SlideShare uma empresa Scribd logo
1 de 40
Embracing the Cloud
How is the Cloud built and how do you Secure It?
Lisa Guess
VP Juniper Networks - Systems Engineering
Your business challenges
How should I embrace the cloud?
How do I secure the cloud?
How do I innovate without disrupting business?
What is my Return on Investment (ROI)?
IT Quickly Moving Toward Cloud
Source: IDG Enterprise Cloud Computing Study 2014
Percentage of respondents
utilizing different types of
Cloud computing
environments……..
Public Cloud
Private Cloud
Hybrid Cloud
19%
15%
5%
61%
25%
21%
7%
47%
Private Cloud Public Cloud Hybrid Cloud Non-Cloud
% OF TOTAL IT ENVIRONMENT
IN THE CLOUD
Current In 18 months
Applications Driving Design Change
Network Virtualization
ATTRIBUTES
• Virtualized with Bare metal
• Introduction of Network Overlays
REQUIREMENTS
• Physical to Virtual (P2V) integration
• Overlay visualization & management
Everything “As-a-Service”
ATTRIBUTES
• Scale-out
• On-demand
REQUIREMENTS
• Multi-tenancy
• Simple to operate, easy to scale
Modern App Flows
ATTRIBUTES
• Increased Machine to Machine
• East-West traffic
REQUIREMENTS
• Flatter Topology
• High performance and consistent
Today You Are Here
User IT Admin
You Need to Be Here
User
CLICK HERE
Orchestration? Security? Protocols?SDN? Support?Intelligence?
Path to Success: Identify
Today You Are Here
• Resources are in silos
• Network services are on physical appliances
• Tasks are not automated
• Orchestration is decentralized
• Security is an afterthought
VLANS VLANS
FINANCE HR MARKETING
Firewalls
Load-Balancer
Physical
Servers
Local Hard
Drives
You Need to Be Here
VIRTUALIZED
HR MARKETINGFINANCE
• Resources are pooled
• Network services are virtualized and distributed
• Moves/adds/changes are fully automated
• Orchestration is completely centralized
• Security is integrated
Path to Success: Set Goals
Path to Success: Foundational Impediments
Security is difficult
Physical is the default
Bottlenecks
Automation is key
Difficult to automate
Box-by-box touch points
Difficult to mine data
Processes are manual
Suboptimal topologies
Inconsistent performance
Disaggregated elements
Network is complex
Application silos
Client/User
Employees CustomersFinance
Application
Mail EDIERP
95%
Portal:
Data Sources:
Applications:
Employees Customers Partners Suppliers DevicesDatabase Transactions Sensors Inventory Devices
Analysis Reporting CRM Database Administration
InventoryHRPurchasing
Analysis Reporting CRM Mail Order Processing
InventoryHRPurchasing
Network Devices Rich media New applications Digitized information Machine to MachineEmployees Customers Machines Suppliers Partners
“Any to Any” Services
Sharing, Flexibility, Velocity
Employees CustomersFinance
EDIMailERP Mail EDIERP
>75%
Portal:
Data Sources:
Applications:
Employees Customers Partners Suppliers DevicesDatabase Transactions Sensors Inventory Devices
Analysis Reporting CRM Database Administration
InventoryHRPurchasing
Analysis Reporting CRM Mail Order Processing
InventoryHRPurchasing
Network Devices Rich media New applications Digitized information Machine to MachineEmployees Customers Machines Suppliers Partners
Moving to the Cloud
Legacy DC
Suppliers DevicesInventory Devices
Database Administration
Inventory
Mail Order Processing
Inventory
Digitized information Machine to MachineSuppliers Partners
Moving to the Cloud
Legacy DC Virtualized DC Cloud DC
Design for five 9s
• Apps not resilient
• High end x86 servers
• Virtual machines
• Shared storage - FC
• L2 adjacency
Design for 3 9s
• Apps resilient
• Commodity servers
• Virtualization
• NAS storage
• L3 connectivity
Devices
Database
Inventory
Digitized information
Moving to the Cloud
Legacy DC Virtualized DC Cloud DC
Devices
Mail Order Processing
Inventory
Suppliers Partners
Devices
Mail
Inventory
Suppliers
Order Processing
Partners
Inventory
Devices
Inventory
Digitized information
Moving to the Cloud
Legacy DC Virtualized DC Cloud DC
Devices
Inventory
Suppliers
Order Processing
Partners
Inventory
Mail
Network
Big Data - Hadoop
Agility – Time to Provision
2 Months
Physical
Server
Time
Virtual
Server
2 WeeksNetwork
2 WeeksStorage
2 Minutes
Orchestration,
Automation,
Automation
“Crushing Grapes”
Orchestration
“Making Wine”
Automation ≠ Orchestration
Speeding up “IT” Workflows at scale while eliminating errors
Automation helps eliminate
repeatable manual tasks
through scripts or other
