Virtualization. Q&A with an industry leader. Virtualization is rapidly becoming a fact of life for agency executives,

Size: px
Start display at page:

Download "Virtualization. Q&A with an industry leader. Virtualization is rapidly becoming a fact of life for agency executives,"

Transcription

1 Virtualization Q&A with an industry leader Virtualization is rapidly becoming a fact of life for agency executives, as the basis for data center consolidation and cloud computing and, increasingly, as the underpinning of a much broader set of IT cost savings and efficiencies. But there s still confusion over such things Doug Bourgeois Vice President and Federal Chief Cloud Executive, VMware as security in virtualized environments, and what s needed to integrate the different layers of virtualization. THE STAND: Virtualization looks at these issues from the perspective of a long-time player in the federal IT arena, who gives his views on the pros and cons of virtualization and how agencies can wring the most from their virtualization strategies.

2 Doug Bourgeois Vice President and Federal Chief Cloud Executive 1) How aware are government organizations of both the advantages and potential difficulties of virtualization? The advantages of virtualization are becoming very widely understood. The first is obviously the efficiency gain from doing a conversion of a physical environment to a virtual environment. Those gains are well documented across a very large universe of those types of projects. You consistently see 60% capital expenditure reductions, 30% operating expense reductions, and even up to 80% energy utilization reductions. Reducing costs and improving efficiencies are obviously major goals of government right now, and that s a big reason why virtualization is playing such a significant role in current initiatives. You also often see service level enhancements and improvements in application performance. The potential difficulties, I think, are also becoming widely known. They re associated with the challenges of the continued evolution of technology in an organization and the skill sets that requires, what changes that makes in people s roles and so on. Those sorts of things are always going to be somewhat challenging for an organization. But it s a familiar part of the overall technology evolution cycle that IT organizations have been going through for the past 30 years. 2) The word is seemingly applied everywhere these days: there s server, desktop, network, storage, application virtualization, and perhaps more on the way. Are these all variations of the same thing, or are they different from each other in some way? They re definitely different, but there s also a lot of similarities. Ultimately we re talking about virtualization at different layers in the stack. They re all taking advantage of the same characteristics, but at different rates because of the nature of the technologies involved. The important thing is to integrate all of those layers of virtualization with the management layer. It s really important to have that in order to handle the technology characteristics that are most appropriate for virtualization of each of those layers in the stack. Once you virtualize any particular technology it creates certain characteristics. It makes that technology more mobile, for example, and if you take advantage of additional management capabilities like policy driven frameworks for establishing and delivering on service level capabilities, you ll want to do that at a level of abstraction that combines all these things. The management layer gives you the ability to manage that environment, and creates a more automated and efficient way of doing what IT struggles to do today, which is deliver on service level capabilities. 3) Virtualization automatically creates efficiencies and lowers IT costs. True? What else is needed for organizations to benefit? Those efficiency gains and reduced costs are absolutely true. As well as capital, operating expenses and energy cost reductions the physical to virtual consolidation ratios now are easily on average 10:1, sometimes up to 20:1 and I ve heard of cases even higher. That s significant, and of course it s also going to produce cost reductions. There s just no way around that. What else is needed for organizations to benefit? Physical to virtual consolidation has been going on for a decade or more in industry, and the process has become a science. The capabilities of the management layer and management environment to support virtualization have grown substantially over the last several years, now to the point of abstraction. And bringing in the cloud layer in the management stack is another capability that s been added in the last year or two.

3 4) How does mobile technology, both the devices and the applications used on them, fit in the virtualized environment? Increasingly well. Virtualization has now reached endpoint devices as well as the datacenter environment, and all of that is being integrated with the virtual desktop. This concept of mobile computing, of any device and any time access to any application I need to do my job is becoming a reality based on the virtualization advances in this particular layer. It becomes a little more challenging with stitching it all together, in terms of how do you bring in the federated access control mechanisms for IT to be able to provide end users with multiple application access through multiple devices. This is the part where things are still evolving. But it won t be long before this capability becomes mainstream as well. 5) What about security in the virtualized environment? Is it that much different from other IT security? Does virtualization have inherent advantages with security? What do organizations need to be aware of? From a security architecture perspective, I don t think there s that much different. It s about a very holistic approach to a defense-in-depth architecture and overall framework. As to advantages, I think many people would argue that virtualization has inherent advantages compared to a physical environment. Because the virtualized environment is so dynamic it makes it a lot harder to target certain components, compared to the more static physical. What do organizations need to be aware of? That virtual infrastructure has become more mature and robust to the point where, in VMware s case, our core virtual product and virtual management product both have gone through the Common Criteria security certificate process. That s a good indicator of the security built into the product set. In addition to that, there s a new set of virtualization security technologies which you can think of it as virtual defense in depth security. We call it vshield, where there is the virtual equivalent of old school physical inline security devices like edge firewalls, for example, built into the virtualization technologies so that the profiles associated with the firewall can be established once and reused many times. 6) Are there any situations in which virtualization should definitely not be considered? I m sure there are, but at this point it seems to be more the case that conventional wisdom would have said you shouldn t be virtualizing things such as databases, Tier 1 apps & desktops, and all that s happening now. So, even if there s something not quite ready to be virtualized, give it another year or two. 7) What are the unique abilities that your company brings to this space? There s many, but it comes down to virtualization as the underlying enabling foundation technology for cloud computing. VMware created the virtualization market in the X86 environment, which is dominating in terms of server virtualization today. And then we uniquely address all three layers of the cloud stack that sits on top of this underlying foundation. From there, adding virtual desktops and then expanding outwards to provide multiple device and application access with integrated security, so organizations can create a mobile work environment for end users. VMware has advanced technology in the market now in each of these layers of the cloud stack to enable all three layers to exist and have virtualization and management built into each of the layers, but also then using policies and a policy-driven framework to communicate between the layers.

