SlideShare una empresa de Scribd logo
1 de 17
Descargar para leer sin conexión
Securing and Governing Cloud Services
                                        Bill Forsyth
A Savvis Case Study                        VP Eng.
Savvis

        Global leader in cloud infrastructure and hosted IT solutions for enterprises

        Key Metrics
              – Nearly 2,500 unique business and government clients, including more than 30 of
                the top 100 companies in the Fortune 500
              – More than 2,200 employees with deep expertise in technical operations, customer
                support, engineering and consulting
              – $933 million in revenue in 2010

        Services
              – Cloud – one of the industry’s broadest lines of enterprise-class cloud services
              – Colocation, Managed Hosting and Utility Compute – facilities and operations;
                compute, storage and network
              – Network – converged applications; community of interest networks; private lines;
                Internet
              – Security – managed security services and consulting
              – Industry Solutions – financial, government and Software-as-a-Service (SaaS)
              – Professional Services – infrastructure, security, business continuity, compliance and
                program management



2
Savvis Proprietary & Confidential
Savvis Symphony Family

        Savvis Symphony Dedicated: Hosted Private Cloud solution
        Savvis Symphony Open: Flexible Multi-Tenant Cloud solution
        Savvis Symphony VPDC: Virtual Private Data Center solution



                                                                 Savvis Symphony Open
                                                              Multi-Tenant virtual infrastructure
                                                                                                        Savvis Symphony VPDC
                          Savvis Symphony Dedicated
                                                                                                    Complete Virtual Private Data Centers
                          Dedicated, virtual infrastructure




3
Savvis Proprietary & Confidential
Customer Requirements

        Enterprise customers wanting flexibility and cost benefits of multi-
         tenant public clouds, in a private secure fashion
        APIs expose/control the VPDC (compute, storage, network, and
         security policy)
        APIs may be private or public
        For public APIs
              – Bad actors
              – Accidental misuse
        Compliance
              – FISMA
              – PCI




4
Savvis Proprietary & Confidential
Cloud Definition




                                                       Essential
                                                       Characteristics




                                                       Service
                                                       Models




                                                       Deployment
                                                       Models




5
                                               5
Savvis Proprietary & Confidential
Layer7 Detail




6
Savvis Proprietary & Confidential
VPDC System Boundaries

                                                                    Cloud Site

                                                   Management Network                           Management                  Multitenant Virtual
                                                                                                Services POD                Data Center (VDC)
                                                                        Services POD
                                                                                           Virtualization                       Compute POD
                                                                                                                  DNS
                                                                                             Manager
                                                                      AD/LDAP     DNS
                                                                                                                                Compute POD

                                                                                                                 Security
                                                                                             AD/LDAP
                                                                                                                 Manager
                                                     Management                                                                 Compute POD
                                                       Bastion          NTP      Logging
                                                       Servers
               Corporate              Corporate                                              Storage             Network        Compute POD
                 Firewall               Firewall     Middleware/                             Manager             Manager
                                                      Business
                                                      Services                                                                  Compute POD

                                                                                             Back-up         Multi-Use
                                                                                             Manager          Server
                                                     Provisioning                                                               Compute POD
                                    CMDB               Systems

   Layer7         WAF

                                                                                                  Virtual
                               Orchestration                                                   Services POD                     Storage
                                                                                                                              Services POD
    VPDC API     Portal        Middleware/                                                             Cloud
                                Business                                                              Services
                                Services                                                              Firewall
                                                                                                        (IN)                    Network
                                                                                                                              Services POD
                                 Ticketing                                                             Cloud
                                                                                                      Services
                                                                                                      Firewall
                                                                                                       (OUT)
                                  Event
                               Management



                            Back Office
  DMZ Network               Network
7
Savvis Proprietary & Confidential
Securing the Cloud (out of box)

        Require SSL

        Audit calls

        IDS

        DDoS

        Provide Security Penetration Protection
              – Code injection
              – Malformed Requests
              – SQL Attacks
              – Limit request message size
              – Check for XML, and reject DOCTYPE (prevents external XML element
                definition)
              – Protect against XML document structure (limit depth of XML tree)
              – Automatic retry on target service

8
Savvis Proprietary & Confidential
Securing the Cloud ( configured)

        Authentication and Authorization

        Credential Caching and Expiration

        IP restrictions (white listing)

        Provide rate limiting

        Provide API Service Level Monitoring
              – Target service timeout alert to support
              – Monitoring Overall Health




9
Savvis Proprietary & Confidential
Governing API Sets




           Layer 7 SOA Governance
                                                                         •Throttling
                                                              Policy     •Monitoring



