SlideShare uma empresa Scribd logo
1 de 22
© 2010 SIOS Technology1© 2010 SIOS Technology
Overview ofOverview of
Cloud ComputingCloud Computing
Presented by:
Jim Kaskade
SIOS Chief of Cloud
SugarCon 2010
© 2010 SIOS Technology2
What is Cloud?
“A Virtual
Datacenter”
“Computers
For Rent On
The Internet”
“Pay for
Computing as
You Use It”
“Storage in
The Sky”
“Virtualized
Servers”
“Automatically
Scalable / Elastic
Compute Resources”
© 2010 SIOS Technology3
Cloud Evolution
 Scalable, Elastic, On-Demand Computing, Storage, & Networking
 Virtualization
 Self-serviced and available over the Internet
 Subscription / pay-as-you-use
Open
MPP
&
SMP
Open
MPP
&
SMP
Commodity
Clusters
Commodity
Clusters
Grid
Computing
Grid
Computing
1990
Virtualized
Clusters
Virtualized
Clusters
SaaS
PaaS
IaaS
SaaS
PaaS
IaaS
1995 2000 2005 20071965 1980
CloudProprietary
Mainframe
Proprietary
Mainframe
http://jameskaskade.com/?p=594
© 2010 SIOS Technology4
Cloud
Applications
(Apps-as-a-service)
Cloud
(Application)
Platforms
(Platform-as-a-Service)
Cloud
Infrastructure
(Infrastructure-as-a-Service)
App Deploy
IT Cloud Services
App Dev/Test
The Three aaS’s in Cloud
© 2010 SIOS Technology5
QuickTime™ and a
decompressor
are needed to see this picture.
Amazon S3: storage
Amazon EC2: virtual servers
Amazon CloudFront: CDN
Amazon SimpleDB & RDS
Amazon Virtual Private Cloud
Elastic MapReduce: Hadoop
Elastic Block Storage
AMI Marketplace
Windows Azure: OS
SQL Azure: RDBMS
AppFabric: Service Bus
Dallas: Marketplace
© 2010 SIOS Technology6
QuickTime™ and a
decompressor
are needed to see this picture.
Hybrid Cloud Configuration
© 2010 SIOS Technology7
On-Premise
Virtualization
Test/Development
Backup & Archive
HA/DR
Burst /
Overflow
Production
Level Of Adoption
Of Cloud Deployments
ImportancetoBusiness
Off-Premise
Cloud
Cloud Use Cases
© 2010 SIOS Technology8
Why Use The Cloud?
© 2010 SIOS Technology9
QuickTime™ and a
decompressor
are needed to see this picture.
Cloud EconomicsCloud Economics
© 2010 SIOS Technology10
QuickTime™ and a
decompressor
are needed to see this picture.
QuickTime™ and a
decompressor
are needed to see this picture.
Traditional Datacenter Cloud
© 2010 SIOS Technology11
QuickTime™ and a
decompressor
are needed to see this picture.
© 2010 SIOS Technology12
QuickTime™ and a
decompressor
are needed to see this picture.
© 2010 SIOS Technology13
QuickTime™ and a
decompressor
are needed to see this picture.
© 2010 SIOS Technology14
QuickTime™ and a
decompressor
are needed to see this picture.
© 2010 SIOS Technology15
Cloud Security?Cloud Security?
© 2010 SIOS Technology16
 Certifications &Certifications &
AccreditationsAccreditations
 Physical SecurityPhysical Security
 Secure ServicesSecure Services
 Data PrivacyData Privacy
© 2010 SIOS Technology17
 SOXSOX
 SAS70 Type IISAS70 Type II
 HIPPAHIPPA
Certifications &Certifications &
AccreditationsAccreditations
© 2010 SIOS Technology18
 Military gradeMilitary grade
perimeter controlperimeter control
 Two-factor AuthTwo-factor Auth
 ExtensiveExtensive
backgroundbackground
checkschecks
Physical SecurityPhysical Security
© 2010 SIOS Technology19
 RedundantRedundant
(multiple(multiple
locations)locations)
 EBS stored inEBS stored in
same availabilitysame availability
zonezone
BackupsBackups
© 2010 SIOS Technology20
 Host OSHost OS
 Guest OS (VM)Guest OS (VM)
 FirewallFirewall
 APIAPI
 Instance isolationInstance isolation
 DDoS mitigationDDoS mitigation
 MIDMMIDM
 IP spoofing, portIP spoofing, port
scanning, packetscanning, packet
sniffsniff
EC2 SecurityEC2 Security
© 2010 SIOS Technology21
QuickTime™ and a
decompressor
are needed to see this picture.
Enough?Enough?
© 2010 SIOS Technology22© 2010 SIOS Technology
Come and see us at:
Booth #201
Twitter: @jimkaskade #sios