4 8) Are there any hidden costs to virtualization? There s a couple of things that are quite evident if you look at the general cost structure of this kind of initiative and where the return on investment comes from. There s no question the ROI in a virtualization project is very high with physical consolidation ratios between 10:1 and 20:1. However, what you see is that, though there s a significant ROI, there s a change in the cost structure of the organization away from server resources, say, and towards more storage resources. But that doesn t mean there s an increase in overall costs it s just that, element by element, there might be a change in the cost profile. But there s still a very high overall ROI associated with that virtualization. 9) Can traditional IT skills deal with virtualization? Is there a need for virtualization specialists? That s a good question, and it s one that s come up numerous times in organizations. Ultimately, the best way to solve the problem is really dependent on the characteristics of the culture of the organization, but there are multiple options to deal with this particular challenge. It generally will evolve over time to where the traditional roles of the network or IT administrator are collapsed into the virtual administrator role. That could be a tough thing for people to go through, but it s part of the evolution of the skill sets of the IT staff. So I definitely see virtualization as part of the overall IT skill set. There are cases where that might not be the case. Some programs in the government are very heavily software development oriented, for example, and those projects tend to be funded outside the IT organization. In those particular cases there would be a need for specific virtualization expertise to be associated with those programs. Generally speaking, however, virtualization would be included as part of the IT skill set. 10) One obvious danger to virtualization in the data center is VM sprawl. Does that apply for all kinds of virtualized environments? How can users guard against this? As long as you have the ability to go out and create a virtual machine the person authorized to do that can potentially create more than is needed, but there are places where this can be prevented. At the governance layer, for example, which deals with management processes and authorizations around who can create virtual machines and how many they can create and where the funding comes from and where the control points are on on that. Another is control layer, where authorizations and policies are established in terms of who has authorization to do what, and what level of authority you want to give them. There you can decide what degree of control you want to give people to go out and create virtual machines. And then there s the optimization layer. In theory, if you ve got VM sprawl, you ve got a lot of virtual machines that are underutilized or are idle. VMware certainly has the software that will go and evaluate your environment virtual machine by virtual machine, and will recognize where VMs are not taking advantage of the resources that are available to them. Then you can go optimize the virtual machines, shut those that are idle and so on. Kind of re-optimize the environment. 11) How does virtualization apply to organizations, as in some government agencies, where there is a heavy reliance on legacy systems and custom applications? Virtualization is the foundational element of different end points that government agencies are interested in and need to utilize. Cloud computing is an obvious one, and virtualization is a key enabler, if not the key enabler, of cloud computing. It s also the key to virtual desktop environments, and of data center consolidation strategies. The important thing to recognize is that, regardless of what the major initiative government is trying to pursue, virtualization is going to have a significant enabling role in making that happen. The preservation of legacy investments is one of the aims of virtualization and cloud computing. When you look at the desktop for example, even down to the specific end point, when you virtualize your desktops you don t necessarily throw out your existing PCs or laptops. They can be repurposed.

5 12) Will growing concerns about cyber security and cyber warfare impact virtualization? I m not sure what the distinction is between cyber security and cyber warfare, but security concerns come up all the time. There s no question there s tradeoffs in the security architecture taking full advantage of a virtualized environment. I regularly see architectural tradeoffs that are made in order to meet certain higher level security requirements about air gapping between certain networks and things like that. I think that, for a time, this will be a maturity question of the underlying technology. Over time, the comfort level will continue to grow to the point where the verifications and certifications in the abstraction layer, in this case, will be sufficient to prohibit any traffic or any hopping between the different security levels. 13) What are the emerging technologies or applications that could affect virtualization, both positively or negatively, in the future? The thing that is really interesting is we don t yet know the impact that mobile computing and mobile technology is going to have on the workforce, in particular the government workforce. The concept of group sourcing, for example. You now have things like distributed software development expertise using cloud-like environments, to come up with smaller and smaller application mashups and do so in a way that is still controlled, but so much more efficient than the way it is done today. This is something that could completely transform the software develoment industry in general. And that s going to enable the kind of technology that VMware is bringing to the table today. Who knows how that s going to change things. And then there s the whole idea of social media and social technology and how that s going to be brought into the equation. Is it going to change virtualization? No, but it s going to be another capability that s will disrupt the way technology is utilized, and organizations are going to need to take advantage of how that evolves to continue to be successful going forward. 14) What can government learn from how the private sector is handling virtualization? This is an interesting one to me, because I have seen the government trying to transition from a slow adoption model of advanced technologies, to one where they are jumping more in the drivers seat, particularly around the utilization of cloud capabilities. I think the government can learn from the private sector in the risk-based models they use. The one they use now is not necessarily slowing progress in terms of taking advantage of the virtualized environment and building cloud on top, but it s building in a phased risk based approach for execution. It could learn some creative ways of handling the shifts in capital expenditures, say, to the operating expense side of the budget and how to manage the cost structures more efficiently. I think these are the areas where the government is moving slower than it needs to, in order to enable the full capabilities of virtualization to be realized. Not so much on the technology side. Also, there are efforts afoot to modernize the government s security framework. I think it s heading in the right direction, but government is a very big ship and it takes a lot of effort to turn it. So it s taking some time in order for government to fully utilize and take advantage of the benefits of virtualization and the things it enables, such as cloud computing. 15) Where do you see your company five years from now in the government virtualization market? I think there are plenty of applications, software and infrastructure that will continue to be virtualized in federal government. I think we re going to see a real proliferation of the virtual desktop. We re just on the cusp of that now, but over the next five years we ll see a significant increase in the utilization of the virtual desktop. And then there s just expansion of the cloud layer in general, and the automation and service level enhancements that will bring. VMWare s presence will grow substantially over the next five years because of this.