                             (api.savvis.net)                Reporting
                                                                         •Usage
                                                                         •Billing



                                                                         •Authentication
             VPDC                   Portal   OSS   Storage   Security    •Authorization




10
Savvis Proprietary & Confidential
Governance

        Isolation of API types and dependencies
        Reduce number of interface types
        Protocol Translation
        Centralization of control
        Reporting (availability, billing, etc..)
        Policy (hierarchy, push, promotion, rollback)
        Delegation of administration and offloading of developers (security, auditing,
         throttling, etc..)
        Perform HREF URL manipulation (replace target service URI with
         proxy/Internal URI e.g. replace api.symphonyvpdc.savvis.net with
         api.savvis.net)
        Route based on URL, ip, content, etc….
        External Integration
              – Logging
              – OSS Event Management (faults, SLA violations, etc…)
              – CMDB (entitlements, logical representations, meta-data, etc…)
        Flexible deployment (physical device, appliance, multi-site, multi-
         environment, clustered)


11
Savvis Proprietary & Confidential
Business Enablers




                                    Partners           Resellers
                                       API              Billing
                                    extensions




                                                 SLA
                                           Tiered Usage




12
Savvis Proprietary & Confidential
VPDC Service Levels




13
Savvis Proprietary & Confidential
Billing Use Case




14
Savvis Proprietary & Confidential
PaaS / Composite Operation Example


          /VPDC_CreateVM



            /PaaSFunction1          Layer7   /VPDC_ProcessData



         /VPDC_DestroyVM




15
Savvis Proprietary & Confidential
developer.savvis.net

        Phase 1
              –   Site with discussion forums or e-mail alias support
              –   Webinar for partners and customers
              –   Invited developer accounts with restrictions
              –   Examples
              –   Usage reporting
        Phase 2
              –   Enhance site
              –   Sandbox
              –   Webinars
              –   More examples
              –   Voting on requirements/ideas
              –   Monetization (tiered usage, partner certification)
              –   Developer marketing
        Phase 3
              – Ongoing improvements based on demand and feedback

16
Savvis Proprietary & Confidential
Thank You




            17

Más contenido relacionado

La actualidad más candente

110531 newlease heads in the clouds feet on the ground v2.0 (partner ready) ...
110531 newlease heads in the clouds feet on the ground v2.0 (partner ready)  ...110531 newlease heads in the clouds feet on the ground v2.0 (partner ready)  ...
110531 newlease heads in the clouds feet on the ground v2.0 (partner ready) ...New Lease
 
Jentrata b2b gateway
Jentrata b2b gatewayJentrata b2b gateway
Jentrata b2b gatewayWayne Bingham
 
Verimatrix - DECE-Ultraviolet at CommNexus April 2012
Verimatrix - DECE-Ultraviolet at CommNexus April 2012Verimatrix - DECE-Ultraviolet at CommNexus April 2012
Verimatrix - DECE-Ultraviolet at CommNexus April 2012Verimatrix
 
Making of a Successful Cloud Business
Making of a Successful Cloud BusinessMaking of a Successful Cloud Business
Making of a Successful Cloud BusinessACMBangalore
 
Lenovo: The Cloud Over BYOD
Lenovo: The Cloud Over BYODLenovo: The Cloud Over BYOD
Lenovo: The Cloud Over BYODLenovo Education
 
PHP Day 2011 PHP goes to the cloud
PHP Day 2011 PHP goes to the cloudPHP Day 2011 PHP goes to the cloud
PHP Day 2011 PHP goes to the cloudpietrobr
 
Verimatrix-Multi-network Solutions in the Real World - NexTV Mexico 2012
Verimatrix-Multi-network Solutions in the Real World - NexTV Mexico 2012Verimatrix-Multi-network Solutions in the Real World - NexTV Mexico 2012
Verimatrix-Multi-network Solutions in the Real World - NexTV Mexico 2012Verimatrix
 
Etendez votre datacenter avec aws v4
Etendez votre datacenter avec aws v4Etendez votre datacenter avec aws v4
Etendez votre datacenter avec aws v4Amazon Web Services
 
Cloud service architecture
Cloud service architectureCloud service architecture
Cloud service architectureJazziator
 
AWS Partner Presentation - Riverbed
AWS Partner Presentation - RiverbedAWS Partner Presentation - Riverbed
AWS Partner Presentation - RiverbedAmazon Web Services
 
Cloud architecture and deployment: The Kognitio checklist, Nigel Sanctuary, K...
Cloud architecture and deployment: The Kognitio checklist, Nigel Sanctuary, K...Cloud architecture and deployment: The Kognitio checklist, Nigel Sanctuary, K...
Cloud architecture and deployment: The Kognitio checklist, Nigel Sanctuary, K...CloudOps Summit
 