Mais conteúdo relacionado

Mais procurados

Cisco at v mworld 2015 intercloud - hybrid cloud solutions for vmware workloa...
Cisco at v mworld 2015 intercloud - hybrid cloud solutions for vmware workloa...Cisco at v mworld 2015 intercloud - hybrid cloud solutions for vmware workloa...
Cisco at v mworld 2015 intercloud - hybrid cloud solutions for vmware workloa...
ldangelo0772
 
AURO Canadian Cloud Computing
AURO Canadian Cloud ComputingAURO Canadian Cloud Computing
AURO Canadian Cloud Computing
Matthew McKinney
 
VIDIZMO Two-Pager
VIDIZMO Two-PagerVIDIZMO Two-Pager
VIDIZMO Two-Pager
Najam Khan
 
Cisco asa firewall
Cisco asa firewallCisco asa firewall
Cisco asa firewall
IT Tech
 
Storage Decisions Nirvanix Introduction
Storage Decisions Nirvanix IntroductionStorage Decisions Nirvanix Introduction
Storage Decisions Nirvanix Introduction
Stephen Foskett
 

Mais procurados (19)

Cisco Connect 2018 Thailand - Next generation hyperconverged infrastructure-s...
Cisco Connect 2018 Thailand - Next generation hyperconverged infrastructure-s...Cisco Connect 2018 Thailand - Next generation hyperconverged infrastructure-s...
Cisco Connect 2018 Thailand - Next generation hyperconverged infrastructure-s...
 
Protegendo sua cloud
Protegendo sua cloud Protegendo sua cloud
Protegendo sua cloud
 
Cisco at v mworld 2015 intercloud - hybrid cloud solutions for vmware workloa...
Cisco at v mworld 2015 intercloud - hybrid cloud solutions for vmware workloa...Cisco at v mworld 2015 intercloud - hybrid cloud solutions for vmware workloa...
Cisco at v mworld 2015 intercloud - hybrid cloud solutions for vmware workloa...
 
OSC 솔루션 소개
OSC 솔루션 소개OSC 솔루션 소개
OSC 솔루션 소개
 
Cloudy Security
Cloudy SecurityCloudy Security
Cloudy Security
 
IaaS Security - Back to the Drawing Board
IaaS Security - Back to the Drawing BoardIaaS Security - Back to the Drawing Board
IaaS Security - Back to the Drawing Board
 
AURO Canadian Cloud Computing
AURO Canadian Cloud ComputingAURO Canadian Cloud Computing
AURO Canadian Cloud Computing
 
VIDIZMO Two-Pager
VIDIZMO Two-PagerVIDIZMO Two-Pager
VIDIZMO Two-Pager
 
Webair-Facilities
Webair-FacilitiesWebair-Facilities
Webair-Facilities
 
CloudCamp London #17 Intro
CloudCamp London #17 IntroCloudCamp London #17 Intro
CloudCamp London #17 Intro
 
Korejanai Story
Korejanai StoryKorejanai Story
Korejanai Story
 
CISCO’s Cloud Journey (Keynote at Cloud Symposium)
CISCO’s Cloud Journey (Keynote at Cloud Symposium) CISCO’s Cloud Journey (Keynote at Cloud Symposium)
CISCO’s Cloud Journey (Keynote at Cloud Symposium)
 
Cisco asa firewall
Cisco asa firewallCisco asa firewall
Cisco asa firewall
 
Cisco Connect 2018 Malaysia - Next-generation hyperconverged infrastructure-s...
Cisco Connect 2018 Malaysia - Next-generation hyperconverged infrastructure-s...Cisco Connect 2018 Malaysia - Next-generation hyperconverged infrastructure-s...
Cisco Connect 2018 Malaysia - Next-generation hyperconverged infrastructure-s...
 