Networking for a smarter data center: Getting it right

Networking for a smarter data center: Getting it right IBM Global Technology Services October 2011 Networking for a smarter data center: Getting it right Planning the network needed for a dynamic infrastructure 2 Networking for a smarter data center: Getting

More information

BUSTED! 5 COMMON MYTHS OF MODERN INFRASTRUCTURE. These Common Misconceptions Could Be Holding You Back

BUSTED! 5 COMMON MYTHS OF MODERN INFRASTRUCTURE. These Common Misconceptions Could Be Holding You Back BUSTED! 5 COMMON MYTHS OF MODERN INFRASTRUCTURE These Common Misconceptions Could Be Holding You Back 2 IT Is Facing a New Set of Challenges As technology continues to evolve, IT must adjust to changing

More information

HOW IT INVESTMENT STRATEGIES HELP AND HINDER GOVERNMENT S ADOPTION OF CLOUD & AI

HOW IT INVESTMENT STRATEGIES HELP AND HINDER GOVERNMENT S ADOPTION OF CLOUD & AI HOW IT INVESTMENT STRATEGIES HELP AND HINDER GOVERNMENT S ADOPTION OF CLOUD & AI Federal agencies have made significant strides in adopting cloud technologies. But a new survey of government IT leaders

More information

Accelerate Your Enterprise Private Cloud Initiative

Accelerate Your Enterprise Private Cloud Initiative Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service

More information

Government IT Modernization and the Adoption of Hybrid Cloud

Government IT Modernization and the Adoption of Hybrid Cloud Government IT Modernization and the Adoption of Hybrid Cloud An IDC InfoBrief, Sponsored by VMware June 2018 Federal and National Governments Are at an Inflection Point Federal and national governments

More information

Availability and the Always-on Enterprise: Why Backup is Dead

Availability and the Always-on Enterprise: Why Backup is Dead Availability and the Always-on Enterprise: Why Backup is Dead Backups certainly fit the bill at one time, but data center needs have evolved and expanded. By Nick Cavalancia Every business has experienced

More information

Understanding Managed Services

Understanding Managed Services Understanding Managed Services The buzzword relating to IT Support is Managed Services, and every day more and more businesses are jumping on the bandwagon. But what does managed services actually mean

More information

HyTrust government cloud adoption survey

HyTrust government cloud adoption survey HyTrust government cloud adoption survey Security a top concern with hesitancy to relinquish control of data White Paper HyTrust government cloud adoption survey Security a top concern with hesitancy to

More information

FOCUS ON THE FACTS: SOFTWARE-DEFINED STORAGE

FOCUS ON THE FACTS: SOFTWARE-DEFINED STORAGE FOCUS ON THE FACTS: SOFTWARE-DEFINED STORAGE Table of Contents CHAPTER 1: UNRAVELING THE SDS HYPE CHAPTER 2: CRITICAL ATTRIBUTES OF SDS CHAPTER 3: THE FUTURE IS NOW CHAPTER 4: CUTTING THE HARDWARE CORD

More information

Key questions to ask before commissioning any web designer to build your website.

Key questions to ask before commissioning any web designer to build your website. Key questions to ask before commissioning any web designer to build your website. KEY QUESTIONS TO ASK Before commissioning a web designer to build your website. As both an entrepreneur and business owner,

More information

BUILDING the VIRtUAL enterprise

BUILDING the VIRtUAL enterprise BUILDING the VIRTUAL ENTERPRISE A Red Hat WHITEPAPER www.redhat.com As an IT shop or business owner, your ability to meet the fluctuating needs of your business while balancing changing priorities, schedules,

More information

Crash Course in Modernization. A whitepaper from mrc

Crash Course in Modernization. A whitepaper from mrc Crash Course in Modernization A whitepaper from mrc Introduction Modernization is a confusing subject for one main reason: It isn t the same across the board. Different vendors sell different forms of

More information

GET CLOUD EMPOWERED. SEE HOW THE CLOUD CAN TRANSFORM YOUR BUSINESS.

GET CLOUD EMPOWERED. SEE HOW THE CLOUD CAN TRANSFORM YOUR BUSINESS. GET CLOUD EMPOWERED. SEE HOW THE CLOUD CAN TRANSFORM YOUR BUSINESS. Cloud computing is as much a paradigm shift in data center and IT management as it is a culmination of IT s capacity to drive business

More information

Networking for a dynamic infrastructure: getting it right.

Networking for a dynamic infrastructure: getting it right. IBM Global Technology Services Networking for a dynamic infrastructure: getting it right. A guide for realizing the full potential of virtualization June 2009 Executive summary June 2009 Networking for

More information

Enterprise Architectures The Pace Accelerates Camberley Bates Managing Partner & Analyst

Enterprise Architectures The Pace Accelerates Camberley Bates Managing Partner & Analyst Enterprise Architectures The Pace Accelerates Camberley Bates Managing Partner & Analyst Change is constant in IT.But some changes alter forever the way we do things Inflections & Architectures Solid State

More information

Fundamental Shift: A LOOK INSIDE THE RISING ROLE OF IT IN PHYSICAL ACCESS CONTROL

Fundamental Shift: A LOOK INSIDE THE RISING ROLE OF IT IN PHYSICAL ACCESS CONTROL Fundamental Shift: A LOOK INSIDE THE RISING ROLE OF IT IN PHYSICAL ACCESS CONTROL Shifting budgets and responsibilities require IT and physical security teams to consider fundamental change in day-to-day

More information

Digital Workflow 10 Tech Rules to Guide You

Digital Workflow 10 Tech Rules to Guide You Last updated: 10/11/10 Digital Workflow 10 Tech Rules to Guide You Introduction Whether your goal is to become paperless, or just to get more out of the technology you use, you need to (1) find the easy