Understanding the Third Wave of Customer Interaction
Understanding the Third Wave of Customer InteractionUnderstanding the Third Wave of Customer Interaction
Understanding the Third Wave of Customer InteractionCisco Canada
 
14h00 aws deck-summit2012_sap_on_aws_s_jones_final
14h00   aws deck-summit2012_sap_on_aws_s_jones_final14h00   aws deck-summit2012_sap_on_aws_s_jones_final
14h00 aws deck-summit2012_sap_on_aws_s_jones_finalLuiz Gustavo Santos
 
Mach Technology
Mach Technology Mach Technology
Mach Technology Open Stack
 

La actualidad más candente (20)

110531 newlease heads in the clouds feet on the ground v2.0 (partner ready) ...
110531 newlease heads in the clouds feet on the ground v2.0 (partner ready)  ...110531 newlease heads in the clouds feet on the ground v2.0 (partner ready)  ...
110531 newlease heads in the clouds feet on the ground v2.0 (partner ready) ...
 
Jentrata b2b gateway
Jentrata b2b gatewayJentrata b2b gateway
Jentrata b2b gateway
 
Verimatrix - DECE-Ultraviolet at CommNexus April 2012
Verimatrix - DECE-Ultraviolet at CommNexus April 2012Verimatrix - DECE-Ultraviolet at CommNexus April 2012
Verimatrix - DECE-Ultraviolet at CommNexus April 2012
 
Making of a Successful Cloud Business
Making of a Successful Cloud BusinessMaking of a Successful Cloud Business
Making of a Successful Cloud Business
 
Lenovo: The Cloud Over BYOD
Lenovo: The Cloud Over BYODLenovo: The Cloud Over BYOD
Lenovo: The Cloud Over BYOD
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
PHP Day 2011 PHP goes to the cloud
PHP Day 2011 PHP goes to the cloudPHP Day 2011 PHP goes to the cloud
PHP Day 2011 PHP goes to the cloud
 
Private Cloud Day Session 1: Building your Private Cloud Infrastructure
Private Cloud Day Session 1: Building your Private Cloud InfrastructurePrivate Cloud Day Session 1: Building your Private Cloud Infrastructure
Private Cloud Day Session 1: Building your Private Cloud Infrastructure
 
Verimatrix-Multi-network Solutions in the Real World - NexTV Mexico 2012
Verimatrix-Multi-network Solutions in the Real World - NexTV Mexico 2012Verimatrix-Multi-network Solutions in the Real World - NexTV Mexico 2012
Verimatrix-Multi-network Solutions in the Real World - NexTV Mexico 2012
 
Etendez votre datacenter avec aws v4
Etendez votre datacenter avec aws v4Etendez votre datacenter avec aws v4
Etendez votre datacenter avec aws v4
 
Cloud service architecture
Cloud service architectureCloud service architecture
Cloud service architecture
 
AWS Partner Presentation - Riverbed
AWS Partner Presentation - RiverbedAWS Partner Presentation - Riverbed
AWS Partner Presentation - Riverbed
 
Building Scalable and Robust Solutions with Service Bus in Cloud and Server
Building Scalable and Robust Solutions with Service Bus in Cloud and ServerBuilding Scalable and Robust Solutions with Service Bus in Cloud and Server
Building Scalable and Robust Solutions with Service Bus in Cloud and Server
 
Cloud architecture and deployment: The Kognitio checklist, Nigel Sanctuary, K...
Cloud architecture and deployment: The Kognitio checklist, Nigel Sanctuary, K...Cloud architecture and deployment: The Kognitio checklist, Nigel Sanctuary, K...
Cloud architecture and deployment: The Kognitio checklist, Nigel Sanctuary, K...
 
MySQL Cluster
MySQL ClusterMySQL Cluster
MySQL Cluster
 
Understanding the Third Wave of Customer Interaction
Understanding the Third Wave of Customer InteractionUnderstanding the Third Wave of Customer Interaction
Understanding the Third Wave of Customer Interaction
 
Deja vu.idc.solutions
Deja vu.idc.solutionsDeja vu.idc.solutions
Deja vu.idc.solutions
 
14h00 aws deck-summit2012_sap_on_aws_s_jones_final
14h00   aws deck-summit2012_sap_on_aws_s_jones_final14h00   aws deck-summit2012_sap_on_aws_s_jones_final
14h00 aws deck-summit2012_sap_on_aws_s_jones_final
 