Cisco presentatie 25 juni 2014
Cisco presentatie 25 juni 2014Cisco presentatie 25 juni 2014
Cisco presentatie 25 juni 2014
 
Storage Decisions Nirvanix Introduction
Storage Decisions Nirvanix IntroductionStorage Decisions Nirvanix Introduction
Storage Decisions Nirvanix Introduction
 
Public Presentation - OpenStack Summit - Nuage X & DevIOps
Public Presentation - OpenStack Summit - Nuage X & DevIOpsPublic Presentation - OpenStack Summit - Nuage X & DevIOps
Public Presentation - OpenStack Summit - Nuage X & DevIOps
 
FusionLayer - Network provisioning, automation, and control for private datac...
FusionLayer - Network provisioning, automation, and control for private datac...FusionLayer - Network provisioning, automation, and control for private datac...
FusionLayer - Network provisioning, automation, and control for private datac...
 
Business Cloud Adoption models in Canada
Business Cloud Adoption models in CanadaBusiness Cloud Adoption models in Canada
Business Cloud Adoption models in Canada
 

Destaque (8)

Android development-workshop-v2-1228043706544191-8
Android development-workshop-v2-1228043706544191-8Android development-workshop-v2-1228043706544191-8
Android development-workshop-v2-1228043706544191-8
 
Udk basic concepts
Udk basic conceptsUdk basic concepts
Udk basic concepts
 
Udk cutscene & export tutorial
Udk cutscene & export tutorialUdk cutscene & export tutorial
Udk cutscene & export tutorial
 
Udk basic concepts
Udk basic conceptsUdk basic concepts
Udk basic concepts
 
Presentation 3
Presentation 3Presentation 3
Presentation 3
 
[C++ lab] 1. 수업 내용 및 진행 방법
[C++ lab] 1. 수업 내용 및 진행 방법[C++ lab] 1. 수업 내용 및 진행 방법
[C++ lab] 1. 수업 내용 및 진행 방법
 
Industrial engineering
Industrial engineeringIndustrial engineering
Industrial engineering
 
Learder ability
Learder abilityLearder ability
Learder ability
 

Semelhante a What is cloud

Решения Cisco для Автоматизации Облачных Услуг - Cisco Intelligent Automation...
Решения Cisco для Автоматизации Облачных Услуг - Cisco Intelligent Automation...Решения Cisco для Автоматизации Облачных Услуг - Cisco Intelligent Automation...
Решения Cisco для Автоматизации Облачных Услуг - Cisco Intelligent Automation...
Cisco Russia
 

Semelhante a What is cloud (20)

Presentation cloud, the whole offer
Presentation   cloud, the whole offerPresentation   cloud, the whole offer
Presentation cloud, the whole offer
 
SIOS Private Cloud
SIOS Private CloudSIOS Private Cloud
SIOS Private Cloud
 
SIOS Sugarcon Track Presentation
SIOS Sugarcon Track PresentationSIOS Sugarcon Track Presentation
SIOS Sugarcon Track Presentation
 
Presentation cisco nexus enabling the cloud infrastructure
Presentation   cisco nexus enabling the cloud infrastructurePresentation   cisco nexus enabling the cloud infrastructure
Presentation cisco nexus enabling the cloud infrastructure
 
Edge Computing risks and Opportunities for Telco and hyperscalers
Edge Computing risks and Opportunities for Telco and hyperscalersEdge Computing risks and Opportunities for Telco and hyperscalers
Edge Computing risks and Opportunities for Telco and hyperscalers
 
Cisco connect montreal 2018 vision mondiale analyse locale
Cisco connect montreal 2018 vision mondiale analyse localeCisco connect montreal 2018 vision mondiale analyse locale
Cisco connect montreal 2018 vision mondiale analyse locale
 
IoT Panel- Cisco and Intel
IoT Panel- Cisco and Intel IoT Panel- Cisco and Intel
IoT Panel- Cisco and Intel
 
Overview of Cloud Computing
Overview of Cloud ComputingOverview of Cloud Computing
Overview of Cloud Computing
 
Soyez plus flexibles avec la sauvegarde dans le cloud DPS
Soyez plus flexibles avec la sauvegarde dans le cloud DPSSoyez plus flexibles avec la sauvegarde dans le cloud DPS
Soyez plus flexibles avec la sauvegarde dans le cloud DPS
 
Presentation cisco service oriented infrastructure
Presentation   cisco service oriented infrastructurePresentation   cisco service oriented infrastructure
Presentation cisco service oriented infrastructure
 
Clanavi: How to Manage Your Cloud by Drupal
Clanavi: How to Manage Your Cloud by DrupalClanavi: How to Manage Your Cloud by Drupal
Clanavi: How to Manage Your Cloud by Drupal
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Cisco Data Center Orchestration Solution
Cisco Data Center Orchestration SolutionCisco Data Center Orchestration Solution
Cisco Data Center Orchestration Solution
 