More information

BUYING SERVER HARDWARE FOR A SCALABLE VIRTUAL INFRASTRUCTURE

BUYING SERVER HARDWARE FOR A SCALABLE VIRTUAL INFRASTRUCTURE E-Guide BUYING SERVER HARDWARE FOR A SCALABLE VIRTUAL INFRASTRUCTURE SearchServer Virtualization P art 1 of this series explores how trends in buying server hardware have been influenced by the scale-up

More information

ALIGNING CYBERSECURITY AND MISSION PLANNING WITH ADVANCED ANALYTICS AND HUMAN INSIGHT

ALIGNING CYBERSECURITY AND MISSION PLANNING WITH ADVANCED ANALYTICS AND HUMAN INSIGHT THOUGHT PIECE ALIGNING CYBERSECURITY AND MISSION PLANNING WITH ADVANCED ANALYTICS AND HUMAN INSIGHT Brad Stone Vice President Stone_Brad@bah.com Brian Hogbin Distinguished Technologist Hogbin_Brian@bah.com

More information

CYBER SECURITY FOR BUSINESS COUNTING THE COSTS, FINDING THE VALUE

CYBER SECURITY FOR BUSINESS COUNTING THE COSTS, FINDING THE VALUE CYBER SECURITY FOR BUSINESS COUNTING THE COSTS, FINDING THE VALUE Business has always looked to squeeze the maximum possible benefit out of IT resources at the lowest possible cost but measuring return

More information

Thin Desktop - The business case for using a PC or Thin Client as the user access device in a virtualization deployment

Thin Desktop - The business case for using a PC or Thin Client as the user access device in a virtualization deployment Thin Desktop - The business case for using a PC or Thin Client as the user access device in a virtualization deployment Mike Cardinal General Manager ThinLaunch Software, LLC January, 2009 Contents Executive

More information

E-Guide CLOUD COMPUTING VS. VIRTUALIZATION

E-Guide CLOUD COMPUTING VS. VIRTUALIZATION E-Guide CLOUD COMPUTING VS. VIRTUALIZATION A lthough cloud computing uses virtualization, virtualization is simply one element that makes cloud computing. In this e- guide, brought to you by SearchServerVirtualization.com,

More information

The Top Five Reasons to Deploy Software-Defined Networks and Network Functions Virtualization

The Top Five Reasons to Deploy Software-Defined Networks and Network Functions Virtualization The Top Five Reasons to Deploy Software-Defined Networks and Network Functions Virtualization May 2014 Prepared by: Zeus Kerravala The Top Five Reasons to Deploy Software-Defined Networks and Network Functions

More information

Cloud Confidence: Simple Seamless Secure. Dell EMC Data Protection for VMware Cloud on AWS

Cloud Confidence: Simple Seamless Secure. Dell EMC Data Protection for VMware Cloud on AWS Cloud Confidence: Simple Seamless Secure Dell EMC Data Protection for VMware Cloud on AWS Introduction From the boardroom to the data center, digital transformation has become a business imperative. Whether

More information

Professional Services for Cloud Management Solutions

Professional Services for Cloud Management Solutions Professional Services for Cloud Management Solutions Accelerating Your Cloud Management Capabilities CEOs need people both internal staff and thirdparty providers who can help them think through their

More information

Cyber Security and Cyber Fraud

Cyber Security and Cyber Fraud Cyber Security and Cyber Fraud Remarks by Andrew Ross Director, Payments and Cyber Security Canadian Bankers Association for Senate Standing Committee on Banking, Trade, and Commerce October 26, 2017 Ottawa

More information

Cloud Computing: Making the Right Choice for Your Organization

Cloud Computing: Making the Right Choice for Your Organization Cloud Computing: Making the Right Choice for Your Organization A decade ago, cloud computing was on the leading edge. Now, 95 percent of businesses use cloud technology, and Gartner says that by 2020,

More information

Cisco APIC Enterprise Module Simplifies Network Operations

Cisco APIC Enterprise Module Simplifies Network Operations Cisco APIC Enterprise Module Simplifies Network Operations October 2015 Prepared by: Zeus Kerravala Cisco APIC Enterprise Module Simplifies Network Operations by Zeus Kerravala October 2015 º º º º º º

More information

Moving to a New Business Phone System

Moving to a New Business Phone System Moving to a New Business Phone System BroadSoft White Paper OneCloudNetworks is an authorized BroadSoft Service Provider 2015 BroadSoft. All Rights Reserved. Introduction Phone systems have been installed

More information

An introductory look. cloud computing in education

An introductory look. cloud computing in education An introductory look cloud computing in education An introductory look cloud computing in education Today, the question for education IT managers is not whether to adopt cloud computing, but when. With

More information

Paper. Delivering Strong Security in a Hyperconverged Data Center Environment

Paper. Delivering Strong Security in a Hyperconverged Data Center Environment Paper Delivering Strong Security in a Hyperconverged Data Center Environment Introduction A new trend is emerging in data center technology that could dramatically change the way enterprises manage and

More information

THALES DATA THREAT REPORT

THALES DATA THREAT REPORT 2018 THALES DATA THREAT REPORT Trends in Encryption and Data Security U.S. FEDERAL EDITION EXECUTIVE SUMMARY #2018DataThreat THE TOPLINE Federal agency data is under siege. Over half of all agency IT security

More information

Private Cloud Project Leads to Lower Server Footprint and US$595,000 Savings

Private Cloud Project Leads to Lower Server Footprint and US$595,000 Savings Microsoft SQL Server Customer Solution Case Study Private Cloud Project Leads to Lower Server Footprint and US$595,000 Savings Overview Customer: Website: http://www.capetown.gov.za Customer Size: 25,000+

More information

Keeping the lid on storage

Keeping the lid on storage Keeping the lid on storage Drive significant cost savings through innovation and efficiency Publication date: December 2011 Optimising storage performance & costs through innovation As the compute power