Chris millercloud
Chris millercloudChris millercloud
Chris millercloud
 
Mach Technology
Mach Technology Mach Technology
Mach Technology
 

Destacado

Cloud is not an option, but is security?
Cloud is not an option, but is security?Cloud is not an option, but is security?
Cloud is not an option, but is security?Jody Keyser
 
10 security concerns cloud computing
10 security concerns cloud computing10 security concerns cloud computing
10 security concerns cloud computingHossam Zein
 
Security & Compliance in the Cloud - Proactively Managing Governance, Risk & ...
Security & Compliance in the Cloud - Proactively Managing Governance, Risk & ...Security & Compliance in the Cloud - Proactively Managing Governance, Risk & ...
Security & Compliance in the Cloud - Proactively Managing Governance, Risk & ...Chad Lawler
 
Cloud Computing: Architecture, IT Security and Operational Perspectives
Cloud Computing: Architecture, IT Security and Operational PerspectivesCloud Computing: Architecture, IT Security and Operational Perspectives
Cloud Computing: Architecture, IT Security and Operational PerspectivesMegan Eskey
 
Operational Best Practices in the Cloud
Operational Best Practices in the CloudOperational Best Practices in the Cloud
Operational Best Practices in the CloudRightScale
 
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...Chad Lawler
 
Enterprise Cloud Operating Model Design
Enterprise Cloud Operating Model DesignEnterprise Cloud Operating Model Design
Enterprise Cloud Operating Model DesignJoseph Schwartz
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing SecurityDhaval Dave
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing SecurityNinh Nguyen
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architectureVladimir Jirasek
 

Destacado (12)

Cloud is not an option, but is security?
Cloud is not an option, but is security?Cloud is not an option, but is security?
Cloud is not an option, but is security?
 
10 security concerns cloud computing
10 security concerns cloud computing10 security concerns cloud computing
10 security concerns cloud computing
 
Security & Compliance in the Cloud - Proactively Managing Governance, Risk & ...
Security & Compliance in the Cloud - Proactively Managing Governance, Risk & ...Security & Compliance in the Cloud - Proactively Managing Governance, Risk & ...
Security & Compliance in the Cloud - Proactively Managing Governance, Risk & ...
 
Cloud Computing: Architecture, IT Security and Operational Perspectives
Cloud Computing: Architecture, IT Security and Operational PerspectivesCloud Computing: Architecture, IT Security and Operational Perspectives
Cloud Computing: Architecture, IT Security and Operational Perspectives
 
Operational Best Practices in the Cloud
Operational Best Practices in the CloudOperational Best Practices in the Cloud
Operational Best Practices in the Cloud
 
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
 
Enterprise Cloud Operating Model Design
Enterprise Cloud Operating Model DesignEnterprise Cloud Operating Model Design
Enterprise Cloud Operating Model Design
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
Cloud Computing Security Issues
Cloud Computing Security Issues Cloud Computing Security Issues
Cloud Computing Security Issues
 
Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architecture
 

Similar a Securing and Governing Cloud Services

CA Nimsoft xen desktop monitoring
CA Nimsoft xen desktop monitoring CA Nimsoft xen desktop monitoring
CA Nimsoft xen desktop monitoring CA Nimsoft
 
Storage Management and High Availability 6.0 Launch
Storage Management and High Availability 6.0 LaunchStorage Management and High Availability 6.0 Launch
Storage Management and High Availability 6.0 LaunchSymantec
 
Smartronix - Building Secure Applications on the AWS Cloud
Smartronix - Building Secure Applications on the AWS CloudSmartronix - Building Secure Applications on the AWS Cloud
Smartronix - Building Secure Applications on the AWS CloudAmazon Web Services
 
MassTLC Cloud summit keynote presentation from CTO of VMWare, Scott Davis
MassTLC Cloud summit keynote presentation from CTO of VMWare, Scott DavisMassTLC Cloud summit keynote presentation from CTO of VMWare, Scott Davis
MassTLC Cloud summit keynote presentation from CTO of VMWare, Scott DavisMassTLC
 
Microsoft Techready -21 aprilie 2011
Microsoft Techready -21 aprilie 2011Microsoft Techready -21 aprilie 2011
Microsoft Techready -21 aprilie 2011Agora Group
 
Be Prepared for Tomorrow's IT Forecast Great Chance of Hybrid Clouds
Be Prepared for Tomorrow's IT Forecast Great Chance of Hybrid CloudsBe Prepared for Tomorrow's IT Forecast Great Chance of Hybrid Clouds
Be Prepared for Tomorrow's IT Forecast Great Chance of Hybrid CloudsEucalyptus Systems, Inc.
 