Cloud connected Solutions
Cloud connected SolutionsCloud connected Solutions
Cloud connected Solutions
 
Cisco Intercloud Announcement, Cisco Live 2014
Cisco Intercloud Announcement, Cisco Live 2014Cisco Intercloud Announcement, Cisco Live 2014
Cisco Intercloud Announcement, Cisco Live 2014
 
Cisco Keynote at NetApp Insight - Berlin
Cisco Keynote at NetApp Insight - BerlinCisco Keynote at NetApp Insight - Berlin
Cisco Keynote at NetApp Insight - Berlin
 
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
 
Решения Cisco для Автоматизации Облачных Услуг - Cisco Intelligent Automation...
Решения Cisco для Автоматизации Облачных Услуг - Cisco Intelligent Automation...Решения Cisco для Автоматизации Облачных Услуг - Cisco Intelligent Automation...
Решения Cisco для Автоматизации Облачных Услуг - Cisco Intelligent Automation...
 
Cisco’s Cloud Strategy, including our acquisition of CliQr
Cisco’s Cloud Strategy, including our acquisition of CliQr Cisco’s Cloud Strategy, including our acquisition of CliQr
Cisco’s Cloud Strategy, including our acquisition of CliQr
 
Presentation cisco cloud security
Presentation   cisco cloud securityPresentation   cisco cloud security
Presentation cisco cloud security
 

Último

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Último (20)

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

What is cloud

  • 1. © 2010 SIOS Technology1© 2010 SIOS Technology Overview ofOverview of Cloud ComputingCloud Computing Presented by: Jim Kaskade SIOS Chief of Cloud SugarCon 2010
  • 2. © 2010 SIOS Technology2 What is Cloud? “A Virtual Datacenter” “Computers For Rent On The Internet” “Pay for Computing as You Use It” “Storage in The Sky” “Virtualized Servers” “Automatically Scalable / Elastic Compute Resources”
  • 3. © 2010 SIOS Technology3 Cloud Evolution  Scalable, Elastic, On-Demand Computing, Storage, & Networking  Virtualization  Self-serviced and available over the Internet  Subscription / pay-as-you-use Open MPP & SMP Open MPP & SMP Commodity Clusters Commodity Clusters Grid Computing Grid Computing 1990 Virtualized Clusters Virtualized Clusters SaaS PaaS IaaS SaaS PaaS IaaS 1995 2000 2005 20071965 1980 CloudProprietary Mainframe Proprietary Mainframe http://jameskaskade.com/?p=594
  • 4. © 2010 SIOS Technology4 Cloud Applications (Apps-as-a-service) Cloud (Application) Platforms (Platform-as-a-Service) Cloud Infrastructure (Infrastructure-as-a-Service) App Deploy IT Cloud Services App Dev/Test The Three aaS’s in Cloud
  • 5. © 2010 SIOS Technology5 QuickTime™ and a decompressor are needed to see this picture. Amazon S3: storage Amazon EC2: virtual servers Amazon CloudFront: CDN Amazon SimpleDB & RDS Amazon Virtual Private Cloud Elastic MapReduce: Hadoop Elastic Block Storage AMI Marketplace Windows Azure: OS SQL Azure: RDBMS AppFabric: Service Bus Dallas: Marketplace
  • 6. © 2010 SIOS Technology6 QuickTime™ and a decompressor are needed to see this picture. Hybrid Cloud Configuration
  • 7. © 2010 SIOS Technology7 On-Premise Virtualization Test/Development Backup & Archive HA/DR Burst / Overflow Production Level Of Adoption Of Cloud Deployments ImportancetoBusiness Off-Premise Cloud Cloud Use Cases
  • 8. © 2010 SIOS Technology8 Why Use The Cloud?
  • 9. © 2010 SIOS Technology9 QuickTime™ and a decompressor are needed to see this picture. Cloud EconomicsCloud Economics
  • 10. © 2010 SIOS Technology10 QuickTime™ and a decompressor are needed to see this picture. QuickTime™ and a decompressor are needed to see this picture. Traditional Datacenter Cloud
  • 11. © 2010 SIOS Technology11 QuickTime™ and a decompressor are needed to see this picture.
  • 12. © 2010 SIOS Technology12 QuickTime™ and a decompressor are needed to see this picture.
  • 13. © 2010 SIOS Technology13 QuickTime™ and a decompressor are needed to see this picture.
  • 14. © 2010 SIOS Technology14 QuickTime™ and a decompressor are needed to see this picture.
  • 15. © 2010 SIOS Technology15 Cloud Security?Cloud Security?
  • 16. © 2010 SIOS Technology16  Certifications &Certifications & AccreditationsAccreditations  Physical SecurityPhysical Security  Secure ServicesSecure Services  Data PrivacyData Privacy
  • 17. © 2010 SIOS Technology17  SOXSOX  SAS70 Type IISAS70 Type II  HIPPAHIPPA Certifications &Certifications & AccreditationsAccreditations
  • 18. © 2010 SIOS Technology18  Military gradeMilitary grade perimeter controlperimeter control  Two-factor AuthTwo-factor Auth  ExtensiveExtensive backgroundbackground checkschecks Physical SecurityPhysical Security
  • 19. © 2010 SIOS Technology19  RedundantRedundant (multiple(multiple locations)locations)  EBS stored inEBS stored in same availabilitysame availability zonezone BackupsBackups
  • 20. © 2010 SIOS Technology20  Host OSHost OS  Guest OS (VM)Guest OS (VM)  FirewallFirewall  APIAPI  Instance isolationInstance isolation  DDoS mitigationDDoS mitigation  MIDMMIDM  IP spoofing, portIP spoofing, port scanning, packetscanning, packet sniffsniff EC2 SecurityEC2 Security
  • 21. © 2010 SIOS Technology21 QuickTime™ and a decompressor are needed to see this picture. Enough?Enough?
  • 22. © 2010 SIOS Technology22© 2010 SIOS Technology Come and see us at: Booth #201 Twitter: @jimkaskade #sios