software tools
Orchestration is an extension
of automation that groups
automated tasks into
coordinated workflows.
Path to the Cloud
Self Provisioned
Clouds
Cloud DC
3
Optimization
Greater Agility &
Availability
Virtualized DC
2
Consolidation
Lower Cost
Legacy DC
1
Server Virtualization
Network, Automation
Orchestration
Public
Private
MetaFabric
VM
VM
VM
Virtual Physical
VM
VM
VM
Virtual Physical
VM
VM
VM
Virtual Physical
VM
VM
VM
Virtual Physical
My on-premises
data center
My hosted
service provider
My cloud
service provider
My managed
service provider
VM
VM
VM
Virtual
VM
VM
VM
Virtual
Architecture for building a coherent network within & between data centers
MetaFabric – Three Steps
Automate Operations
Orchestration
Network automation and analytics
Network virtualization
MH
Secure the NetworkNetwork
security
Simplify the Network
Network infrastructure
Data CenterDCIData Center
Simplify the network
Old Model:
Deploy individual
network elements
New Model:
Deploy a coherent
network
• Data plane driven • Shared distributed control plane
• Common management plane
Simplify the network
Coherent architecture
Building blocks
Topology
Tree Spine and Leaf
Advantages:
• Better, more consistent app performance
• More agile - eliminates locality issues
• Simpler to manage
• Lower cost
Simplify the network
Coherent architecture
Building blocks
Topology
Access
Spine
Edge
Simplify the network
Coherent architecture
Building blocks
Topology
Access
Spine
Edge
Coherent Network:
Shared, distributed control plane
Common management plane
MC-LAGEthernet FabricIP Fabric w/ Open ClosCoherence beyond the edge
Coherent architectures
Legacy and Virtualized data centers
Private cloud data centers
Public cloud data centers
Virtual Network Fabric Overlay
IP Fabric
All L3
Multi-Tier w/ MC-LAG
L2/L3
Ethernet Fabric
L2/L3
MetaFabric – Three Steps
Secure the NetworkNetwork
security
Simplify the Network
Network infrastructure
Data CenterDCIData Center
Automate Operations
Orchestration
Network automation and analytics
Network virtualization
MH
Secure – a new model for the cloud
Castle Model
Hotel Model
• Micro-perimeterization
• Multiple enforcement points
• Supported by the cloud
Security Enforcement
Router (MX)
[stateless ACL L2-3]
5
Physical Firewall Appliance (SRX)
[Stateful L2-L7 firewall]
1
DC Spine Switch (QFX1000)
[Stateful ACL and/or L4-7 firewall]
3
DC Leaf Switch (QFX5100)
[Stateful ACL and/or L4-7 firewall]
4
VT-x
Hypervisor
VAVASDN
Virtualized Host with virtual
firewall
(dFW, Contrail vRouter, vSRX)
[Stateful ACL and/or L4-7 firewall]
2
SD
SPACE
ND VD
APIs & libraries exposed to operators,
orchestration, & automation platforms
To Device-specific APIs
Contrail
Central
Policy
Engine
Threat
Intelligence
Threat
Intelligence
MetaFabric – Three Steps
Automate Operations
Orchestration
Network automation and analytics
Network virtualization
MH
Secure the NetworkNetwork
security
Simplify the Network
Network infrastructure
Data CenterDCIData Center
Automate operations
Old Model:
Manage network
devices
New Model:
Automate the
workflow of
delivering the
application
Automate Work Flows
Build & Provision
Operate & Monitor
Orchestrate
Benefits:
Repeatability
More reliable
More agile
Lower operating cost
The Automation Stack
Junos
Data Plane (PFE)Chassis
XML-RPC
PythonEZ Framework RubyEZ Library
Ansible
Python
Scripts
ChefPuppet
Ruby
Scripts
Netconf Junoscript
SNMP
RO
CLI
Junos Platform Automation Stack
Chef
Junos
Data Plane (PFE)Chassis
XML-RPC
Netconf
PythonEZ Framework RubyEZ Library
PuppetAnsible
Python
Scripts
Ruby
Scripts
Junoscript
SNMP
RO
CLI
Junos Platform Automation Stack
Two Approaches
Network Coherence
BottomsUp
Network Director
Security Director
Target top 20% of tasks – 80% of the effort
Two Approaches
Network Coherence
Build your own
TopsDown
Network Virtualization
Network Director
Security Director
Network Virtualization
Network Virtualization
Can we do for the network
what we did for the server?
Network Virtualization
VLANs
A1 B1 A2 B2
Network Virtualization
Promise of Overlays
A1 B1 A2 B2
Network Virtualization
Service Chaining
A1 B1A2 B2
Virtual Network A Virtual Network B
FW IDP LB NAT
MetaFabric – Three Steps
Automate Operations
Orchestration
Network automation and analytics
Network virtualization
MH
Secure the NetworkNetwork
security
Simplify the Network
Network infrastructure
Data CenterDCIData Center
Thank you

