O slideshow foi denunciado.
Utilizamos seu perfil e dados de atividades no LinkedIn para personalizar e exibir anúncios mais relevantes. Altere suas preferências de anúncios quando desejar.
evilazaro@brsolucoesintegradas.com.br
Challenges
Opportunities
On-Premises SaaS Apps
• Expanding Market Opportunity: Reach new customers in broader markets
• Se...
Cloud and SaaS model adoption
Opportunities
Challenges
Expanding Market Opportunity
Sell directly to business decision mak...
Balancing SaaS delivery with core software and solving customer problems.
Software+
Customer
workflows
Core Competencies
E...
ISVs are experiencing more challenges and burdens managing their own infrastructure
Choosing the right cloud platform is critical when expanding your business to the cloud and SaaS
Software+
Customer
workfl...
Application
Architecture
Complexity &
Customization
Complexity of solutions – data
layer/app layer
Core vs. new/extended s...
Hybrid Cloud: Across On-Premises, Managed Hosting, and Public Cloud
80%of SaaS ISVs are self-hosted today Key Drivers
< 2%...
Complete Hybrid Cloud Platform
ONEConsistent Cloud Platform to Support ISVs’ Business Needs
< 2%
Cloud-based infrastructur...
The Platform for Your SaaS Business
Common Identity
Integrated Virtualization
Data platform
Multi-Tenant
Flexible Deployme...
Grow your business with Microsoft no matter where you start
Service ProviderMicrosoft Azure Develop Deploy Manage Monitor
...
Designed for Cloud Applications
Windows Server 2012 R2
Web Applications Remote Desktop Services
Networking Storage Managem...
24 x 7 x 365 1 billion 20 million 76
280 years
₩ ¥
€
руб
$
$
£
$
Rp
TL
chf
kr
kr
$R
$
$
June 2013
250,000
50% of the Fortune 500 companies
Dynamics CRM serves
over 3.5 million users
Nearly 50 million Office
Online users
Contextual awareness
Key app adoption
Data
Azure
.NET
Hyper-V
Visual Studio
System Center
Active Directory
Programming languages + tools
.NET, Visual Studio, TFS + Git, Ja...
Regulatory compliance is a feature set of O365, Azure and
CRM Online. Microsoft continues to adapt and evolve in
building ...
Standard process for
development of secure software
International standards
ISO 27034-1
Comprehensive
application
security...
Data security
Lock box processes for
Encryption at rest protects
data on Microsoft servers
Encryption in transit with
SSL/...
Próximos SlideShares
Carregando em…5
×

Cloud Computing Models: Private, Public and Hybrid

Analysts project that SaaS applications will significantly outpace traditional software product delivery in the near future. As ISVs facing this ever-changing cloud landscape, you need to make critical decisions about your application lifecycle and hosting models. Evaluate some of those considerations, and learn how the platform you choose can support the model you determine.