Notas do Editor

  1. In this session SIOS will cover a new SugarCRM offering for High Availability (HA) and Disaster Recovery (DR), leveraging the benefits of cloud computing. Take advantage of cloud as your real-time failover instead of investing in expensive on-premise HA or DR server clusters. In this session you will learn about: * Cloud Security * High Availability via the Cloud * Disaster Recovery via the Cloud * Public Cloud use-cases * Deploying SugarCRM HA/DR * Application Monitoring & Real-time data replication If you have mission-critical applications and associated business data, can you afford not to have a clear business continuity plan? And if you have a plan, can you afford not to consider the benefits of cloud computing such as: opex vs. capex, flexibility, time-to-market, and efficiency of resources?
  2. * Host Operating System: AWS administrators with a business need are required to use their individual cryptographically strong SSH keys to gain access to a bastion host. These bastion hosts are specifically built systems that are designed and configured to protect the management plane of the cloud. Once connected to the bastion, authorized administrators are able to use a privilege escalation command to gain access to an individual host. All such accesses are logged and routinely audited. When an AWS employee no longer has a business need to administer EC2 hosts, their privileges on and access to the bastion hosts are revoked. * Guest Operating System: Virtual instances are completely controlled by the customer. They have full root access and all administrative control over additional accounts, services, and applications. AWS administrators do not have access to customer instances, and cannot log into the guest OS. Customers should disable password-based access to their hosts and utilize token or key-based authentication to gain access to unprivileged accounts. Further, customers should employ a privilege escalation mechanism with logging on a per-user basis. For example, if the guest OS is Linux, utilize SSH with keys to access the virtual instance, enable shell command-line logging, and use the ‘sudo’ utility for privilege escalation. Customers should generate their own key pairs in order to guarantee that they are unique, and not shared with other customers or with AWS. * Firewall: Amazon EC2 provides a complete firewall solution; this mandatory inbound firewall is configured in a default deny mode and the Amazon EC2 customer must explicitly open any ports to allow inbound traffic. The traffic may be restricted by protocol, by service port, as well as by source IP address (individual IP or CIDR block). API: Calls to launch and terminate instances, change firewall parameters, and perform other functions are all signed by an X.509 certificate or the customer’s Amazon Secret Access Key. Without access to the customer’s Secret Access Key or X.509 certificate, Amazon EC2 API calls cannot be made on their behalf. In addition, API calls can be encrypted in transit with SSL to maintain confidentiality. Amazon recommends always using SSL-protected API endpoints. The Hypervisor Amazon EC2 currently utilizes a highly customized version of the Xen hypervisor, taking advantage of paravirtualization. Because paravirtualized guests rely on the hypervisor to provide support for operations that normally require privileged access, it is possible to run the guest OS with no elevated access to the CPU. This explicit virtualization of the physical resources leads to a clear separation between guest and hypervisor, resulting in strong security separation between the two. Instance Isolation Different instances running on the same physical machine are isolated from each other utilizing the Xen hypervisor. Amazon is an active participant and contributor within the Xen community, which ensures awareness of potential pending issues. In addition, the aforementioned firewall resides within the hypervisor layer, between the physical interface and the instance's virtual interface. All packets must pass through this layer, thus an instance’s neighbors have no additional access to that instance, and can be treated as if they are on separate physical hosts. The physical RAM is separated using similar mechanisms. Customer instances have no access to raw disk devices, but instead are presented with virtualized