEO, Evolve Technologies
www.comptia.org/emea2010
From http://geekandpoke.typepad.com 1
www.comptia.org/emea2010
Trepidation in Moving to the Cloud
Dave Sobel
CEO, Evolve Technologies
About Dave
• CEO, Evolve Technologies
– Washington DC IT Solution
Provider
– Microsoft Certified Partner
– Small Business Specialist
• HTG Member and Facilitator
• Author, “Virtualization: Defined. A
Primer for the SMB Consultant”
• Biz Blog:
www.evolvetech.com/blog
• Virtualization Blog:
www.smbvirtualization.net
• Microsoft MVP, Virtualization
• Columnist, Channel Insider
• Columnist, CRN
Today, more than ever, CIOs and their
organizations are under pressure…
VOLUME OF DIGITAL DATA
VARIETY OF INFORMATION
ECONOMIC PRESSURES THE DEMANDING CONSUMER
IT INTEGRATION
LAWS, REGULATIONS AND
STANDARDS
GROWTH OPPORTUNITIES
AVAILABILITY
RISING COST PRESSURES
HIGHER SERVICE EXPECTATIONS
EMERGING TECHNOLOGIES
5
IT infrastructure is reaching a breaking point.
85% idle
In distributed computing
environments, up to
85% of computing
capacity sits idle.
Consumer product and retail
industries lose about $40
billion annually, or 3.5 percent
of their sales, due to supply
chain inefficiencies.
33% of consumers notified
of a security breach will
terminate their relationship
with the company they
perceive as responsible.
33%$40 billion
Explosion of information
driving 54% growth in
storage shipments
every year.
1.5x 70¢ per $1
70% on average is spent
on maintaining current IT
infrastructures versus
adding new capabilities.
There are major forces of change at work,
affecting business and IT
Our world is smaller and flatter but it’s about to become more…
INSTRUMENTED
INTERCONNECTED
INTELLIGENT
Increasing access, globalization
and risk
Increasing devices and opportunity
for innovation
Increasing data and the use of technology
to capitalise on change
CEOs see an environment of unrelenting change, as well as opportunities to think
smarter - - economically, socially and technically.
7
Cloud spending to grow six times faster than traditional IT spending
USD 16.2 billion (2008)
57%
11%
18%
5%
9%
Storage Server
App Dev & Deployment Infrastructure
Bussiness Application
USD 42.3 billion (2012)
52%
9%
18%
13%
8%
Storage Server
App Dev & Deployment Infrastructure
Bussiness Application
• IDC forecasts the cloud computing services market to grow at a CAGR of 27 percent from USD 16.2 billion in 2008
to USD 42 billion in 2012. On the other hand, Gartner expects the worldwide cloud services revenue to cross USD 56.3
billion in 2009 to USD 150 billion by 2013.
• IDC estimates the traditional IT spending to grow at a CAGR of 7 percent to USD 494 billion in 2012 from USD 383
billion in 2008. Thus, the forecasted growth rate of cloud spending is six times that of traditional IT spending.
Size and Growth
By 2011, the world will be 10 times more instrumented then it was in 2006.
Internet connected devices will leap from 500M to 1 Trillion.
2005 2006 2007 2008 2009 2010 2011
0
200
400
600
800
1,000
1,200
1,400
1,600
1,800
Exabytes
RFID,
Digital TV,
MP3 players,
Digital cameras,
Camera phones, VoIP,
Medical imaging, Laptops,
smart meters, multi-player games,
Satellite images, GPS, ATMs, Scanners,
Sensors, Digital radio, DLP theaters, Telematics,
Peer-to-peer, Email, Instant messaging, Videoconferencing,
CAD/CAM, Toys, Industrial machines, Security systems, Appliances
10x
growth in
five years
Continuum of services overview
Time
Responsibilities/Risks
TransferedtoServiceProvider
“Do it yourself”
Bodyshopping
Out-tasking
Managed Services
Outsourcing
Source: www.google.com/trends
Customers’ expectations today and in perspective ?
Evolution Over The YearsAdoption
Time
1961
John McCarthy proposed
'computer time-sharing
technology' to be sold
through utility business
model (like electricity) in a
lecture at MIT
Mid 90’s
ASP (Application Service
Provider) model with
single tenant hosting of
applications
Early 00’s
SaaS (Software as a
Service) model with
multi-tenant hosting of
applications
Late 00’s
Cloud Computing with pay
as you go model, leveraging
virtualization for data center