More information

Evolution For Enterprises In A Cloud World

Evolution For Enterprises In A Cloud World Evolution For Enterprises In A Cloud World Foreword Cloud is no longer an unseen, futuristic technology that proves unattainable for enterprises. Rather, it s become the norm; a necessity for realizing

More information

INDUSTRY PERSPECTIVE

INDUSTRY PERSPECTIVE INDUSTRY PERSPECTIVE 1 A Brief Introduction As IT administrators and chief information officers, you face a particular challenge: facilitate the ability for your agency to work remotely, while reducing

More information

5 Challenges to Government IT Modernization: In Brief. Quick tips & facts about IT modernization across federal, state and local governments

5 Challenges to Government IT Modernization: In Brief. Quick tips & facts about IT modernization across federal, state and local governments 5 Challenges to Government IT Modernization: In Brief Quick tips & facts about IT modernization across federal, state and local governments Executive Summary Information technology (IT) modernization can

More information

Healthcare IT Modernization and the Adoption of Hybrid Cloud

Healthcare IT Modernization and the Adoption of Hybrid Cloud Healthcare IT Modernization and the Adoption of Hybrid Cloud An IDC InfoBrief, Sponsored by VMware June 2018 Executive Summary The healthcare industry is facing unprecedented changes brought about by a

More information

Mapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective

Mapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective Mapping Your Requirements to the NIST Cybersecurity Framework Industry Perspective 1 Quest has the solutions and services to help your organization identify, protect, detect, respond and recover, better

More information

WHITEPAPER MOVING TO A NEW BUSINESS PHONE SYSTEM

WHITEPAPER MOVING TO A NEW BUSINESS PHONE SYSTEM WHITEPAPER MOVING TO A NEW BUSINESS PHONE SYSTEM Introduction Phone systems have been installed in offices of all different sizes for more than 40 years, providing a vital service to the business. Since

More information

Voice. The lost piece of the BYOD puzzle.

Voice. The lost piece of the BYOD puzzle. Voice. The lost piece of the BYOD puzzle. Contents What s wrong with BYOD? 3 The issue of intimacy 4 How voice got left out of the picture 5 Why voice will always be big for business 6 Introducing smartnumbers

More information

How to master hybrid IT. Get the speed and agility you want, with the visibility and control you need

How to master hybrid IT. Get the speed and agility you want, with the visibility and control you need How to master hybrid IT Get the speed and agility you want, with the visibility and control you need The process of moving from a dedicated hosted server to the cloud was seamless. Dimension Data s platform

More information

Building a Smart Segmentation Strategy

Building a Smart Segmentation Strategy Building a Smart Segmentation Strategy Using micro-segmentation to reduce your attack surface, harden your data center, and secure your cloud. WP201705 Overview Deployed at the network layer, segmentation

More information

The SD-WAN security guide

The SD-WAN security guide The SD-WAN security guide How a flexible, software-defined WAN can help protect your network, people and data SD-WAN security: Separating fact from fiction For many companies, the benefits of SD-WAN are

More information

Business Benefits of Policy Based Data De-Duplication Data Footprint Reduction with Quality of Service (QoS) for Data Protection

Business Benefits of Policy Based Data De-Duplication Data Footprint Reduction with Quality of Service (QoS) for Data Protection Data Footprint Reduction with Quality of Service (QoS) for Data Protection By Greg Schulz Founder and Senior Analyst, the StorageIO Group Author The Green and Virtual Data Center (Auerbach) October 28th,

More information

Remodel. New server deployment time is reduced from weeks to minutes

Remodel. New server deployment time is reduced from weeks to minutes SOLUTIONS CONSOLIDATION VIRTUALIZATION A Radical Remodel Emerson virtualizes on Dell servers, eliminating 3,600 servers, reducing approximately 135 data centers down to 4, and decreasing the operating

More information

BREAK THE CONVERGED MOLD

BREAK THE CONVERGED MOLD WHITE PAPER: BREAK THE CONVERGED MOLD HPE HYPER CONVERGED 380 Move at the Speed of Business Today s companies often have IT environments that face significant, similar challenges, including: Keeping up

More information

NINE MYTHS ABOUT. DDo S PROTECTION

NINE MYTHS ABOUT. DDo S PROTECTION NINE S ABOUT DDo S PROTECTION NINE S ABOUT DDOS PROTECTION The trajectory of DDoS attacks is clear: yearly increases in total DDoS attacks, an ever-growing number of attack vectors, and billions of potentially

More information

Digital Marketing Manager, Marketing Manager, Agency Owner. Bachelors in Marketing, Advertising, Communications, or equivalent experience

Digital Marketing Manager, Marketing Manager, Agency Owner. Bachelors in Marketing, Advertising, Communications, or equivalent experience Persona name Amanda Industry, geographic or other segments B2B Roles Digital Marketing Manager, Marketing Manager, Agency Owner Reports to VP Marketing or Agency Owner Education Bachelors in Marketing,

More information

SD-WAN. The CIO s guide to. Why it s time for a new kind of network

SD-WAN. The CIO s guide to. Why it s time for a new kind of network The CIO s guide to SD-WAN Why it s time for a new kind of network More applications, more complexity, more problems, more opportunities. We re doing business in a bold new world. Technology, data and digitalization

More information

Accelerating the Business Value of Virtualization

Accelerating the Business Value of Virtualization Accelerating the Business Value of Virtualization Maximizing virtualization is one of the important steps in the journey towards delivering dynamic, cloud-based services. By leveraging the partnership

More information

SUCCESS STORY THE POLYCLINIC THE POLYCLINIC SPEEDS UP ITS VDI ENVIRONMENT WITH NVIDIA GRID

SUCCESS STORY THE POLYCLINIC THE POLYCLINIC SPEEDS UP ITS VDI ENVIRONMENT WITH NVIDIA GRID THE POLYCLINIC SPEEDS UP ITS VDI ENVIRONMENT WITH NVIDIA GRID Updated VDI with NVIDIA GRID wins over staff and increases user density across the organization. was founded in 1917 by a handful of doctors.

