Awan heitech launching fujitsu [compatibility mode] (small)
-
Upload
william-ho- -
Category
Technology
-
view
95 -
download
3
Transcript of Awan heitech launching fujitsu [compatibility mode] (small)
������������A�BCDEF�BD��E�������CA�FD��D�A� �FA���������B�CCA��A���D���DE��BCDEF��DE��A���
����E�A��� !
William Ho (Regional Senior Consultant)
Fujitsu (Malaysia) Sdn.Bhd.BCCE, BCCLA, CBCP, CCSKV2.1, CCSKV3, CISA,
CISM, CRISC, CITPM, MBCI, ITIL,VCP, TOGAF
Exchange 2013
“Consumerisation of Cloud:From Cloudy to Clear Skies”
�������� AB�C�D�
Prepared for the Journey
"�A�F�
• Introduction
• On Boarding Cloud- Challenges
• On Boarding Cloud- Addressing the Challenges
3 Copyright 2013 FUJITSU LIMITED
����EF������A����A��
4 Copyright 2013 FUJITSU LIMITED
Service
NaaS
Private
#��$D��F����BCDEF�� B�CCA��A��
Deployment
Architecture
Deployment
Architecture
B�CCA��A��
• Selection of Suitable Deployment Models
• Protection of Data, Security and ConcernsSecuritySecurity
Clear
Objectives
Clear
Objectives• Understanding Your Cloud Aspiration
• Roles & Responsibilities PeoplePeople
6 Copyright 2013 FUJITSU LIMITED
� Understanding Your Cloud Aspiration
� Selecting Deployment Model
� Data Protection, Security and Concerns
� Understanding Roles and ResponsibilitiesService
NaaS
Private
#��$D��F����BCDEF�� B�CCA��A��
#%&A����A��D��'�%�������BCDEF(
����������
• )���������A�*A�����A���+���F�
�A�D������D��CA,���(
• -AFE������D�����F�������������
�D����D�D�A����D��FA���F(�
• "CCD.�����/��D���D��FA��A����C����
��F��A��D����A�A����D�FA���F��D��
�A����A�(
• B�A��A�����A����D��A���A��%C����
���D����D�(
8 Copyright 2013 FUJITSU LIMITED
-A�F���D��BCDEF(
9
Agility and Flexibility Control
BUSINESS Needs IT Needs
9 Copyright 2013 FUJITSU LIMITED
Service
NaaS
Private
� Understanding Your Cloud Aspiration
� Selecting Deployment Model
� Data Protection, Security and Concerns
� Understanding Roles and Responsibilities
BCDEF�0A�CD��A��
����������AB
',�CE���A�A����D��A��
D��FA���F�����%�C���A�
CD�EF�A������
#��FA���F��A�DE��A�1����C�%�C���
)��AF�A����D��A��
C����������
-A2E��A��������C�B�����C����A���A��
BCDEF��A�E��.�����#��3��F�����A��A�
BD���DC�D���A�E�������F��EF��
$��AF�D��%���������E�C�4���D�
5����AF�D��FA���F����C���
���CDA��BA�CD�EF�A������
',�CE���A1�%E��D��AF�%�������F������
5����AF�D��FA���F����C���
',�A����A������E%C����CDEF
BA��A������D����A���A�������A��CDEF
6D���%�C����D���D�CD����D�
���AD�F������B�A��CD�EF�A������
���D��������
6E%C���7�6�����A��CDEF
11 Copyright 2013 FUJITSU LIMITED
Service
NaaS
Private
� Understanding Your Cloud Aspiration
� Selecting Deployment Model
� Data Protection, Security and Concerns
� Understanding Roles and Responsibilities
8A�A����9��0���
���������
��B�D���DA���F�F
���A���B�A�B
����A�����A��B�
C���� �B�����!�����"����AD
�F�#CD�����ADEADB
���A��ADEADB
$�B��ABB�!%%��F�����
��B�A�B�
&�!C��CA�%�A�������DF�A�
���F��F�B��'�����BA���()��
A����#A$�*��A�+,
!%%��F������ADEAD
��D���DA���F�F
�F�F�FBA���B�A�B
&�-.���DF�A���$/��
'���D�����)��-.,
�F�F�FBA��ADEAD
�A�D����"�
���AD���B�A�B
&�EA�����0B���DD�D���0B
�F�A����D�%�����1A�B��
"����AD�BADA�B,
�A�D������B�A�B
�F�F��������F����B
�0+� �'C���B�A�B
�2C#�D�%�����ADEAD
��F����ADEADB
���DF0A�"�$F1�%�
��B�A�B
�0+��!3#3!�
$F1�%���B�A�B
������������A�B�CC�D�A��CEDF����AB��A�F�A��D��E��ED���AE��A������������������A��AB��E���E����D����������������D�������
13 Copyright 2013 FUJITSU LIMITED
B�CCA��A��
• 8���F����.�CC�%A���D�AF
• 8D�.�CC�%A����A������
• 8A�A�.�CC����%A���D�AF
• 8����D���DC����A�����C��A
• 8D�����A��D���%CA��D���A�E����
• "�A��A�A����F���������C�F���D��
• 6�D�A����D���A�D�����F���
• 0����)A�E�����)A��A����D�
DataDataDataDataCreationCreationCreationCreationDataDataDataDataSecuritySecuritySecuritySecurityLifecycleLifecycleLifecycleLifecycleForForForForCloud ComputingCloud ComputingCloud ComputingCloud ComputingDataStorage
DataDataDataDataUsageUsageUsageUsageDataDataDataDataSharingSharingSharingSharingDataDataDataDataArchiveArchiveArchiveArchiveDataDataDataDataDisposalDisposalDisposalDisposal
14 Copyright 2013 FUJITSU LIMITED
Logical Platform ADivision A
)A��A����D��:���DC���D��
• The Access Control Feature controls the access between tenants and platforms
• Address Translation Function can hide secure server information
• The Anomaly IPS feature protects each platform from flooding-attacks
Physical ServerPhysical Server
・
・
・
FUJITSU Server PRIMERGY
Deploy
FUJITSU Server PRIMERGY
Service user of division B
Logical Platform
Division B
Internet
Improved network security for customers, projects & divisions
Logical Platform B
NS Appliance(*)NS Appliance(*)
FUJITSU Server PRIMERGY
Physical ServerPhysical Server
・
・
・
NS Appliance(*)NS Appliance(*)
15
15 Copyright 2013 FUJITSU LIMITED
0����6�D�A���D�� '�������D�
� Encrypts drive data in ETERNUS DX
� Able to select Fujitsu’s unique encryption scheme or 128-bitAES encryption
Encrypt confidential information in drives
EncryptionEncryption is specified
on a LUN basis
Encryption
Unencrypted data
Encryption
Encryption
Encryption Encryption
Encryption Encryption
Encryption
Encryption
Encryption
Encryption
Encryption
Encryption setting and management
Prevents information leakage
Server A Server B Server C
Fujitsu’s unique encryption scheme- Less performance degradation than 128bit AES- Closed unique technology ensures the safety
Encryption
AES (Advanced Encryption Standard) is an encryption standard of the Federal Information Processing Standards
Data removal
protection
ETERNUS DX400 S2 series
16 Copyright 2013 FUJITSU LIMITED
Service
NaaS
Private
� Understanding Your Cloud Aspiration
� Selecting Deployment Model
� Data Protection, Concerns and Challenges
� Understanding Roles and Responsibilities
18
-DCA����F�-A��D���%�C���A�
Source: Cloud Security Alliance
18 Copyright 2013 FUJITSU LIMITED
BEC�E��C���F�-DCA��"F&E���A���
19 Copyright 2011 FUJITSU LIMITED
Capacity Management
• Workload placement
planning
• Service continuity mgmt
Service Developers:
• APIs, connectors,
Java
• Integration
Sourcing Management
• Multi-supplier mgmt
• Service governance
• Financial controls
• Comparative analysis
Security professionals
• Information Security
Mgmt
• Sourcing security
Service Managers
• Service portfolio mgmt
• Service governance
• Financial Costing /
cost recovery model
• Service brokerage
Business Relationship Mgmt
• Business Analyst
• Demand management
• Benefit realization
• Cloud Alliance Manager
Cloud Federation &
Aggregation
• Technologist &
cloud federation
architect
Enterprise Architecture Team
• Cloud Computing Architect
• Virtualization SME
Governance & Compliance
• Risk Management
• COBIT, Controls, policies,
processes, procedures
• Internal Audit
• Cloud Risk and
Compliance
� On Boarding the Cloud- Addressing the Challenges
B�CCA��A��
Clear
Objectives
Clear
Objectives• Understanding Your Cloud Aspiration
Clarify business, culture, economic objectives, priorities, and desired outcomes
Biz-IT data gathering and analysis
Identify critical interdependency, processes, applications, etc
Assess the infrastructure readiness for Cloud
Cloud -Role and Responsibilities
Clarify expectation for cloud resources.