efficiencies and faster
networks
13 Security and Cloud Computing
Customization, efficiency,
availability, resiliency,
security and privacy …
Standardization, capital
preservation, flexibility and
time to deploy …
Public …
• Access open to everybody,
subject to subscription
• Shared resources
• Multiple tenants
• Delivers select set of
standardized business process,
application and/or
infrastructure services on a
flexible price per use basis
• Always managed and hosted
by 3rd party
Private …
• Access limited to enterprise
and its partner network
• Dedicated resources
• Single tenant
• Drives efficiency,
standardization and best
practices while retaining
greater customization and
control
• Might be managed or hosted
by third party
Cloud Computing
Model
Cloud Services
Cloud Computing Delivery Models
Hybrid …
• Private infrastructure,
integrated with public cloud
Community …
• Several organizations with
similar needs and policies
share a private cloud
Public vs Private Cloud
Cloud Choices
Exclusive environment
Limited on-demand
capabilities
Private Cloud
On-demand resources,
scalability
Shared environment
Public Cloud
Requires Initial Capital Investment
Cloud setup within Org’s data center
Control on security and audit
Based on basic virtualization
Limited on-demand scaling
On-Premise Private Cloud
Exclusive, but hosted by a third party
Limited on-demand scaling
Expensive than public cloud
Cheaper than on-premise private cloud
Possibility of co-location
Externally Hosted Private Cloud
Hybrid Cloud
Public + Private
cloud
Source: TorryHarris Business Solutions on slideshare.net
USE CASES
USE CASES
17 Security and Cloud Computing
Compliance
Complying with PCI DSS
and other regulations may
prohibit the use of clouds for
some applications.
Reliability
High availability will be a key concern. IT
departments will worry about a loss of
service should outages occur.
Control
Many companies and governments
are uncomfortable with the idea of
their information located on systems
they do not control.
Security Management
Even the simplest of tasks may be behind
layers of abstraction or performed by
someone else.
Data
Migrating workloads to a shared
network and compute infrastructure
increases the potential for
unauthorized exposure.
Categories of Cloud Computing Risks
Providers must offer a high degree of
security transparency to help
put customers at ease.
Authentication and access
technologies become increasingly
important.
Mission critical applications may
not run in the cloud without
strong availability guarantees.
Comprehensive auditing
capabilities are essential.
Providers must supply easy controls to
manage security settings for application and
runtime environments.
18 Security and Cloud Computing
Of enterprises consider security
the #1 inhibitor to cloud adoptions
80%
Of enterprises are concerned
about the reliability of clouds
48%
Of respondents are concerned with cloud
interfering with their ability
to comply with regulations
33%
Source: Driving Profitable Growth Through Cloud Computing, IBM Study (conducted by Oliver Wyman)
“I prefer internal cloud to IaaS. When the service is
kept internally, I am more comfortable with the
security that it offers.”
“Security is the biggest concern. I don’t worry
much about the other “-ities” – reliability,
availability, etc.”
“How can we be assured that our data will not be
leaked and that the vendors have the technology
and the governance to control its employees from
stealing data?”
Security Remains the Top Concern for Cloud
Adoption
19 Security and Cloud Computing
Specific Customer Concerns Related to Security
Protection of intellectual property and data
Ability to enforce regulatory or contractual obligations
Unauthorized use of data
Confidentiality of data
Availability of data
Integrity of data
Ability to test or audit a provider’s environment
Other
30%
21%
15%
12%
9%
8%
6%
3%
Source: Deloitte Enterprise@Risk: Privacy and Data Protection Survey
USE CASES – and where the £’s are
USE CASES –
and where
the £’s are
dave@evolvetech.com
+44 (0)20 8002 9740 x111
www.smbvirtualization.net