More information

Multi-threading technology and the challenges of meeting performance and power consumption demands for mobile applications

Multi-threading technology and the challenges of meeting performance and power consumption demands for mobile applications Multi-threading technology and the challenges of meeting performance and power consumption demands for mobile applications September 2013 Navigating between ever-higher performance targets and strict limits

More information

Operating the Cloud to Deliver Business Value. Dr Liam Keating IT Director, Intel APAC

Operating the Cloud to Deliver Business Value. Dr Liam Keating IT Director, Intel APAC Operating the Cloud to Deliver Business Value Dr Liam Keating IT Director, Intel APAC Benefits of Cloud Fact or Fiction? For a few years now, everything we ve heard about cloud has mostly been hype. It

More information

The New Enterprise Network In The Era Of The Cloud. Rohit Mehra Director, Enterprise Communications Infrastructure IDC

The New Enterprise Network In The Era Of The Cloud. Rohit Mehra Director, Enterprise Communications Infrastructure IDC The New Enterprise Network In The Era Of The Cloud Rohit Mehra Director, Enterprise Communications Infrastructure IDC Agenda 1. Dynamics of the Cloud Era 2. Market Landscape 3. Implications for the new

More information

Azure Pack is one of Microsoft s most underrated tools.

Azure Pack is one of Microsoft s most underrated tools. content provided by sponsored by Making the Most of Azure Pack This free tool can bring an Azure-like environment to a private cloud. Find out what Azure Pack is and why it s useful. BY BRIEN M. POSEY

More information

Your Data Demands More NETAPP ENABLES YOU TO LEVERAGE YOUR DATA & COMPUTE FROM ANYWHERE

Your Data Demands More NETAPP ENABLES YOU TO LEVERAGE YOUR DATA & COMPUTE FROM ANYWHERE Your Data Demands More NETAPP ENABLES YOU TO LEVERAGE YOUR DATA & COMPUTE FROM ANYWHERE IN ITS EARLY DAYS, NetApp s (www.netapp.com) primary goal was to build a market for network-attached storage and

More information

Hello, and welcome to a searchsecurity.com. podcast: How Security is Well Suited for Agile Development.

Hello, and welcome to a searchsecurity.com. podcast: How Security is Well Suited for Agile Development. [ MUSIC ] Hello, and welcome to a searchsecurity.com podcast: How Security is Well Suited for Agile Development. My name is Kyle Leroy, and I'll be moderating this podcast. I'd like to start by introducing

More information

Perfect Balance of Public and Private Cloud

Perfect Balance of Public and Private Cloud Perfect Balance of Public and Private Cloud Delivered by Fujitsu Introducing A unique and flexible range of services, designed to make moving to the public cloud fast and easier for your business. These

More information

Your Network Virtualization Career Path. Navigate the future of networking with confidence

Your Network Virtualization Career Path. Navigate the future of networking with confidence Your Network Virtualization Career Path Navigate the future of networking with confidence INTRODUCTION 2 New skills for a new era Networking is on the cusp of a major change. The hardware-centric networks

More information

Converged Infrastructure Matures And Proves Its Value

Converged Infrastructure Matures And Proves Its Value A Custom Technology Adoption Profile Commissioned By Hewlett-Packard May 2013 Introduction Converged infrastructure (CI) solutions have been widely adopted by a range of enterprises, and they offer significant

More information

Where Should the Brain of Your Mobile Application Live?

Where Should the Brain of Your Mobile Application Live? Where Should the Brain of Your Mobile Application Live? Or, how Gilt architected its ios apps so compiled binaries released years ago can keep up with evolving server data models First, an introduction

More information

Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017

Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017 Cyber Concerns of Local Government and What Does It Mean to Transportation Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017 Transportation and Infrastructure

More information

Using the Network to Optimize a Virtualized Data Center

Using the Network to Optimize a Virtualized Data Center Using the Network to Optimize a Virtualized Data Center Contents Section I: Introduction The Rise of Virtual Computing. 1 Section II: The Role of the Network. 3 Section III: Network Requirements of the

More information

whitepaper How to Measure, Report On, and Actually Reduce Vulnerability Risk

whitepaper How to Measure, Report On, and Actually Reduce Vulnerability Risk whitepaper How to Measure, Report On, and Actually Reduce Vulnerability Risk Assure the board your company won t be the next data breach Introduction A solid vulnerability management program is critical

More information

Bad Idea: Creating a U.S. Department of Cybersecurity

Bad Idea: Creating a U.S. Department of Cybersecurity December 2018 Bad Idea: Creating a U.S. Department of Cybersecurity Suzanne Spaulding and Mieke Eoyang A lack of cybersecurity can have serious consequences the theft of money or data, an interruption

More information

Security-as-a-Service: The Future of Security Management

Security-as-a-Service: The Future of Security Management Security-as-a-Service: The Future of Security Management EVERY SINGLE ATTACK THAT AN ORGANISATION EXPERIENCES IS EITHER ON AN ENDPOINT OR HEADING THERE 65% of CEOs say their risk management approach is

More information

Ethernet Networking The evolution of your building

Ethernet Networking The evolution of your building Ethernet Networking The evolution of your building Every corner of your building needs a voice to tell you what s happening. Delta is designing Ethernet products to make those voices heard. Raymond Rae,

More information

Today s cyber threat landscape is evolving at a rate that is extremely aggressive,

Today s cyber threat landscape is evolving at a rate that is extremely aggressive, Preparing for a Bad Day The importance of public-private partnerships in keeping our institutions safe and secure Thomas J. Harrington Today s cyber threat landscape is evolving at a rate that is extremely

More information

PROs & CONs of VOIP (Voice-Over-IP) for SBOs 52 nd MASBO Annual Institute Presented by Suzanne McLaughlin & Robert Hamel