Mais conteúdo relacionado

Mais procurados

Building an AppSec Team Extended Cut
Building an AppSec Team Extended CutBuilding an AppSec Team Extended Cut
Building an AppSec Team Extended CutMike Spaulding
 
Robert Hurlbut - Threat Modeling for Secure Software Design
Robert Hurlbut - Threat Modeling for Secure Software DesignRobert Hurlbut - Threat Modeling for Secure Software Design
Robert Hurlbut - Threat Modeling for Secure Software Designcentralohioissa
 
Tripwire Energy Working Group: TIV Demo
Tripwire Energy Working Group: TIV Demo Tripwire Energy Working Group: TIV Demo
Tripwire Energy Working Group: TIV Demo Tripwire
 
Accelerating OT - A Case Study
Accelerating OT - A Case StudyAccelerating OT - A Case Study
Accelerating OT - A Case StudyDigital Bond
 
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...Shah Sheikh
 
Vulnerability Testing Services Case Study
Vulnerability Testing Services Case StudyVulnerability Testing Services Case Study
Vulnerability Testing Services Case StudyNandita Nityanandam
 
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?michaelbasoah
 
IBM Q-radar security intelligence roadmap
IBM Q-radar security intelligence roadmapIBM Q-radar security intelligence roadmap
IBM Q-radar security intelligence roadmapDATA SECURITY SOLUTIONS
 
Why Zero Trust Yields Maximum Security
Why Zero Trust Yields Maximum SecurityWhy Zero Trust Yields Maximum Security
Why Zero Trust Yields Maximum SecurityPriyanka Aash
 
Stop Hackers with Integrated CASB & IDaaS Security
Stop Hackers with  Integrated CASB & IDaaS SecurityStop Hackers with  Integrated CASB & IDaaS Security
Stop Hackers with Integrated CASB & IDaaS SecurityOneLogin
 
Art Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat PreventionArt Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat Preventioncentralohioissa
 
Security Analytics for Data Discovery - Closing the SIEM Gap
Security Analytics for Data Discovery - Closing the SIEM GapSecurity Analytics for Data Discovery - Closing the SIEM Gap
Security Analytics for Data Discovery - Closing the SIEM GapEric Johansen, CISSP
 
Information Security
Information SecurityInformation Security
Information SecurityMohit8780
 
Vulnerability threat and attack
Vulnerability threat and attackVulnerability threat and attack
Vulnerability threat and attacknewbie2019
 
Symantec Data Loss Prevention - Technical Proposal (General)
Symantec Data Loss Prevention - Technical Proposal (General)Symantec Data Loss Prevention - Technical Proposal (General)
Symantec Data Loss Prevention - Technical Proposal (General)Iftikhar Ali Iqbal
 
The Subversive Six: Hidden Risk Points in ICS
The Subversive Six: Hidden Risk Points in ICSThe Subversive Six: Hidden Risk Points in ICS
The Subversive Six: Hidden Risk Points in ICSTripwire
 
Stopping zero day threats
Stopping zero day threatsStopping zero day threats
Stopping zero day threatsZscaler
 
LoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityLoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityRohit Kapoor
 

Mais procurados (20)

Building an AppSec Team Extended Cut
Building an AppSec Team Extended CutBuilding an AppSec Team Extended Cut
Building an AppSec Team Extended Cut
 
Robert Hurlbut - Threat Modeling for Secure Software Design
Robert Hurlbut - Threat Modeling for Secure Software DesignRobert Hurlbut - Threat Modeling for Secure Software Design
Robert Hurlbut - Threat Modeling for Secure Software Design
 
Tripwire Energy Working Group: TIV Demo
Tripwire Energy Working Group: TIV Demo Tripwire Energy Working Group: TIV Demo
Tripwire Energy Working Group: TIV Demo
 
Accelerating OT - A Case Study
Accelerating OT - A Case StudyAccelerating OT - A Case Study
Accelerating OT - A Case Study
 
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
 
Vulnerability Testing Services Case Study
Vulnerability Testing Services Case StudyVulnerability Testing Services Case Study
Vulnerability Testing Services Case Study
 
SD-WAN - comSpark 2019
SD-WAN - comSpark 2019SD-WAN - comSpark 2019
SD-WAN - comSpark 2019
 
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?
 
IBM Q-radar security intelligence roadmap
IBM Q-radar security intelligence roadmapIBM Q-radar security intelligence roadmap
IBM Q-radar security intelligence roadmap
 
Why Zero Trust Yields Maximum Security
Why Zero Trust Yields Maximum SecurityWhy Zero Trust Yields Maximum Security
Why Zero Trust Yields Maximum Security
 
Stop Hackers with Integrated CASB & IDaaS Security
Stop Hackers with  Integrated CASB & IDaaS SecurityStop Hackers with  Integrated CASB & IDaaS Security
Stop Hackers with Integrated CASB & IDaaS Security
 
Art Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat PreventionArt Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat Prevention
 
Security Analytics for Data Discovery - Closing the SIEM Gap
Security Analytics for Data Discovery - Closing the SIEM GapSecurity Analytics for Data Discovery - Closing the SIEM Gap
Security Analytics for Data Discovery - Closing the SIEM Gap
 
Endpoint Security
Endpoint SecurityEndpoint Security
Endpoint Security
 
Information Security
Information SecurityInformation Security
Information Security
 
Vulnerability threat and attack
Vulnerability threat and attackVulnerability threat and attack
Vulnerability threat and attack
 
Symantec Data Loss Prevention - Technical Proposal (General)
Symantec Data Loss Prevention - Technical Proposal (General)Symantec Data Loss Prevention - Technical Proposal (General)
Symantec Data Loss Prevention - Technical Proposal (General)
 