Más contenido relacionado

La actualidad más candente

Cloud Computing Risk Management (Multi Venue)
Cloud Computing Risk Management (Multi Venue)Cloud Computing Risk Management (Multi Venue)
Cloud Computing Risk Management (Multi Venue)
Brian K. Dickard
 
HP2065_TieCon_Presentation_V7
HP2065_TieCon_Presentation_V7HP2065_TieCon_Presentation_V7
HP2065_TieCon_Presentation_V7
Mark Interrante
 
Privacy issues in the cloud final
Privacy issues in the cloud   finalPrivacy issues in the cloud   final
Privacy issues in the cloud final
guest50a642f
 

La actualidad más candente (20)

2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)
2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)
2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)
 
Cloud Computing in Indonesia
Cloud Computing in IndonesiaCloud Computing in Indonesia
Cloud Computing in Indonesia
 
Unified Endpoint Management: Security & Productivity for the Mobile Enterprise
Unified Endpoint Management: Security & Productivity for the Mobile EnterpriseUnified Endpoint Management: Security & Productivity for the Mobile Enterprise
Unified Endpoint Management: Security & Productivity for the Mobile Enterprise
 
Top 3 Reasons to Deliver Web Apps with Application Virtualization
Top 3 Reasons to Deliver Web Apps with Application VirtualizationTop 3 Reasons to Deliver Web Apps with Application Virtualization
Top 3 Reasons to Deliver Web Apps with Application Virtualization
 
Cloud Computing Risk Management (Multi Venue)
Cloud Computing Risk Management (Multi Venue)Cloud Computing Risk Management (Multi Venue)
Cloud Computing Risk Management (Multi Venue)
 
MT81 Keys to Successful Enterprise IoT Initiatives
MT81 Keys to Successful Enterprise IoT InitiativesMT81 Keys to Successful Enterprise IoT Initiatives
MT81 Keys to Successful Enterprise IoT Initiatives
 
IBM Security Strategy Intelligence,
IBM Security Strategy Intelligence,IBM Security Strategy Intelligence,
IBM Security Strategy Intelligence,
 
Ohm2013 cloud security 101 slideshare
Ohm2013 cloud security 101 slideshareOhm2013 cloud security 101 slideshare
Ohm2013 cloud security 101 slideshare
 
HP2065_TieCon_Presentation_V7
HP2065_TieCon_Presentation_V7HP2065_TieCon_Presentation_V7
HP2065_TieCon_Presentation_V7
 
Transforming Business with Citrix: Customers Share Their Stories.
Transforming Business with Citrix: Customers Share Their Stories.Transforming Business with Citrix: Customers Share Their Stories.
Transforming Business with Citrix: Customers Share Their Stories.
 
How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?
How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?
How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?
 
CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...
CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...
CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...
 
A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things
 
Privacy issues in the cloud final
Privacy issues in the cloud   finalPrivacy issues in the cloud   final
Privacy issues in the cloud final
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
 
Democratizing IT Automation in a Multi-Cloud World
Democratizing IT Automation in a Multi-Cloud WorldDemocratizing IT Automation in a Multi-Cloud World
Democratizing IT Automation in a Multi-Cloud World
 
Key Security Insights: Examining 2014 to predict emerging threats
Key Security Insights: Examining 2014 to predict emerging threats Key Security Insights: Examining 2014 to predict emerging threats
Key Security Insights: Examining 2014 to predict emerging threats
 
Cloud computing - Risks and Mitigation - GTS
Cloud computing - Risks and Mitigation - GTSCloud computing - Risks and Mitigation - GTS
Cloud computing - Risks and Mitigation - GTS
 
Desktop Virtualization: Reduce Costs, Improve Efficiencies with Proven VDI So...
Desktop Virtualization: Reduce Costs, Improve Efficiencies with Proven VDI So...Desktop Virtualization: Reduce Costs, Improve Efficiencies with Proven VDI So...
Desktop Virtualization: Reduce Costs, Improve Efficiencies with Proven VDI So...
 