  • Entre para ver os comentários

Cloud Computing Models: Private, Public and Hybrid

  1. 1. evilazaro@brsolucoesintegradas.com.br
  2. 2. Challenges Opportunities On-Premises SaaS Apps • Expanding Market Opportunity: Reach new customers in broader markets • Sell directly to business decision makers • More predictable revenue • Lower infrastructure support costs • Requires business model adjustments - new pricing approaches , selling, and more • Revenue increases slowly, harder to invest back in business • Legal and regulatory concerns with storing data outside the customer’s datacenter • Limited opportunities for customization • Low margins and price sensitive customers cause churn Hybrid
  3. 3. Cloud and SaaS model adoption Opportunities Challenges Expanding Market Opportunity Sell directly to business decision makers More predictable revenue Lower infrastructure support costs Requires business model shifts Revenue builds up more slowly, harder to invest back in business Legal and regulatory concerns around data SLA management - Requires high level operational disciplines Requires re-architecting existing applications
  4. 4. Balancing SaaS delivery with core software and solving customer problems. Software+ Customer workflows Core Competencies Essential value for ISVs to build As-a-Service (Platform & Infrastructure Management) Non-core, but Necessities Limited value for ISVs to build
  5. 5. ISVs are experiencing more challenges and burdens managing their own infrastructure
  6. 6. Choosing the right cloud platform is critical when expanding your business to the cloud and SaaS Software+ Customer workflows Core Competencies Essential value for ISVs to build Choosing the Right Cloud Platform Non-core, but Necessities Limited value for ISVs to build
  7. 7. Application Architecture Complexity & Customization Complexity of solutions – data layer/app layer Core vs. new/extended solutions APIs Solution integration: 3rd party solution integration, APIs support Customization – enabling partners Tenancy Single tenant vs. Multi-tenant Operations Customer Needs & SLA Reliability/Availability Performance Security/Compliance Scalability Support Easy on-boarding Service management: Provisioning, usage metering, billing DevOps ALM DevOps collaboration Versioning Business Model & Strategy Pricing /Cost Structure Pricing model – monthly, annually Funding model: CAPEX vs. OPEX Cost to scale (COGS) Target Market Target market and geo presence, expansion Macro environment – data sovereignty, regulatory compliance Channel model Business Goals Cloud First or Cloud Both strategy Grow – organic or through acquisition Funding – get sold, get invested
  8. 8. Hybrid Cloud: Across On-Premises, Managed Hosting, and Public Cloud 80%of SaaS ISVs are self-hosted today Key Drivers < 2% Cloud-based infrastructure (Public Cloud)  Fast time to solutions, rapid deployment for new services  Global reach with broad geo coverage 18% Enhanced Managed Services and Hosted Managed Services  Delegate operations and infra management to capable managed hosting partners 39% Co-location  Specific geo coverage or local presence while maintaining operational control to meet customer’s expectations and SLA  Infra HW operational efficiency 41% ISV On-premises  Complex solution architecture and customization  Full operational control to meet customer expectations and SLA  Cost to scale. CAPEX funding model Source: IDC Direction 2014, Transformation Everywhere How SaaS Gets Built, March 2014
  9. 9. Complete Hybrid Cloud Platform ONEConsistent Cloud Platform to Support ISVs’ Business Needs < 2% Cloud-based infrastructure (Public Cloud) 18% Enhanced Managed Services and Hosted Managed Services 39% Co-location 41% ISV On-premises Source: IDC Direction 2014, Transformation Everywhere How SaaS Gets Built, March 2014 Microsoft Cloud OS Customer Service ProviderMicrosoft Consistent Platform ONE Allows ISVs to expand SaaS business seamlessly with a consistent hybrid platform
  10. 10. The Platform for Your SaaS Business Common Identity Integrated Virtualization Data platform Multi-Tenant Flexible Deployment Microsoft On-Premises Service Provider One Consistent Platform Deliver a consistent platform to run your applications across on-premises, Microsoft public cloud, and service provider’s cloud Unified Management
  11. 11. Grow your business with Microsoft no matter where you start Service ProviderMicrosoft Azure Develop Deploy Manage Monitor On-Premises
  12. 12. Designed for Cloud Applications Windows Server 2012 R2 Web Applications Remote Desktop Services Networking Storage Management Active Directory Virtualization with Hyper-V Multi-Tenancy Availability / Scalability / Security System Center 2012 R2 Service Provider Foundation API OS & Application Monitoring Automation & Self-Service Infrastructure Provisioning Foundation for Hosting Service Provider Offers ISV Control Panels Custom Control Panels Service Management Portal Service Management API (REST OData) Compute Storage (File/Block) Network Application Hosting (SaaS/PaaS/IaaS) Desktop Hosting through RDS Windows Server 2012 R2 Provides the comprehensive, highly scalable platform System Center 2012 R2 Provides the cost efficient, unified management platform Windows Azure Pack & Service Provider Foundation API Provides standard management API
  13. 13. 24 x 7 x 365 1 billion 20 million 76 280 years ₩ ¥ € руб $ $ £ $ Rp TL chf kr kr $R $ $
  14. 14. June 2013 250,000 50% of the Fortune 500 companies
  15. 15. Dynamics CRM serves over 3.5 million users Nearly 50 million Office Online users
  16. 16. Contextual awareness Key app adoption Data Azure
  17. 17. .NET Hyper-V Visual Studio System Center Active Directory Programming languages + tools .NET, Visual Studio, TFS + Git, Java, NodeJS, PHP, Python, Ruby, C++ Microsoft cloud infrastructure Web Mobile Gaming Cloud services Data Analytics Media Identity IaaS Windows VMs Linux VMs Storage Networking PaaS
  18. 18. Regulatory compliance is a feature set of O365, Azure and CRM Online. Microsoft continues to adapt and evolve in building regulatory compliance features into our services No other cloud provider offers the breadth of regulatory- related and other trust features across cloud platforms Routinely collaborate and seek input from regulators to validate our approach Microsoft’s services are engineered to help customers to meet their regulatory compliance needs Microsoft is a thought leader and innovator in the cloud on regulatory compliance
  19. 19. Standard process for development of secure software International standards ISO 27034-1 Comprehensive application security program Flexible controls, measurements and secure coding requirements
  20. 20. Data security Lock box processes for Encryption at rest protects data on Microsoft servers Encryption in transit with SSL/TLS protects data transmitted between customer and Microsoft Threat management, security monitoring, and file/data integrity prevents or detects any tampering of data Physical security 24-hour monitoring of data centers Multi-factor authentication, including biometric scanning for data center access Internal data center network is segregated from the external network Role separation renders location of specific customer data unintelligible to the personnel that have physical access Logical security Lock box processes for strictly supervised escalation process greatly limits human access to data Servers run only processes on whitelist, minimizing risk from malicious code Dedicated threat management teams proactively anticipate, prevent and mitigate malicious access Port scanning, perimeter vulnerability scanning, and intrusion detection prevent or detect any malicious access Admin and user controls Rights Management Services prevents file-level access without the right user credentials Multi-factor authentication protects access to the service with a second factor such as phone S/MIME provides secure certificate-based email access Data loss prevention prevents sensitive data from leaking either inside or outside the organization

×