Data Management Analysis and identification
Note : Please check with Fujitsu regarding related services
21 Copyright 2013 FUJITSU LIMITED
Deployment
Architecture
Deployment
Architecture
B�CCA��A�
• Selection of Suitable Deployment Models
Traditional(On-Premise)
Traditional(On-Premise)
Storage
Server HW
Networking
vServers
Databases
Virtualization
Runtimes
Applications
Security & Integration
Use
r M
an
age
d
(Infrastructure(as a Service))
(Infrastructure(as a Service))
Storage
Server HW
Networking
vServers
Databases
Virtualization
Runtimes
Applications
Security & IntegrationUse
rs
(Platform(as a Service))
(Platform(as a Service))
Storage
Server HW
Networking
vServers
Databases
Virtualization
Runtimes
Applications
Security & Integration
Pu
blic
/Priv
ate
Use
rs
Software(as a Service)
Software(as a Service)
Storage
Server HW
Networking
vServers
Databases
Virtualization
Runtimes
Applications
Security & Integration
Hardware/Service
abstracted
Dynamic capacity
and pricing
Seamless scaling
up or down
Systems re-
purposing
Hardware/Service
abstracted
Dynamic capacity
and pricing
Seamless scaling
up or down
Systems re-
purposing
Hardware/Service
abstracted
Dynamic capacity
and pricing
Seamless scaling
up or down
Systems re-
purposing
Hardware/Service
abstracted
Dynamic capacity
and pricing
Seamless scaling
up or down
Systems re-
purposing
Hardware,
software &
Service
abstracted
Dynamic capacity
and pricing
Seamless scaling
up or down
Systems re-
purposing
Hardware,
software &
Service
abstracted
Dynamic capacity
and pricing
Seamless scaling
up or down
Systems re-
purposingIn
fras
truc
tur
e
Note : Please check with Fujitsu regarding related services
22 Copyright 2013 FUJITSU LIMITED
B�CCA��A��
• Protection of Data, Security and ConcernsSecuritySecurity
Note : Please check with Fujitsu regarding related services Source : Cloud Security Alliance
23 Copyright 2013 FUJITSU LIMITED
B�CCA��A��
• Roles & ResponsibilitiesPeoplePeople
Note : Please check with Fujitsu regarding related services
24 Copyright 2013 FUJITSU LIMITED
)������/D�D��D.�8����DE
25
EducationExpansion/Bridging
���A���D�6�D�����A
Implementation;A���%�C������EF�
"����A��E�A0A����
Cloud Initiation and on boarding
Cloud – Technical Convincement
Cloud –Technical Adoption
Cloud Expansion/Extension
Scenarios
Scenarios
Scenarios
Scenarios –– ––
Serv
ice
Serv
ice
Serv
ice
Serv
ice
Mappin
gs
Mappin
gs
Mappin
gs
Mappin
gs
Customization
Cate
r for y
our e
very
scenario
s
Cate
r for y
our e
very
scenario
s
Cate
r for y
our e
very
scenario
s
Cate
r for y
our e
very
scenario
s
Note : Please check with Fujitsu regarding related services
25 Copyright 2013 FUJITSU LIMITED
Thank You