Similar a EMEA10: Trepidation in Moving to the Cloud

F ernando sousa ibm_from hype to realiity
F ernando sousa ibm_from hype to realiityF ernando sousa ibm_from hype to realiity
F ernando sousa ibm_from hype to realiity
EuroCloud
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Razib M
 
Boston Cloud Dinner/Discussion November 2010
Boston Cloud Dinner/Discussion November 2010Boston Cloud Dinner/Discussion November 2010
Boston Cloud Dinner/Discussion November 2010
Ness Technologies
 
Cloud Computing in Business and facts
Cloud Computing in Business and factsCloud Computing in Business and facts
Cloud Computing in Business and facts
Arun Ganesh
 
Transcending IT Planetary Boundaries: Future of cloud, By Pradeep Gupta, Cha...
Transcending  IT Planetary Boundaries: Future of cloud, By Pradeep Gupta, Cha...Transcending  IT Planetary Boundaries: Future of cloud, By Pradeep Gupta, Cha...
Transcending IT Planetary Boundaries: Future of cloud, By Pradeep Gupta, Cha...
HCL Infosystems
 
Cloud Computing - A future prerogative
Cloud Computing - A future prerogativeCloud Computing - A future prerogative
Cloud Computing - A future prerogative
Wayne Poggenpoel
 
Indonesia new default short msp client presentation partnership with isv
Indonesia new default short msp client presentation   partnership with isvIndonesia new default short msp client presentation   partnership with isv
Indonesia new default short msp client presentation partnership with isv
Pandu W Sastrowardoyo
 
Keys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-CloudKeys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-Cloud
patmisasi
 

Similar a EMEA10: Trepidation in Moving to the Cloud (20)

F ernando sousa ibm_from hype to realiity
F ernando sousa ibm_from hype to realiityF ernando sousa ibm_from hype to realiity
F ernando sousa ibm_from hype to realiity
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
May 2013 Federal Cloud Computing Summit Keynote by David Cearly
May 2013 Federal Cloud Computing Summit Keynote by David CearlyMay 2013 Federal Cloud Computing Summit Keynote by David Cearly
May 2013 Federal Cloud Computing Summit Keynote by David Cearly
 
Boston Cloud Dinner/Discussion November 2010
Boston Cloud Dinner/Discussion November 2010Boston Cloud Dinner/Discussion November 2010
Boston Cloud Dinner/Discussion November 2010
 
cloud security ppt
cloud security ppt cloud security ppt
cloud security ppt
 
Cloud Security
Cloud Security Cloud Security
Cloud Security
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Enabling Cloud Computing
Enabling Cloud ComputingEnabling Cloud Computing
Enabling Cloud Computing
 
Business in the cloud
Business in the cloudBusiness in the cloud
Business in the cloud
 
Cloud Computing in Business and facts
Cloud Computing in Business and factsCloud Computing in Business and facts
Cloud Computing in Business and facts
 
2016 Cloud Unbound Briefing
2016 Cloud Unbound Briefing2016 Cloud Unbound Briefing
2016 Cloud Unbound Briefing
 
Transcending IT Planetary Boundaries: Future of cloud, By Pradeep Gupta, Cha...
Transcending  IT Planetary Boundaries: Future of cloud, By Pradeep Gupta, Cha...Transcending  IT Planetary Boundaries: Future of cloud, By Pradeep Gupta, Cha...
Transcending IT Planetary Boundaries: Future of cloud, By Pradeep Gupta, Cha...
 