The Subversive Six: Hidden Risk Points in ICS
The Subversive Six: Hidden Risk Points in ICSThe Subversive Six: Hidden Risk Points in ICS
The Subversive Six: Hidden Risk Points in ICS
 
Stopping zero day threats
Stopping zero day threatsStopping zero day threats
Stopping zero day threats
 
LoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityLoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated Cybersecurity
 

Semelhante a Lisa Guess - Embracing the Cloud

Virtualization and cloud computing
Virtualization and cloud computingVirtualization and cloud computing
Virtualization and cloud computingDeep Gupta
 
Brocade Software Networking Presentation at Interface 2016
Brocade Software Networking Presentation at Interface 2016Brocade Software Networking Presentation at Interface 2016
Brocade Software Networking Presentation at Interface 2016Scott Sims
 
Risc and velostrata 2 28 2018 lessons_in_cloud_migration
Risc and velostrata  2 28 2018 lessons_in_cloud_migrationRisc and velostrata  2 28 2018 lessons_in_cloud_migration
Risc and velostrata 2 28 2018 lessons_in_cloud_migrationRISC Networks
 
A Complete Guide Cloud Computing
A Complete Guide Cloud ComputingA Complete Guide Cloud Computing
A Complete Guide Cloud ComputingSripati Mahapatra
 
z Systems redefining Enterprise IT for digital business - Alain Poquillon
z Systems redefining Enterprise IT for digital business - Alain Poquillonz Systems redefining Enterprise IT for digital business - Alain Poquillon
z Systems redefining Enterprise IT for digital business - Alain PoquillonNRB
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud ComputingUnmesh Ballal
 
Financial impact of Cloud Computing
Financial impact of Cloud ComputingFinancial impact of Cloud Computing
Financial impact of Cloud Computingkrisbliesner
 
Unit 1.2 move to cloud computing
Unit 1.2   move to cloud computingUnit 1.2   move to cloud computing
Unit 1.2 move to cloud computingeShikshak
 
Plenary_three_Cloud_computing_-_is_social_housing_ready_for_it_-_Phil_Copperw...
Plenary_three_Cloud_computing_-_is_social_housing_ready_for_it_-_Phil_Copperw...Plenary_three_Cloud_computing_-_is_social_housing_ready_for_it_-_Phil_Copperw...
Plenary_three_Cloud_computing_-_is_social_housing_ready_for_it_-_Phil_Copperw...Phil Copperwheat
 
Digital Transformation in 2018: DX 4 3-2-1
Digital Transformation in 2018: DX 4 3-2-1Digital Transformation in 2018: DX 4 3-2-1
Digital Transformation in 2018: DX 4 3-2-1James Kelly
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud ComputingBharat Kalia
 
Enabling the Software Defined Data Center for Hybrid IT
Enabling the Software Defined Data Center for Hybrid ITEnabling the Software Defined Data Center for Hybrid IT
Enabling the Software Defined Data Center for Hybrid ITNetApp
 
What is Your Edge From the Cloud to the Edge, Extending Your Reach
What is Your Edge From the Cloud to the Edge, Extending Your ReachWhat is Your Edge From the Cloud to the Edge, Extending Your Reach
What is Your Edge From the Cloud to the Edge, Extending Your ReachSUSE
 
New Delhi Cloud Summit 05 26-11
New Delhi Cloud Summit 05 26-11New Delhi Cloud Summit 05 26-11
New Delhi Cloud Summit 05 26-11Dileep Bhandarkar
 

Semelhante a Lisa Guess - Embracing the Cloud (20)

Virtualization and cloud computing
Virtualization and cloud computingVirtualization and cloud computing
Virtualization and cloud computing
 
Brocade Software Networking Presentation at Interface 2016
Brocade Software Networking Presentation at Interface 2016Brocade Software Networking Presentation at Interface 2016
Brocade Software Networking Presentation at Interface 2016
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Risc and velostrata 2 28 2018 lessons_in_cloud_migration
Risc and velostrata  2 28 2018 lessons_in_cloud_migrationRisc and velostrata  2 28 2018 lessons_in_cloud_migration
Risc and velostrata 2 28 2018 lessons_in_cloud_migration
 
A Complete Guide Cloud Computing
A Complete Guide Cloud ComputingA Complete Guide Cloud Computing
A Complete Guide Cloud Computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
z Systems redefining Enterprise IT for digital business - Alain Poquillon
z Systems redefining Enterprise IT for digital business - Alain Poquillonz Systems redefining Enterprise IT for digital business - Alain Poquillon
z Systems redefining Enterprise IT for digital business - Alain Poquillon
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud Computing
 
Financial impact of Cloud Computing
Financial impact of Cloud ComputingFinancial impact of Cloud Computing
Financial impact of Cloud Computing
 
Unit 1.2 move to cloud computing
Unit 1.2   move to cloud computingUnit 1.2   move to cloud computing
Unit 1.2 move to cloud computing
 
ECI - The Elastic Network - winds of change
ECI - The Elastic Network - winds of changeECI - The Elastic Network - winds of change
ECI - The Elastic Network - winds of change
 
Plenary_three_Cloud_computing_-_is_social_housing_ready_for_it_-_Phil_Copperw...
Plenary_three_Cloud_computing_-_is_social_housing_ready_for_it_-_Phil_Copperw...Plenary_three_Cloud_computing_-_is_social_housing_ready_for_it_-_Phil_Copperw...
Plenary_three_Cloud_computing_-_is_social_housing_ready_for_it_-_Phil_Copperw...
 