Be Prepared for Tomorrow's IT Forecast: Great Chance of Hybrid Clouds
Be Prepared for Tomorrow's IT Forecast: Great Chance of Hybrid CloudsBe Prepared for Tomorrow's IT Forecast: Great Chance of Hybrid Clouds
Be Prepared for Tomorrow's IT Forecast: Great Chance of Hybrid CloudsEucalyptus Systems, Inc.
 
NIC 2013 - Configure and Deploy Private Cloud
NIC 2013 - Configure and Deploy Private CloudNIC 2013 - Configure and Deploy Private Cloud
NIC 2013 - Configure and Deploy Private CloudKristian Nese
 
Managing Your Cloud with Confidence - Mark Rivington, n•fluence 2012
Managing Your Cloud with Confidence - Mark Rivington, n•fluence 2012Managing Your Cloud with Confidence - Mark Rivington, n•fluence 2012
Managing Your Cloud with Confidence - Mark Rivington, n•fluence 2012CA Nimsoft
 
What Does Cloud Computing Mean for the Channel?
What Does Cloud Computing Mean for the Channel?What Does Cloud Computing Mean for the Channel?
What Does Cloud Computing Mean for the Channel?SMB Group
 
Strategic Importance of Semantic Technologies as a Key Differentiator for IT ...
Strategic Importance of Semantic Technologies as a Key Differentiator for IT ...Strategic Importance of Semantic Technologies as a Key Differentiator for IT ...
Strategic Importance of Semantic Technologies as a Key Differentiator for IT ...CloudOps Summit
 
Venus-c: Using open source clouds in eScience
Venus-c: Using open source clouds in eScienceVenus-c: Using open source clouds in eScience
Venus-c: Using open source clouds in eScienceOW2
 
FewebPlus @ microsoft 19 april 2010 cloud continuum
FewebPlus @ microsoft 19 april 2010 cloud continuumFewebPlus @ microsoft 19 april 2010 cloud continuum
FewebPlus @ microsoft 19 april 2010 cloud continuumTom Crombez
 
Enterprise Private Cloud Computing
Enterprise Private Cloud ComputingEnterprise Private Cloud Computing
Enterprise Private Cloud ComputingCisco Canada
 
JAVA를 활용한 클라우딩 환경 기반 PaaS
JAVA를 활용한 클라우딩 환경 기반 PaaSJAVA를 활용한 클라우딩 환경 기반 PaaS
JAVA를 활용한 클라우딩 환경 기반 PaaSmosaicnet
 
자바(Java)를 위한 클라우드 환경 기반 Paas
자바(Java)를 위한 클라우드 환경 기반 Paas자바(Java)를 위한 클라우드 환경 기반 Paas
자바(Java)를 위한 클라우드 환경 기반 Paasmosaicnet
 
PCTY 2012, Cloud security (real life) v. Ulf Feger
PCTY 2012, Cloud security (real life) v. Ulf FegerPCTY 2012, Cloud security (real life) v. Ulf Feger
PCTY 2012, Cloud security (real life) v. Ulf FegerIBM Danmark
 
Enhancing and Operating Video Collaboration with your Network
Enhancing and Operating Video Collaboration with your NetworkEnhancing and Operating Video Collaboration with your Network
Enhancing and Operating Video Collaboration with your NetworkCisco Canada
 

Similar a Securing and Governing Cloud Services (20)

CA Nimsoft xen desktop monitoring
CA Nimsoft xen desktop monitoring CA Nimsoft xen desktop monitoring
CA Nimsoft xen desktop monitoring
 
Storage Management and High Availability 6.0 Launch
Storage Management and High Availability 6.0 LaunchStorage Management and High Availability 6.0 Launch
Storage Management and High Availability 6.0 Launch
 
Smartronix - Building Secure Applications on the AWS Cloud
Smartronix - Building Secure Applications on the AWS CloudSmartronix - Building Secure Applications on the AWS Cloud
Smartronix - Building Secure Applications on the AWS Cloud
 
MassTLC Cloud summit keynote presentation from CTO of VMWare, Scott Davis
MassTLC Cloud summit keynote presentation from CTO of VMWare, Scott DavisMassTLC Cloud summit keynote presentation from CTO of VMWare, Scott Davis
MassTLC Cloud summit keynote presentation from CTO of VMWare, Scott Davis
 
Microsoft Techready -21 aprilie 2011
Microsoft Techready -21 aprilie 2011Microsoft Techready -21 aprilie 2011
Microsoft Techready -21 aprilie 2011
 
Be Prepared for Tomorrow's IT Forecast Great Chance of Hybrid Clouds
Be Prepared for Tomorrow's IT Forecast Great Chance of Hybrid CloudsBe Prepared for Tomorrow's IT Forecast Great Chance of Hybrid Clouds
Be Prepared for Tomorrow's IT Forecast Great Chance of Hybrid Clouds
 