Cloud Computing - A future prerogative
Cloud Computing - A future prerogativeCloud Computing - A future prerogative
Cloud Computing - A future prerogative
 
Indonesia new default short msp client presentation partnership with isv
Indonesia new default short msp client presentation   partnership with isvIndonesia new default short msp client presentation   partnership with isv
Indonesia new default short msp client presentation partnership with isv
 
MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night? MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night?
 
Bni cloud presentation
Bni cloud presentationBni cloud presentation
Bni cloud presentation
 
1 - Cloud Computing Basics.pptx
1 - Cloud Computing Basics.pptx1 - Cloud Computing Basics.pptx
1 - Cloud Computing Basics.pptx
 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud Computing
 
Keys to success and security in the cloud
Keys to success and security in the cloudKeys to success and security in the cloud
Keys to success and security in the cloud
 
Keys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-CloudKeys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-Cloud
 

Más de CompTIA UK

EMEA10: Practice Makes Perfect - Bringing Experiential Learning to Life
EMEA10: Practice Makes Perfect - Bringing Experiential Learning to LifeEMEA10: Practice Makes Perfect - Bringing Experiential Learning to Life
EMEA10: Practice Makes Perfect - Bringing Experiential Learning to Life
CompTIA UK
 

Más de CompTIA UK (10)

EMEA10: New Innovations from Pearson VUE for 2011
EMEA10: New Innovations from Pearson VUE for 2011EMEA10: New Innovations from Pearson VUE for 2011
EMEA10: New Innovations from Pearson VUE for 2011
 
EMEA10: Commercial certification in Further and Higher Education (developing ...
EMEA10: Commercial certification in Further and Higher Education (developing ...EMEA10: Commercial certification in Further and Higher Education (developing ...
EMEA10: Commercial certification in Further and Higher Education (developing ...
 
EMEA10: Procom - the OCR package
EMEA10: Procom - the OCR packageEMEA10: Procom - the OCR package
EMEA10: Procom - the OCR package
 
EMEA10: IT Training and Certification: Value to Employers
EMEA10: IT Training and Certification: Value to EmployersEMEA10: IT Training and Certification: Value to Employers
EMEA10: IT Training and Certification: Value to Employers
 
EMEA10: Opening Keynote: Sir Ranuplh Fiennes
EMEA10: Opening Keynote: Sir Ranuplh FiennesEMEA10: Opening Keynote: Sir Ranuplh Fiennes
EMEA10: Opening Keynote: Sir Ranuplh Fiennes
 
EMEA10: BTEC IT goes QCF
EMEA10: BTEC IT goes QCFEMEA10: BTEC IT goes QCF
EMEA10: BTEC IT goes QCF
 
EMEA10: Implementing CompTIA Strata Fundamentals Into Your Curriculum
EMEA10: Implementing CompTIA Strata Fundamentals Into Your CurriculumEMEA10: Implementing CompTIA Strata Fundamentals Into Your Curriculum
EMEA10: Implementing CompTIA Strata Fundamentals Into Your Curriculum
 
EMEA10: Delivering CompTIA Certifications: New opportunities with the QCF
EMEA10: Delivering CompTIA Certifications: New opportunities with the QCF EMEA10: Delivering CompTIA Certifications: New opportunities with the QCF
EMEA10: Delivering CompTIA Certifications: New opportunities with the QCF
 
EMEA10: Practice Makes Perfect - Bringing Experiential Learning to Life
EMEA10: Practice Makes Perfect - Bringing Experiential Learning to LifeEMEA10: Practice Makes Perfect - Bringing Experiential Learning to Life
EMEA10: Practice Makes Perfect - Bringing Experiential Learning to Life
 
EMEA10: E2C Welcome and Opening Keynote
EMEA10: E2C Welcome and Opening KeynoteEMEA10: E2C Welcome and Opening Keynote
EMEA10: E2C Welcome and Opening Keynote
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Último (20)

