Welcome!

Cloud Security Authors: Elizabeth White, Pat Romanski, Maria C. Horton, Liz McMillan, Ravi Rajamiyer

Related Topics: Containers Expo Blog, @CloudExpo, Cloud Security

Containers Expo Blog: Article

Clouds for the Enterprise Security & Performance

Enterprise Clouds - Part 1

Cloud Security Journal

The intent of the blogs is to provide the thought leadership for readers seeking to create a sound strategy for exploiting cloud computing for the enterprise.

Foundational principles of enterprise-class clouds

  • To create a real-time enterprise, firms must assemble an IT operation that executes as the business behaves: on demand, ad-hoc and predictable calendar events
  • The IT delivery model must accommodate an as-needed/when-needed set of capabilities that deliver information, processing, and collaboration in an on-demand manner
  • Operational risk cannot be sacrificed in pursuit of this on-demand IT delivery
  • IT is a supply chain of applications, information, content, infrastructure, and facilities
  • Sourcing of the IT supply chain can be multidimensional: acquisition, management, and component-level sourcing. For example,
    1. Management level: Built internal, bought external/hosted internal, bought external/hosted external
    2. Component level: Infrastructure can be supplemented externally, the development platform can be provided externally, the application and infrastructure can be provided externally
    3. Acquisition: Can be capitalized, opex funded, variable usage expensed, or fixed contract expensed

Part 1: Security and performance
Lessons from Wall Street IT should be incorporated into your enterprise cloud strategy plans. Security and performance in a cloudlike delivery model have been hardened into best practices on Wall Street for some time. The insatiable demand for instantaneous data, rapid decision support, and microsecond latency all happening in the intermediary cloud trading exchanges provides a reference framework that can be repeated in any firm across any industry -- today!

Based on this, we can take from Wall Street three fundamental building blocks for enterprise class security in the cloud as:

  • Access/trust acceptance/policy enforcement
  • Data transfer security
  • Data protection across multitenancy environments

In these terms, two companies (Cisco and Unisys) are providing these capabilities out of the box today.

In building private/trusted cloud models, we learned how to create both a secure and robust delivery channel in the cloud by leveraging Cisco technology. By decomposing the workload transaction lifecycle from the external data sources and market connectivity to traders or trading systems, we were able to identify performance and security design related issues across the transaction path operating through the cloud.

To accommodate this, we incorporated a software/hardware infrastructure ensemble of capabilities from Cisco. By leveraging Cisco Policy Manager and Cisco ACE appliances, we were able to create a trust acceptance channel where CRUD policies and business entitlement could be enforced at wire speed in microseconds. The relevance to the cloud is this is a DMZ zone building block that can be established as an intermediation point for enterprises and the cloud. It creates a cloud intermediary solution that both protects with regulatory granularity and enables performance. (Side note: This model can be used inside the firewall that operates across business units where access, control, and performance are critical for a private cloud delivery model.)

The other lesson we learned is the transfer and access of highly confidential data in a shared environment/multitenant cloud model requires advanced encryption in a performance-oriented capability. Unisys is a firm we collaborate with that provides software technology and integration expertise that scrambles data packets being transferred or in motion and scrambles associated data in a multitenant stored environment with advanced encryption and compression to ensure both performance and security.

The technology enables Unisys to uniquely provide to firms a hybrid solution of cloud management capabilities with a secure IAAS cloud model that allows firms to rapidly leverage cloudlike delivery models.

These technologies and capabilities have been available for some time. The key takeaway from above is for anyone tasked with building cloud models for the enterprise; there are proven technologies and approaches that can be leveraged today in building enterprise-class clouds.

The next blog in this series will focus on the lifecycle management capabilities, and operating model that firms need to incorporate into their enterprise coud strategy to be successful.

More Stories By Tony Bishop

Blueprint4IT is authored by a longtime IT and Datacenter Technologist. Author of Next Generation Datacenters in Financial Services – Driving Extreme Efficiency and Effective Cost Savings. A former technology executive for both Morgan Stanley and Wachovia Securities.

IoT & Smart Cities Stories
The platform combines the strengths of Singtel's extensive, intelligent network capabilities with Microsoft's cloud expertise to create a unique solution that sets new standards for IoT applications," said Mr Diomedes Kastanis, Head of IoT at Singtel. "Our solution provides speed, transparency and flexibility, paving the way for a more pervasive use of IoT to accelerate enterprises' digitalisation efforts. AI-powered intelligent connectivity over Microsoft Azure will be the fastest connected pat...
There are many examples of disruption in consumer space – Uber disrupting the cab industry, Airbnb disrupting the hospitality industry and so on; but have you wondered who is disrupting support and operations? AISERA helps make businesses and customers successful by offering consumer-like user experience for support and operations. We have built the world’s first AI-driven IT / HR / Cloud / Customer Support and Operations solution.
Codete accelerates their clients growth through technological expertise and experience. Codite team works with organizations to meet the challenges that digitalization presents. Their clients include digital start-ups as well as established enterprises in the IT industry. To stay competitive in a highly innovative IT industry, strong R&D departments and bold spin-off initiatives is a must. Codete Data Science and Software Architects teams help corporate clients to stay up to date with the mod...
At CloudEXPO Silicon Valley, June 24-26, 2019, Digital Transformation (DX) is a major focus with expanded DevOpsSUMMIT and FinTechEXPO programs within the DXWorldEXPO agenda. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of business. Only 12% still survive. Similar percentages are found throug...
Druva is the global leader in Cloud Data Protection and Management, delivering the industry's first data management-as-a-service solution that aggregates data from endpoints, servers and cloud applications and leverages the public cloud to offer a single pane of glass to enable data protection, governance and intelligence-dramatically increasing the availability and visibility of business critical information, while reducing the risk, cost and complexity of managing and protecting it. Druva's...
BMC has unmatched experience in IT management, supporting 92 of the Forbes Global 100, and earning recognition as an ITSM Gartner Magic Quadrant Leader for five years running. Our solutions offer speed, agility, and efficiency to tackle business challenges in the areas of service management, automation, operations, and the mainframe.
The Jevons Paradox suggests that when technological advances increase efficiency of a resource, it results in an overall increase in consumption. Writing on the increased use of coal as a result of technological improvements, 19th-century economist William Stanley Jevons found that these improvements led to the development of new ways to utilize coal. In his session at 19th Cloud Expo, Mark Thiele, Chief Strategy Officer for Apcera, compared the Jevons Paradox to modern-day enterprise IT, examin...
With 10 simultaneous tracks, keynotes, general sessions and targeted breakout classes, @CloudEXPO and DXWorldEXPO are two of the most important technology events of the year. Since its launch over eight years ago, @CloudEXPO and DXWorldEXPO have presented a rock star faculty as well as showcased hundreds of sponsors and exhibitors! In this blog post, we provide 7 tips on how, as part of our world-class faculty, you can deliver one of the most popular sessions at our events. But before reading...
DSR is a supplier of project management, consultancy services and IT solutions that increase effectiveness of a company's operations in the production sector. The company combines in-depth knowledge of international companies with expert knowledge utilising IT tools that support manufacturing and distribution processes. DSR ensures optimization and integration of internal processes which is necessary for companies to grow rapidly. The rapid growth is possible thanks, to specialized services an...
At CloudEXPO Silicon Valley, June 24-26, 2019, Digital Transformation (DX) is a major focus with expanded DevOpsSUMMIT and FinTechEXPO programs within the DXWorldEXPO agenda. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of business. Only 12% still survive. Similar percentages are found throug...