Orange Business Live 2013 cloud breakout
Orange Business Live 2013 cloud breakoutOrange Business Live 2013 cloud breakout
Orange Business Live 2013 cloud breakout
 
Digital Transformation in 2018: DX 4 3-2-1
Digital Transformation in 2018: DX 4 3-2-1Digital Transformation in 2018: DX 4 3-2-1
Digital Transformation in 2018: DX 4 3-2-1
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud Computing
 
Enabling the Software Defined Data Center for Hybrid IT
Enabling the Software Defined Data Center for Hybrid ITEnabling the Software Defined Data Center for Hybrid IT
Enabling the Software Defined Data Center for Hybrid IT
 
What is Your Edge From the Cloud to the Edge, Extending Your Reach
What is Your Edge From the Cloud to the Edge, Extending Your ReachWhat is Your Edge From the Cloud to the Edge, Extending Your Reach
What is Your Edge From the Cloud to the Edge, Extending Your Reach
 
New Delhi Cloud Summit 05 26-11
New Delhi Cloud Summit 05 26-11New Delhi Cloud Summit 05 26-11
New Delhi Cloud Summit 05 26-11
 
Basic cloud
Basic cloudBasic cloud
Basic cloud
 
What is cloud
What is cloudWhat is cloud
What is cloud
 

Mais de centralohioissa

Mike Spaulding - Building an Application Security Program
Mike Spaulding - Building an Application Security ProgramMike Spaulding - Building an Application Security Program
Mike Spaulding - Building an Application Security Programcentralohioissa
 
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...centralohioissa
 
Bob West - Educating the Board of Directors
Bob West - Educating the Board of DirectorsBob West - Educating the Board of Directors
Bob West - Educating the Board of Directorscentralohioissa
 
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about CybersecurityMark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecuritycentralohioissa
 
Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems
Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access SystemsValerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems
Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systemscentralohioissa
 
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016centralohioissa
 
Jeffrey Sweet - Third Party Risk Governance - Why? and How?
Jeffrey Sweet - Third Party Risk Governance - Why? and How?Jeffrey Sweet - Third Party Risk Governance - Why? and How?
Jeffrey Sweet - Third Party Risk Governance - Why? and How?centralohioissa
 
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...centralohioissa
 
Tre Smith - From Decision to Implementation: Who's On First?
Tre Smith - From Decision to Implementation: Who's On First?Tre Smith - From Decision to Implementation: Who's On First?
Tre Smith - From Decision to Implementation: Who's On First?centralohioissa
 
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the War
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the WarGary Sheehan - Winning a Battle Doesn't Mean We Are Winning the War
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the Warcentralohioissa
 
Sean Whalen - How to Hack a Hospital
Sean Whalen - How to Hack a HospitalSean Whalen - How to Hack a Hospital
Sean Whalen - How to Hack a Hospitalcentralohioissa
 
Harry Regan - Disaster Recovery and Business Continuity - "It's never so bad ...
Harry Regan - Disaster Recovery and Business Continuity - "It's never so bad ...Harry Regan - Disaster Recovery and Business Continuity - "It's never so bad ...
Harry Regan - Disaster Recovery and Business Continuity - "It's never so bad ...centralohioissa
 
Rafeeq Rehman - Breaking the Phishing Attack Chain
Rafeeq Rehman - Breaking the Phishing Attack ChainRafeeq Rehman - Breaking the Phishing Attack Chain
Rafeeq Rehman - Breaking the Phishing Attack Chaincentralohioissa
 
Michael Woolard - Gamify Awareness Training: Failure to engage is failure to ...
Michael Woolard - Gamify Awareness Training: Failure to engage is failure to ...Michael Woolard - Gamify Awareness Training: Failure to engage is failure to ...
Michael Woolard - Gamify Awareness Training: Failure to engage is failure to ...centralohioissa
 
Ruben Melendez - Economically Justifying IT Security Initiatives
Ruben Melendez - Economically Justifying IT Security InitiativesRuben Melendez - Economically Justifying IT Security Initiatives
Ruben Melendez - Economically Justifying IT Security Initiativescentralohioissa
 
Ed McCabe - Putting the Intelligence back in Threat Intelligence
Ed McCabe - Putting the Intelligence back in Threat IntelligenceEd McCabe - Putting the Intelligence back in Threat Intelligence
Ed McCabe - Putting the Intelligence back in Threat Intelligencecentralohioissa
 
Ofer Maor - Security Automation in the SDLC - Real World Cases
Ofer Maor - Security Automation in the SDLC - Real World CasesOfer Maor - Security Automation in the SDLC - Real World Cases
Ofer Maor - Security Automation in the SDLC - Real World Casescentralohioissa
 