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

EMEA10: Trepidation in Moving to the Cloud

  • 1. Trepidation in Moving to the Cloud Dave Sobel CEO, Evolve Technologies
  • 3. www.comptia.org/emea2010 Trepidation in Moving to the Cloud Dave Sobel CEO, Evolve Technologies
  • 4. About Dave • CEO, Evolve Technologies – Washington DC IT Solution Provider – Microsoft Certified Partner – Small Business Specialist • HTG Member and Facilitator • Author, “Virtualization: Defined. A Primer for the SMB Consultant” • Biz Blog: www.evolvetech.com/blog • Virtualization Blog: www.smbvirtualization.net • Microsoft MVP, Virtualization • Columnist, Channel Insider • Columnist, CRN
  • 5. Today, more than ever, CIOs and their organizations are under pressure… VOLUME OF DIGITAL DATA VARIETY OF INFORMATION ECONOMIC PRESSURES THE DEMANDING CONSUMER IT INTEGRATION LAWS, REGULATIONS AND STANDARDS GROWTH OPPORTUNITIES AVAILABILITY RISING COST PRESSURES HIGHER SERVICE EXPECTATIONS EMERGING TECHNOLOGIES
  • 6. 5 IT infrastructure is reaching a breaking point. 85% idle In distributed computing environments, up to 85% of computing capacity sits idle. Consumer product and retail industries lose about $40 billion annually, or 3.5 percent of their sales, due to supply chain inefficiencies. 33% of consumers notified of a security breach will terminate their relationship with the company they perceive as responsible. 33%$40 billion Explosion of information driving 54% growth in storage shipments every year. 1.5x 70¢ per $1 70% on average is spent on maintaining current IT infrastructures versus adding new capabilities.
  • 7. There are major forces of change at work, affecting business and IT Our world is smaller and flatter but it’s about to become more… INSTRUMENTED INTERCONNECTED INTELLIGENT Increasing access, globalization and risk Increasing devices and opportunity for innovation Increasing data and the use of technology to capitalise on change CEOs see an environment of unrelenting change, as well as opportunities to think smarter - - economically, socially and technically.
  • 8. 7 Cloud spending to grow six times faster than traditional IT spending USD 16.2 billion (2008) 57% 11% 18% 5% 9% Storage Server App Dev & Deployment Infrastructure Bussiness Application USD 42.3 billion (2012) 52% 9% 18% 13% 8% Storage Server App Dev & Deployment Infrastructure Bussiness Application • IDC forecasts the cloud computing services market to grow at a CAGR of 27 percent from USD 16.2 billion in 2008 to USD 42 billion in 2012. On the other hand, Gartner expects the worldwide cloud services revenue to cross USD 56.3 billion in 2009 to USD 150 billion by 2013. • IDC estimates the traditional IT spending to grow at a CAGR of 7 percent to USD 494 billion in 2012 from USD 383 billion in 2008. Thus, the forecasted growth rate of cloud spending is six times that of traditional IT spending. Size and Growth
  • 9. By 2011, the world will be 10 times more instrumented then it was in 2006. Internet connected devices will leap from 500M to 1 Trillion. 2005 2006 2007 2008 2009 2010 2011 0 200 400 600 800 1,000 1,200 1,400 1,600 1,800 Exabytes RFID, Digital TV, MP3 players, Digital cameras, Camera phones, VoIP, Medical imaging, Laptops, smart meters, multi-player games, Satellite images, GPS, ATMs, Scanners, Sensors, Digital radio, DLP theaters, Telematics, Peer-to-peer, Email, Instant messaging, Videoconferencing, CAD/CAM, Toys, Industrial machines, Security systems, Appliances 10x growth in five years
  • 10. Continuum of services overview Time Responsibilities/Risks TransferedtoServiceProvider “Do it yourself” Bodyshopping Out-tasking Managed Services Outsourcing
  • 12. Customers’ expectations today and in perspective ?
  • 13. Evolution Over The YearsAdoption Time 1961 John McCarthy proposed 'computer time-sharing technology' to be sold through utility business model (like electricity) in a lecture at MIT Mid 90’s ASP (Application Service Provider) model with single tenant hosting of applications Early 00’s SaaS (Software as a Service) model with multi-tenant hosting of applications Late 00’s Cloud Computing with pay as you go model, leveraging virtualization for data center efficiencies and faster networks