Be Prepared for Tomorrow's IT Forecast: Great Chance of Hybrid Clouds
Be Prepared for Tomorrow's IT Forecast: Great Chance of Hybrid CloudsBe Prepared for Tomorrow's IT Forecast: Great Chance of Hybrid Clouds
Be Prepared for Tomorrow's IT Forecast: Great Chance of Hybrid Clouds
 
NIC 2013 - Configure and Deploy Private Cloud
NIC 2013 - Configure and Deploy Private CloudNIC 2013 - Configure and Deploy Private Cloud
NIC 2013 - Configure and Deploy Private Cloud
 
Managing Your Cloud with Confidence - Mark Rivington, n•fluence 2012
Managing Your Cloud with Confidence - Mark Rivington, n•fluence 2012Managing Your Cloud with Confidence - Mark Rivington, n•fluence 2012
Managing Your Cloud with Confidence - Mark Rivington, n•fluence 2012
 
What Does Cloud Computing Mean for the Channel?
What Does Cloud Computing Mean for the Channel?What Does Cloud Computing Mean for the Channel?
What Does Cloud Computing Mean for the Channel?
 
Strategic Importance of Semantic Technologies as a Key Differentiator for IT ...
Strategic Importance of Semantic Technologies as a Key Differentiator for IT ...Strategic Importance of Semantic Technologies as a Key Differentiator for IT ...
Strategic Importance of Semantic Technologies as a Key Differentiator for IT ...
 
Enterprise Applications on AWS
Enterprise Applications on AWSEnterprise Applications on AWS
Enterprise Applications on AWS
 
Venus-c: Using open source clouds in eScience
Venus-c: Using open source clouds in eScienceVenus-c: Using open source clouds in eScience
Venus-c: Using open source clouds in eScience
 
FewebPlus @ microsoft 19 april 2010 cloud continuum
FewebPlus @ microsoft 19 april 2010 cloud continuumFewebPlus @ microsoft 19 april 2010 cloud continuum
FewebPlus @ microsoft 19 april 2010 cloud continuum
 
Enterprise Private Cloud Computing
Enterprise Private Cloud ComputingEnterprise Private Cloud Computing
Enterprise Private Cloud Computing
 
JAVA를 활용한 클라우딩 환경 기반 PaaS
JAVA를 활용한 클라우딩 환경 기반 PaaSJAVA를 활용한 클라우딩 환경 기반 PaaS
JAVA를 활용한 클라우딩 환경 기반 PaaS
 
자바(Java)를 위한 클라우드 환경 기반 Paas
자바(Java)를 위한 클라우드 환경 기반 Paas자바(Java)를 위한 클라우드 환경 기반 Paas
자바(Java)를 위한 클라우드 환경 기반 Paas
 
Cloud Foundry et le Cloud vu par VMware
Cloud Foundry et le Cloud vu par VMwareCloud Foundry et le Cloud vu par VMware
Cloud Foundry et le Cloud vu par VMware
 
PCTY 2012, Cloud security (real life) v. Ulf Feger
PCTY 2012, Cloud security (real life) v. Ulf FegerPCTY 2012, Cloud security (real life) v. Ulf Feger
PCTY 2012, Cloud security (real life) v. Ulf Feger
 
Enhancing and Operating Video Collaboration with your Network
Enhancing and Operating Video Collaboration with your NetworkEnhancing and Operating Video Collaboration with your Network
Enhancing and Operating Video Collaboration with your Network
 

Más de CA API Management

Api architectures for the modern enterprise
Api architectures for the modern enterpriseApi architectures for the modern enterprise
Api architectures for the modern enterpriseCA API Management
 
Mastering Digital Channels with APIs
Mastering Digital Channels with APIsMastering Digital Channels with APIs
Mastering Digital Channels with APIsCA API Management
 
Takeaways from API Security Breaches Webinar
Takeaways from API Security Breaches WebinarTakeaways from API Security Breaches Webinar
Takeaways from API Security Breaches WebinarCA API Management
 
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...CA API Management
 
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...CA API Management
 
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...CA API Management
 
API Monetization: Unlock the Value of Your Data
API Monetization: Unlock the Value of Your DataAPI Monetization: Unlock the Value of Your Data
API Monetization: Unlock the Value of Your DataCA API Management
 
Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...
Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...
Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...CA API Management
 
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...CA API Management
 
Enabling the Multi-Device Universe
Enabling the Multi-Device UniverseEnabling the Multi-Device Universe
Enabling the Multi-Device UniverseCA API Management
 