Jim Libersky: Cyber Security - Super Bowl 50
Jim Libersky: Cyber Security - Super Bowl 50Jim Libersky: Cyber Security - Super Bowl 50
Jim Libersky: Cyber Security - Super Bowl 50centralohioissa
 
Jim Wojno: Incident Response - No Pain, No Gain!
Jim Wojno: Incident Response - No Pain, No Gain!Jim Wojno: Incident Response - No Pain, No Gain!
Jim Wojno: Incident Response - No Pain, No Gain!centralohioissa
 
Jason Samide - State of Security & 2016 Predictions
Jason Samide - State of Security & 2016 PredictionsJason Samide - State of Security & 2016 Predictions
Jason Samide - State of Security & 2016 Predictionscentralohioissa
 

Mais de centralohioissa (20)

Mike Spaulding - Building an Application Security Program
Mike Spaulding - Building an Application Security ProgramMike Spaulding - Building an Application Security Program
Mike Spaulding - Building an Application Security Program
 
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
 
Bob West - Educating the Board of Directors
Bob West - Educating the Board of DirectorsBob West - Educating the Board of Directors
Bob West - Educating the Board of Directors
 
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about CybersecurityMark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
 
Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems
Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access SystemsValerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems
Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems
 
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
 
Jeffrey Sweet - Third Party Risk Governance - Why? and How?
Jeffrey Sweet - Third Party Risk Governance - Why? and How?Jeffrey Sweet - Third Party Risk Governance - Why? and How?
Jeffrey Sweet - Third Party Risk Governance - Why? and How?
 
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
 
Tre Smith - From Decision to Implementation: Who's On First?
Tre Smith - From Decision to Implementation: Who's On First?Tre Smith - From Decision to Implementation: Who's On First?
Tre Smith - From Decision to Implementation: Who's On First?
 
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the War
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the WarGary Sheehan - Winning a Battle Doesn't Mean We Are Winning the War
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the War
 
Sean Whalen - How to Hack a Hospital
Sean Whalen - How to Hack a HospitalSean Whalen - How to Hack a Hospital
Sean Whalen - How to Hack a Hospital
 
Harry Regan - Disaster Recovery and Business Continuity - "It's never so bad ...
Harry Regan - Disaster Recovery and Business Continuity - "It's never so bad ...Harry Regan - Disaster Recovery and Business Continuity - "It's never so bad ...
Harry Regan - Disaster Recovery and Business Continuity - "It's never so bad ...
 
Rafeeq Rehman - Breaking the Phishing Attack Chain
Rafeeq Rehman - Breaking the Phishing Attack ChainRafeeq Rehman - Breaking the Phishing Attack Chain
Rafeeq Rehman - Breaking the Phishing Attack Chain
 
Michael Woolard - Gamify Awareness Training: Failure to engage is failure to ...
Michael Woolard - Gamify Awareness Training: Failure to engage is failure to ...Michael Woolard - Gamify Awareness Training: Failure to engage is failure to ...
Michael Woolard - Gamify Awareness Training: Failure to engage is failure to ...
 
Ruben Melendez - Economically Justifying IT Security Initiatives
Ruben Melendez - Economically Justifying IT Security InitiativesRuben Melendez - Economically Justifying IT Security Initiatives
Ruben Melendez - Economically Justifying IT Security Initiatives
 
Ed McCabe - Putting the Intelligence back in Threat Intelligence
Ed McCabe - Putting the Intelligence back in Threat IntelligenceEd McCabe - Putting the Intelligence back in Threat Intelligence
Ed McCabe - Putting the Intelligence back in Threat Intelligence
 
Ofer Maor - Security Automation in the SDLC - Real World Cases
Ofer Maor - Security Automation in the SDLC - Real World CasesOfer Maor - Security Automation in the SDLC - Real World Cases
Ofer Maor - Security Automation in the SDLC - Real World Cases
 
Jim Libersky: Cyber Security - Super Bowl 50
Jim Libersky: Cyber Security - Super Bowl 50Jim Libersky: Cyber Security - Super Bowl 50
Jim Libersky: Cyber Security - Super Bowl 50
 
Jim Wojno: Incident Response - No Pain, No Gain!
Jim Wojno: Incident Response - No Pain, No Gain!Jim Wojno: Incident Response - No Pain, No Gain!
Jim Wojno: Incident Response - No Pain, No Gain!
 
Jason Samide - State of Security & 2016 Predictions
Jason Samide - State of Security & 2016 PredictionsJason Samide - State of Security & 2016 Predictions
Jason Samide - State of Security & 2016 Predictions
 

Último

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 

Último (20)