  • 14. 13 Security and Cloud Computing Customization, efficiency, availability, resiliency, security and privacy … Standardization, capital preservation, flexibility and time to deploy … Public … • Access open to everybody, subject to subscription • Shared resources • Multiple tenants • Delivers select set of standardized business process, application and/or infrastructure services on a flexible price per use basis • Always managed and hosted by 3rd party Private … • Access limited to enterprise and its partner network • Dedicated resources • Single tenant • Drives efficiency, standardization and best practices while retaining greater customization and control • Might be managed or hosted by third party Cloud Computing Model Cloud Services Cloud Computing Delivery Models Hybrid … • Private infrastructure, integrated with public cloud Community … • Several organizations with similar needs and policies share a private cloud
  • 15. Public vs Private Cloud Cloud Choices Exclusive environment Limited on-demand capabilities Private Cloud On-demand resources, scalability Shared environment Public Cloud Requires Initial Capital Investment Cloud setup within Org’s data center Control on security and audit Based on basic virtualization Limited on-demand scaling On-Premise Private Cloud Exclusive, but hosted by a third party Limited on-demand scaling Expensive than public cloud Cheaper than on-premise private cloud Possibility of co-location Externally Hosted Private Cloud Hybrid Cloud Public + Private cloud Source: TorryHarris Business Solutions on slideshare.net
  • 18. 17 Security and Cloud Computing Compliance Complying with PCI DSS and other regulations may prohibit the use of clouds for some applications. Reliability High availability will be a key concern. IT departments will worry about a loss of service should outages occur. Control Many companies and governments are uncomfortable with the idea of their information located on systems they do not control. Security Management Even the simplest of tasks may be behind layers of abstraction or performed by someone else. Data Migrating workloads to a shared network and compute infrastructure increases the potential for unauthorized exposure. Categories of Cloud Computing Risks Providers must offer a high degree of security transparency to help put customers at ease. Authentication and access technologies become increasingly important. Mission critical applications may not run in the cloud without strong availability guarantees. Comprehensive auditing capabilities are essential. Providers must supply easy controls to manage security settings for application and runtime environments.
  • 19. 18 Security and Cloud Computing Of enterprises consider security the #1 inhibitor to cloud adoptions 80% Of enterprises are concerned about the reliability of clouds 48% Of respondents are concerned with cloud interfering with their ability to comply with regulations 33% Source: Driving Profitable Growth Through Cloud Computing, IBM Study (conducted by Oliver Wyman) “I prefer internal cloud to IaaS. When the service is kept internally, I am more comfortable with the security that it offers.” “Security is the biggest concern. I don’t worry much about the other “-ities” – reliability, availability, etc.” “How can we be assured that our data will not be leaked and that the vendors have the technology and the governance to control its employees from stealing data?” Security Remains the Top Concern for Cloud Adoption
  • 20. 19 Security and Cloud Computing Specific Customer Concerns Related to Security Protection of intellectual property and data Ability to enforce regulatory or contractual obligations Unauthorized use of data Confidentiality of data Availability of data Integrity of data Ability to test or audit a provider’s environment Other 30% 21% 15% 12% 9% 8% 6% 3% Source: Deloitte Enterprise@Risk: Privacy and Data Protection Survey
  • 21. USE CASES – and where the £’s are
  • 22. USE CASES – and where the £’s are
  • 23.
  • 24.
  • 25.
  • 26.
  • 27. dave@evolvetech.com +44 (0)20 8002 9740 x111 www.smbvirtualization.net