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...CA API Management
 
The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...
The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...
The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...CA API Management
 
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...CA API Management
 
Adapting to Digital Change: Use APIs to Delight Customers & Win
Adapting to Digital Change: Use APIs to Delight Customers & WinAdapting to Digital Change: Use APIs to Delight Customers & Win
Adapting to Digital Change: Use APIs to Delight Customers & WinCA API Management
 
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...CA API Management
 
5 steps end to end security consumer apps
5 steps end to end security consumer apps5 steps end to end security consumer apps
5 steps end to end security consumer appsCA API Management
 
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...CA API Management
 
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...CA API Management
 
Gartner AADI Summit Sydney 2014 Implementing the Layer 7 API Management Pla...
Gartner AADI Summit Sydney 2014   Implementing the Layer 7 API Management Pla...Gartner AADI Summit Sydney 2014   Implementing the Layer 7 API Management Pla...
Gartner AADI Summit Sydney 2014 Implementing the Layer 7 API Management Pla...CA API Management
 
Using APIs to Create an Omni-Channel Retail Experience
Using APIs to Create an Omni-Channel Retail ExperienceUsing APIs to Create an Omni-Channel Retail Experience
Using APIs to Create an Omni-Channel Retail ExperienceCA API Management
 

Más de CA API Management (20)

Api architectures for the modern enterprise
Api architectures for the modern enterpriseApi architectures for the modern enterprise
Api architectures for the modern enterprise
 
Mastering Digital Channels with APIs
Mastering Digital Channels with APIsMastering Digital Channels with APIs
Mastering Digital Channels with APIs
 
Takeaways from API Security Breaches Webinar
Takeaways from API Security Breaches WebinarTakeaways from API Security Breaches Webinar
Takeaways from API Security Breaches Webinar
 
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...
 
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...
 
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...
 
API Monetization: Unlock the Value of Your Data
API Monetization: Unlock the Value of Your DataAPI Monetization: Unlock the Value of Your Data
API Monetization: Unlock the Value of Your Data
 
Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...
Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...
Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...
 
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
 
Enabling the Multi-Device Universe
Enabling the Multi-Device UniverseEnabling the Multi-Device Universe
Enabling the Multi-Device Universe
 
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...
 
The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...
The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...
The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...
 
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
 
Adapting to Digital Change: Use APIs to Delight Customers & Win
Adapting to Digital Change: Use APIs to Delight Customers & WinAdapting to Digital Change: Use APIs to Delight Customers & Win
Adapting to Digital Change: Use APIs to Delight Customers & Win
 
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
 
5 steps end to end security consumer apps
5 steps end to end security consumer apps5 steps end to end security consumer apps
5 steps end to end security consumer apps
 
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
 
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...
 
Gartner AADI Summit Sydney 2014 Implementing the Layer 7 API Management Pla...
Gartner AADI Summit Sydney 2014   Implementing the Layer 7 API Management Pla...Gartner AADI Summit Sydney 2014   Implementing the Layer 7 API Management Pla...
Gartner AADI Summit Sydney 2014 Implementing the Layer 7 API Management Pla...
 
Using APIs to Create an Omni-Channel Retail Experience
Using APIs to Create an Omni-Channel Retail ExperienceUsing APIs to Create an Omni-Channel Retail Experience
Using APIs to Create an Omni-Channel Retail Experience
 

Último

Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfAarwolf Industries LLC
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Jeffrey Haguewood
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentMahmoud Rabie
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxAna-Maria Mihalceanu
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...amber724300
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessWSO2
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsYoss Cohen
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Nikki Chapple
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Karmanjay Verma
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 

Último (20)

Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdf
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career Development
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance Toolbox
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with Platformless
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platforms
 
How Tech Giants Cut Corners to Harvest Data for A.I.
How Tech Giants Cut Corners to Harvest Data for A.I.How Tech Giants Cut Corners to Harvest Data for A.I.
How Tech Giants Cut Corners to Harvest Data for A.I.
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 