disks. The AWS proprietary disk virtualization layer automatically wipes every block of storage used by the customer, and guarantees that one customer’s data is never exposed to another. Note that unintentionally leaving data on disk devices is only one possible breach of confidentiality; many others exist, and for this reason AWS recommends that customers further protect their data using appropriate means. One common solution is to run an encrypted filesystem on top of the virtualized disk device. Network Security The AWS network provides significant protection against traditional network security issues and the customer can implement further protection. The following are a few examples: * Distributed Denial Of Service (DDoS) Attacks: AWS API endpoints are hosted on the same Internet-scale, world class infrastructure that supports the Amazon.com retail site. Standard DDoS mitigation techniques such as syn cookies and connection limiting are used. To further mitigate the effect of potential DDoS attacks, Amazon maintains internal bandwidth which exceeds its provider-supplied Internet bandwidth. * Man In the Middle (MITM) Attacks: All of the AWS APIs are available via SSL-protected endpoints which provides server authentication. Amazon EC2 AMIs automatically generate new SSH host keys on first boot and log them to the console. Customers can then use the secure APIs to call the console and access the host keys before logging into the instance for the first time. Customers are encouraged to use the SSL endpoints for all of their interactions with AWS. * IP Spoofing: Amazon EC2 instances cannot send spoofed traffic. The Amazon -controlled, host-based firewall infrastructure will not permit an instance to send traffic with a source IP or MAC address other than its own. * Port Scanning: Port scans by Amazon EC2 customers are a violation of the Amazon EC2 Acceptable Use Policy (AUP). Violations of the AUP are taken seriously, and every reported violation is investigated. When Port scanning is detected it is stopped and blocked. Port scans of Amazon EC2 instances are generally ineffective because, by default, all inbound ports on Amazon EC2 instances are closed. The customer’s strict management of security groups can further mitigate the threat of port scans. If the customer configures the security group to allow traffic from any source to a specific port, then that specific port will be vulnerable to a port scan. In these cases, the customer must use appropriate security measures to protect listening services that may be essential to their application from being discovered by an unauthorized port scan. For example, a web server must clearly have port 80 (HTTP) open to the world, and the administrator of this server is responsible for ensuring the security of the HTTP server software, such as Apache. * Packet sniffing by other tenants: It is not possible for a virtual instance running in promiscuous mode to receive or “sniff” traffic that is intended for a different virtual instance. While customers can place their interfaces into promiscuous mode, the hypervisor will not deliver any traffic to them that is not addressed to them. This includes two virtual instances that are owned by the same customer, even if they are located on the same physical host. Attacks such as ARP cache poisoning do not work within EC2. While Amazon EC2 does provide ample protection against one customer inadvertently or maliciously attempting to view another’s data, as a standard practice customers should encrypt sensitive traffic.
  3. If you want to see more…. … whether you’re a channel partner who wants to appreciate how this can provide you incremental business, … or you are a customer who wants to understand how you can protect your enterprise’s critical assets for less than the cost of 2 hours of your admin staff’s time each month, … ..we’re in Booth 201 and we’re giving a talk today at 1:30pm. Notes - HA For SugarCRM Costs: $10/seat/mth x 25 users = $250/mth Notes - IT Costs in Hours: Avg salary: $102K High-end: $162K (someone who understands business continuity) Fully loaded $162K (1.5x)=$243K=$117/hr $250 = 2 hours of admin time. http://www.cbsalary.com/salary_chart.aspx?edu=&sid=CA&cty=palo%2balto&jn=&tid=249423&kw=Information%2bTechnology&specialty=Information%2bTechnology%2bAdministrator%2b%28IT%2bAdministrator%29&ns=1