PROs & CONs of VOIP (Voice-Over-IP) for SBOs 52 nd MASBO Annual Institute Presented by Suzanne McLaughlin & Robert Hamel PROs & CONs of VOIP (Voice-Over-IP) for SBOs 52 nd MASBO Annual Institute Presented by Suzanne McLaughlin & Robert Hamel What is Voice-Over-IP VoIP stands for Voice over Internet Protocol It is also referred

More information

VMware vsphere 4 and Cisco Nexus 1000V Series: Accelerate Data Center Virtualization

VMware vsphere 4 and Cisco Nexus 1000V Series: Accelerate Data Center Virtualization VMware vsphere 4 and Cisco Nexus 1000V Series: Accelerate Data Center Virtualization Executive Summary VMware for the past decade has been the thought leader in driving virtualization of the data center

More information

Certeon s acelera Virtual Appliance for Acceleration

Certeon s acelera Virtual Appliance for Acceleration Certeon s acelera Virtual Appliance for Acceleration Product Brief Dr. Jim Metzler Ashton, Metzler & Associates Rolf McClellan McClellan Consulting June 2008 Certeon s acelera Virtual Appliance for Acceleration

More information

FIVE REASONS YOU SHOULD RUN CONTAINERS ON BARE METAL, NOT VMS

FIVE REASONS YOU SHOULD RUN CONTAINERS ON BARE METAL, NOT VMS WHITE PAPER FIVE REASONS YOU SHOULD RUN CONTAINERS ON BARE METAL, NOT VMS Over the past 15 years, server virtualization has become the preferred method of application deployment in the enterprise datacenter.

More information

Create the ideal conditions for your network to grow.

Create the ideal conditions for your network to grow. Create the ideal conditions for your network to grow. Create the ideal conditions for your network to grow. SBC PremierSERV SM Network Integration and Managed Services. Flexible, end-to-end solutions

More information

Swedish bank overcomes regulatory hurdles and embraces the cloud to foster innovation

Swedish bank overcomes regulatory hurdles and embraces the cloud to foster innovation Think Cloud Compliance Case Study Swedish bank overcomes regulatory hurdles and embraces the cloud to foster innovation Customer details : Collector Bank - Sweden 329 employees www.collector.se/en Banking

More information

Supporting the Cloud Transformation of Agencies across the Public Sector

Supporting the Cloud Transformation of Agencies across the Public Sector SOLUTION SERVICES Supporting the Cloud Transformation of Agencies across the Public Sector BRIEF Digital transformation, aging IT infrastructure, the Modernizing Government Technology (MGT) Act, the Datacenter

More information

Chapter01.fm Page 1 Monday, August 23, :52 PM. Part I of Change. The Mechanics. of Change

Chapter01.fm Page 1 Monday, August 23, :52 PM. Part I of Change. The Mechanics. of Change Chapter01.fm Page 1 Monday, August 23, 2004 1:52 PM Part I The Mechanics of Change The Mechanics of Change Chapter01.fm Page 2 Monday, August 23, 2004 1:52 PM Chapter01.fm Page 3 Monday, August 23, 2004

More information

Voice. The lost piece of the BYOD puzzle.

Voice. The lost piece of the BYOD puzzle. Voice. The lost piece of the BYOD puzzle. Contents: What s wrong with BYOD? 3 The issue of intimacy 4 How voice got left out of the picture 5 Why voice will always be big for business 6 Introducing smartnumbers

More information

MOVING MISSION IT SERVICES TO THE CLOUD

MOVING MISSION IT SERVICES TO THE CLOUD MOVING MISSION IT SERVICES TO THE CLOUD About half of civilian agency IT officials report they are now implementing mission support and business systems in the cloud. But a new progress report also highlights

More information

Virtualization: For Victory Over IT Complexity ABERDEEN GROUP

Virtualization: For Victory Over IT Complexity ABERDEEN GROUP Virtualization: For Victory Over IT Complexity ABERDEEN GROUP 1 The IT Struggle Is Real Struggle is a part of life. Every day, in both our personal and work lives, we struggle to do our best, to overcome

More information

THE STATE OF IT TRANSFORMATION FOR RETAIL

THE STATE OF IT TRANSFORMATION FOR RETAIL THE STATE OF IT TRANSFORMATION FOR RETAIL An Analysis by Dell EMC and VMware Dell EMC and VMware are helping IT groups at retail organizations transform to business-focused service providers. The State

More information

Cloud for Government: A Transformative Digital Tool to Better Serve Communities

Cloud for Government: A Transformative Digital Tool to Better Serve Communities Cloud for Government: A Transformative Digital Tool to Better Serve Communities 1 005181004 From state to local agencies, government organizations crave access to the same cloud-based tools enabling digital

More information

Making hybrid IT simple with Capgemini and Microsoft Azure Stack

Making hybrid IT simple with Capgemini and Microsoft Azure Stack Making hybrid IT simple with Capgemini and Microsoft Azure Stack The significant evolution of cloud computing in the last few years has encouraged IT leaders to rethink their enterprise cloud strategy.

More information

Taking Government Cloud Adoption to the Next Level: In Brief. Quick tips & facts about cloud adoption from GovLoop

Taking Government Cloud Adoption to the Next Level: In Brief. Quick tips & facts about cloud adoption from GovLoop Taking Government Cloud Adoption to the Next Level: In Brief Quick tips & facts about cloud adoption from GovLoop Executive Summary With cloud firmly established in government, agencies are looking at

More information

MAKING MONEY ON OPENSTACK. Boris

MAKING MONEY ON OPENSTACK. Boris MAKING MONEY ON OPENSTACK Boris Renski b@renski.com @zer0tweets China and Russia are alike! 2 We love gymnastics! 3 We love chess! 4 and we love money! 5 6 When most people think of OpenSt ack, they imagine

More information

Terminal Emulation Productivity Continues. Terminal Emulation. Productivity Continues. 1

Terminal Emulation Productivity Continues. Terminal Emulation. Productivity Continues.   1 Terminal Emulation Productivity Continues www.ivanti.com 1 Contents Summary... 3 1. Ivanti TE Works... 3 2. Ivanti TE is Widely Adopted... 3 3. Continued Evolution... 4 4. Increased Productivity... 4 5.