Securing and Governing Cloud Services

  • 1. Securing and Governing Cloud Services Bill Forsyth A Savvis Case Study VP Eng.
  • 2. Savvis  Global leader in cloud infrastructure and hosted IT solutions for enterprises  Key Metrics – Nearly 2,500 unique business and government clients, including more than 30 of the top 100 companies in the Fortune 500 – More than 2,200 employees with deep expertise in technical operations, customer support, engineering and consulting – $933 million in revenue in 2010  Services – Cloud – one of the industry’s broadest lines of enterprise-class cloud services – Colocation, Managed Hosting and Utility Compute – facilities and operations; compute, storage and network – Network – converged applications; community of interest networks; private lines; Internet – Security – managed security services and consulting – Industry Solutions – financial, government and Software-as-a-Service (SaaS) – Professional Services – infrastructure, security, business continuity, compliance and program management 2 Savvis Proprietary & Confidential
  • 3. Savvis Symphony Family  Savvis Symphony Dedicated: Hosted Private Cloud solution  Savvis Symphony Open: Flexible Multi-Tenant Cloud solution  Savvis Symphony VPDC: Virtual Private Data Center solution Savvis Symphony Open Multi-Tenant virtual infrastructure Savvis Symphony VPDC Savvis Symphony Dedicated Complete Virtual Private Data Centers Dedicated, virtual infrastructure 3 Savvis Proprietary & Confidential
  • 4. Customer Requirements  Enterprise customers wanting flexibility and cost benefits of multi- tenant public clouds, in a private secure fashion  APIs expose/control the VPDC (compute, storage, network, and security policy)  APIs may be private or public  For public APIs – Bad actors – Accidental misuse  Compliance – FISMA – PCI 4 Savvis Proprietary & Confidential
  • 5. Cloud Definition Essential Characteristics Service Models Deployment Models 5 5 Savvis Proprietary & Confidential
  • 7. VPDC System Boundaries Cloud Site Management Network Management Multitenant Virtual Services POD Data Center (VDC) Services POD Virtualization Compute POD DNS Manager AD/LDAP DNS Compute POD Security AD/LDAP Manager Management Compute POD Bastion NTP Logging Servers Corporate Corporate Storage Network Compute POD Firewall Firewall Middleware/ Manager Manager Business Services Compute POD Back-up Multi-Use Manager Server Provisioning Compute POD CMDB Systems Layer7 WAF Virtual Orchestration Services POD Storage Services POD VPDC API Portal Middleware/ Cloud Business Services Services Firewall (IN) Network Services POD Ticketing Cloud Services Firewall (OUT) Event Management Back Office DMZ Network Network 7 Savvis Proprietary & Confidential
  • 8. Securing the Cloud (out of box)  Require SSL  Audit calls  IDS  DDoS  Provide Security Penetration Protection – Code injection – Malformed Requests – SQL Attacks – Limit request message size – Check for XML, and reject DOCTYPE (prevents external XML element definition) – Protect against XML document structure (limit depth of XML tree) – Automatic retry on target service 8 Savvis Proprietary & Confidential
  • 9. Securing the Cloud ( configured)  Authentication and Authorization  Credential Caching and Expiration  IP restrictions (white listing)  Provide rate limiting  Provide API Service Level Monitoring – Target service timeout alert to support – Monitoring Overall Health 9 Savvis Proprietary & Confidential
  • 10. Governing API Sets Layer 7 SOA Governance •Throttling Policy •Monitoring (api.savvis.net) Reporting •Usage •Billing •Authentication VPDC Portal OSS Storage Security •Authorization 10 Savvis Proprietary & Confidential
  • 11. Governance  Isolation of API types and dependencies  Reduce number of interface types  Protocol Translation  Centralization of control  Reporting (availability, billing, etc..)  Policy (hierarchy, push, promotion, rollback)  Delegation of administration and offloading of developers (security, auditing, throttling, etc..)  Perform HREF URL manipulation (replace target service URI with proxy/Internal URI e.g. replace api.symphonyvpdc.savvis.net with api.savvis.net)  Route based on URL, ip, content, etc….  External Integration – Logging – OSS Event Management (faults, SLA violations, etc…) – CMDB (entitlements, logical representations, meta-data, etc…)  Flexible deployment (physical device, appliance, multi-site, multi- environment, clustered) 11 Savvis Proprietary & Confidential
  • 12. Business Enablers Partners Resellers API Billing extensions SLA Tiered Usage 12 Savvis Proprietary & Confidential
  • 13. VPDC Service Levels 13 Savvis Proprietary & Confidential
  • 14. Billing Use Case 14 Savvis Proprietary & Confidential
  • 15. PaaS / Composite Operation Example /VPDC_CreateVM /PaaSFunction1 Layer7 /VPDC_ProcessData /VPDC_DestroyVM 15 Savvis Proprietary & Confidential
  • 16. developer.savvis.net  Phase 1 – Site with discussion forums or e-mail alias support – Webinar for partners and customers – Invited developer accounts with restrictions – Examples – Usage reporting  Phase 2 – Enhance site – Sandbox – Webinars – More examples – Voting on requirements/ideas – Monetization (tiered usage, partner certification) – Developer marketing  Phase 3 – Ongoing improvements based on demand and feedback 16 Savvis Proprietary & Confidential
  • 17. Thank You 17