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

Lisa Guess - Embracing the Cloud

  • 1. Embracing the Cloud How is the Cloud built and how do you Secure It? Lisa Guess VP Juniper Networks - Systems Engineering
  • 2.
  • 3.
  • 4. Your business challenges How should I embrace the cloud? How do I secure the cloud? How do I innovate without disrupting business? What is my Return on Investment (ROI)?
  • 5. IT Quickly Moving Toward Cloud Source: IDG Enterprise Cloud Computing Study 2014 Percentage of respondents utilizing different types of Cloud computing environments…….. Public Cloud Private Cloud Hybrid Cloud 19% 15% 5% 61% 25% 21% 7% 47% Private Cloud Public Cloud Hybrid Cloud Non-Cloud % OF TOTAL IT ENVIRONMENT IN THE CLOUD Current In 18 months
  • 6. Applications Driving Design Change Network Virtualization ATTRIBUTES • Virtualized with Bare metal • Introduction of Network Overlays REQUIREMENTS • Physical to Virtual (P2V) integration • Overlay visualization & management Everything “As-a-Service” ATTRIBUTES • Scale-out • On-demand REQUIREMENTS • Multi-tenancy • Simple to operate, easy to scale Modern App Flows ATTRIBUTES • Increased Machine to Machine • East-West traffic REQUIREMENTS • Flatter Topology • High performance and consistent
  • 7. Today You Are Here User IT Admin You Need to Be Here User CLICK HERE Orchestration? Security? Protocols?SDN? Support?Intelligence? Path to Success: Identify
  • 8. Today You Are Here • Resources are in silos • Network services are on physical appliances • Tasks are not automated • Orchestration is decentralized • Security is an afterthought VLANS VLANS FINANCE HR MARKETING Firewalls Load-Balancer Physical Servers Local Hard Drives You Need to Be Here VIRTUALIZED HR MARKETINGFINANCE • Resources are pooled • Network services are virtualized and distributed • Moves/adds/changes are fully automated • Orchestration is completely centralized • Security is integrated Path to Success: Set Goals
  • 9. Path to Success: Foundational Impediments Security is difficult Physical is the default Bottlenecks Automation is key Difficult to automate Box-by-box touch points Difficult to mine data Processes are manual Suboptimal topologies Inconsistent performance Disaggregated elements Network is complex
  • 11. Portal: Data Sources: Applications: Employees Customers Partners Suppliers DevicesDatabase Transactions Sensors Inventory Devices Analysis Reporting CRM Database Administration InventoryHRPurchasing Analysis Reporting CRM Mail Order Processing InventoryHRPurchasing Network Devices Rich media New applications Digitized information Machine to MachineEmployees Customers Machines Suppliers Partners “Any to Any” Services Sharing, Flexibility, Velocity Employees CustomersFinance EDIMailERP Mail EDIERP >75%
  • 12. Portal: Data Sources: Applications: Employees Customers Partners Suppliers DevicesDatabase Transactions Sensors Inventory Devices Analysis Reporting CRM Database Administration InventoryHRPurchasing Analysis Reporting CRM Mail Order Processing InventoryHRPurchasing Network Devices Rich media New applications Digitized information Machine to MachineEmployees Customers Machines Suppliers Partners Moving to the Cloud Legacy DC
  • 13. Suppliers DevicesInventory Devices Database Administration Inventory Mail Order Processing Inventory Digitized information Machine to MachineSuppliers Partners Moving to the Cloud Legacy DC Virtualized DC Cloud DC Design for five 9s • Apps not resilient • High end x86 servers • Virtual machines • Shared storage - FC • L2 adjacency Design for 3 9s • Apps resilient • Commodity servers • Virtualization • NAS storage • L3 connectivity
  • 14. Devices Database Inventory Digitized information Moving to the Cloud Legacy DC Virtualized DC Cloud DC Devices Mail Order Processing Inventory Suppliers Partners Devices Mail Inventory Suppliers Order Processing Partners Inventory
  • 15. Devices Inventory Digitized information Moving to the Cloud Legacy DC Virtualized DC Cloud DC Devices Inventory Suppliers Order Processing Partners Inventory Mail Network Big Data - Hadoop
  • 16. Agility – Time to Provision 2 Months Physical Server Time Virtual Server 2 WeeksNetwork 2 WeeksStorage 2 Minutes Orchestration, Automation,
  • 17. Automation “Crushing Grapes” Orchestration “Making Wine” Automation ≠ Orchestration Speeding up “IT” Workflows at scale while eliminating errors Automation helps eliminate repeatable manual tasks through scripts or other software tools Orchestration is an extension of automation that groups automated tasks into coordinated workflows.
  • 18. Path to the Cloud Self Provisioned Clouds Cloud DC 3 Optimization Greater Agility & Availability Virtualized DC 2 Consolidation Lower Cost Legacy DC 1 Server Virtualization Network, Automation Orchestration Public Private
  • 19. MetaFabric VM VM VM Virtual Physical VM VM VM Virtual Physical VM VM VM Virtual Physical VM VM VM Virtual Physical My on-premises data center My hosted service provider My cloud service provider My managed service provider VM VM VM Virtual VM VM VM Virtual Architecture for building a coherent network within & between data centers
  • 20. MetaFabric – Three Steps Automate Operations Orchestration Network automation and analytics Network virtualization MH Secure the NetworkNetwork security Simplify the Network Network infrastructure Data CenterDCIData Center
  • 21. Simplify the network Old Model: Deploy individual network elements New Model: Deploy a coherent network • Data plane driven • Shared distributed control plane • Common management plane
  • 22. Simplify the network Coherent architecture Building blocks Topology Tree Spine and Leaf Advantages: • Better, more consistent app performance • More agile - eliminates locality issues • Simpler to manage • Lower cost
  • 23. Simplify the network Coherent architecture Building blocks Topology Access Spine Edge
  • 24. Simplify the network Coherent architecture Building blocks Topology Access Spine Edge Coherent Network: Shared, distributed control plane Common management plane MC-LAGEthernet FabricIP Fabric w/ Open ClosCoherence beyond the edge
  • 25. Coherent architectures Legacy and Virtualized data centers Private cloud data centers Public cloud data centers Virtual Network Fabric Overlay IP Fabric All L3 Multi-Tier w/ MC-LAG L2/L3 Ethernet Fabric L2/L3
  • 26. MetaFabric – Three Steps Secure the NetworkNetwork security Simplify the Network Network infrastructure Data CenterDCIData Center Automate Operations Orchestration Network automation and analytics Network virtualization MH
  • 27. Secure – a new model for the cloud Castle Model Hotel Model • Micro-perimeterization • Multiple enforcement points • Supported by the cloud
  • 28. Security Enforcement Router (MX) [stateless ACL L2-3] 5 Physical Firewall Appliance (SRX) [Stateful L2-L7 firewall] 1 DC Spine Switch (QFX1000) [Stateful ACL and/or L4-7 firewall] 3 DC Leaf Switch (QFX5100) [Stateful ACL and/or L4-7 firewall] 4 VT-x Hypervisor VAVASDN Virtualized Host with virtual firewall (dFW, Contrail vRouter, vSRX) [Stateful ACL and/or L4-7 firewall] 2 SD SPACE ND VD APIs & libraries exposed to operators, orchestration, & automation platforms To Device-specific APIs Contrail Central Policy Engine Threat Intelligence Threat Intelligence
  • 29. MetaFabric – Three Steps Automate Operations Orchestration Network automation and analytics Network virtualization MH Secure the NetworkNetwork security Simplify the Network Network infrastructure Data CenterDCIData Center
  • 30. Automate operations Old Model: Manage network devices New Model: Automate the workflow of delivering the application
  • 31. Automate Work Flows Build & Provision Operate & Monitor Orchestrate Benefits: Repeatability More reliable More agile Lower operating cost
  • 32. The Automation Stack Junos Data Plane (PFE)Chassis XML-RPC PythonEZ Framework RubyEZ Library Ansible Python Scripts ChefPuppet Ruby Scripts Netconf Junoscript SNMP RO CLI Junos Platform Automation Stack
  • 33. Chef Junos Data Plane (PFE)Chassis XML-RPC Netconf PythonEZ Framework RubyEZ Library PuppetAnsible Python Scripts Ruby Scripts Junoscript SNMP RO CLI Junos Platform Automation Stack Two Approaches Network Coherence BottomsUp Network Director Security Director Target top 20% of tasks – 80% of the effort
  • 34. Two Approaches Network Coherence Build your own TopsDown Network Virtualization Network Director Security Director
  • 35. Network Virtualization Network Virtualization Can we do for the network what we did for the server?
  • 37. Network Virtualization Promise of Overlays A1 B1 A2 B2
  • 38. Network Virtualization Service Chaining A1 B1A2 B2 Virtual Network A Virtual Network B FW IDP LB NAT
  • 39. MetaFabric – Three Steps Automate Operations Orchestration Network automation and analytics Network virtualization MH Secure the NetworkNetwork security Simplify the Network Network infrastructure Data CenterDCIData Center

Notas do Editor

  1. TALK TRACK: If the goal is automation and abstraction, there are multiple ways to get to that goal Among our customers we see very different types of cloud builders Some are hard core DIYers and will build entire toolsets from scratch rather than wait for the commercial marketplace to provide what they need. Others are also DIYers, but use the tools that are available from the open source community And others just want something that works—they will typically buy and end-to-end software stack from a large vendor. In that camp we see vmware as a very viable option for many customers. We are working closely with vmware and have 6 different engineering projects happening simultaneously Finally, there are two open areas of openstack and cloudstack. We see this as the next normal. This means that the largest cloud providers who do not want to do it themselves will overtime move into the openstack environment. There are different technology paths to get to SDN Software only approach using existing architectures and overlaying automation Hybrid approach – new physical infrastructure and new architecture (still no SDN controller) full overlay model – using controller The network needs to work for all these types of cloud builders
  2. 10
  3. 11
  4. 12
  5. 13
  6. 14
  7. 15
  8. The further up the stack you go, the less complex it is for the end user to automate. However, along with it being less complex it is also less flexible. For instance, writing an application/script that interacts directly over netconf allows the user to do more (with more coding of course) than writing a playbook in Ansible. The underlying modules for Ansible have to support whatever the end user is trying to do. If the module doesn’t exist, there is the ability to build that module using the PyEZ framework and use it ad-infinitum for that particular task.
  9. The further up the stack you go, the less complex it is for the end user to automate. However, along with it being less complex it is also less flexible. For instance, writing an application/script that interacts directly over netconf allows the user to do more (with more coding of course) than writing a playbook in Ansible. The underlying modules for Ansible have to support whatever the end user is trying to do. If the module doesn’t exist, there is the ability to build that module using the PyEZ framework and use it ad-infinitum for that particular task.