More information

Expert Reference Series of White Papers. 12 Virtualization Myths Debunked

Expert Reference Series of White Papers. 12 Virtualization Myths Debunked Expert Reference Series of White Papers 12 Virtualization Myths Debunked 1-800-COURSES www.globalknowledge.com 12 Virtualization Myths Debunked Paul Simoneau, Global Knowledge Course Director, Network+,

More information

THE CYBERSECURITY LITERACY CONFIDENCE GAP

THE CYBERSECURITY LITERACY CONFIDENCE GAP CONFIDENCE: SECURED WHITE PAPER THE CYBERSECURITY LITERACY CONFIDENCE GAP ADVANCED THREAT PROTECTION, SECURITY AND COMPLIANCE Despite the fact that most organizations are more aware of cybersecurity risks

More information

Integrated Access Management Solutions. Access Televentures

Integrated Access Management Solutions. Access Televentures Integrated Access Management Solutions Access Televentures Table of Contents OVERCOMING THE AUTHENTICATION CHALLENGE... 2 1 EXECUTIVE SUMMARY... 2 2 Challenges to Providing Users Secure Access... 2 2.1

More information

VOXOX. A Tell-All Guide EVERYTHING YOU NEED TO KNOW ABOUT HOSTED PBX. a VOXOX ebook VOXOX, Inc A Comprehensive Guide

VOXOX. A Tell-All Guide EVERYTHING YOU NEED TO KNOW ABOUT HOSTED PBX. a VOXOX ebook VOXOX, Inc A Comprehensive Guide VOXOX A Tell-All Guide EVERYTHING YOU NEED TO KNOW ABOUT HOSTED PBX a VOXOX ebook 2017 VOXOX, Inc A Comprehensive Guide CONTENTS 3 INTRODUCTION 4 WHAT IS HOSTED PBX 6 ANATOMY OF A HOSTED PBX CALL 8 GETTING

More information

Mobile & More: Preparing for the Latest Design Trends

Mobile & More: Preparing for the Latest Design Trends February 26, 2015 Mobile & More: Preparing for the Latest Design Trends LATEST TRENDS Responsive Takes Over Material Is the New Flat Hero Images Getting Bigger Interactions Are Micro Video in the Background

More information

WHITEPAPER. How to secure your Post-perimeter world

WHITEPAPER. How to secure your Post-perimeter world How to secure your Post-perimeter world WHAT IS THE POST-PERIMETER WORLD? In an increasingly cloud and mobile focused world, there are three key realities enterprises must consider in order to move forward

More information

Sponsored by: VMware. Mary Johnston Turner May 2009

Sponsored by: VMware. Mary Johnston Turner May 2009 W H I T E P A P E R S u c c e s s f u l D a t a c e n t e r V i r t u a l i z a t i o n D e p e n d s o n C o m p r e h e n s i v e M a n a g e m e n t S o l u t i o n s Sponsored by: VMware Mary Johnston

More information

An Architecture Journey

An Architecture Journey An Architecture Journey Jeromy Carriere Vice President, Architecture Fidelity Investments It begins 1 It begins Nortel Base skills as a developer Methodology Design No architect title; architects were

More information

SharePoint Virtualization and the Benefits of Modern Data Protection with Veeam Explorer for Microsoft SharePoint

SharePoint Virtualization and the Benefits of Modern Data Protection with Veeam Explorer for Microsoft SharePoint SharePoint Virtualization and the Benefits of Modern Data Protection with Veeam Explorer for Microsoft SharePoint Chris Henley Microsoft Certified Professional, MCSE, MCSA and Veeam Product Strategy Specialist

More information

SDI, Containers and DevOps - Cloud Adoption Trends Driving IT Transformation

SDI, Containers and DevOps - Cloud Adoption Trends Driving IT Transformation SDI, Containers and DevOps - Cloud Adoption Trends Driving IT Transformation Research Report August 2017 suse.com Executive Summary As we approach 2020, businesses face a maelstrom of increasing customer

More information

State of Cloud Survey GERMANY FINDINGS

State of Cloud Survey GERMANY FINDINGS 2011 State of Cloud Survey GERMANY FINDINGS CONTENTS Executive Summary... 4 Methodology... 6 Finding 1: Cloud security is top goal and top concern.................................. 8 Finding 2: IT staff

More information

Streamline IT with Secure Remote Connection and Password Management

Streamline IT with Secure Remote Connection and Password Management Streamline IT with Secure Remote Connection and Password Management Table of Contents Introduction Identifying IT pain points Selecting a secure remote connection and password management solution Turning

More information

Cloud. Cloud. Digital Customer Experience. Cyber Security. Digital Employee Experience. IP Solutions. Digital Insight. Payments. Internet of Things

Cloud. Cloud. Digital Customer Experience. Cyber Security. Digital Employee Experience. IP Solutions. Digital Insight. Payments. Internet of Things Cloud Digital Customer Experience Digital Employee Experience Digital Insight Internet of Things Payments IP Solutions Cyber Security Cloud 2015 CGI IT UK Ltd Contents... Digital transformation in the

More information

83951c01.qxd:Layout 1 1/24/07 10:14 PM Page 1 PART. Technology Evolution COPYRIGHTED MATERIAL

83951c01.qxd:Layout 1 1/24/07 10:14 PM Page 1 PART. Technology Evolution COPYRIGHTED MATERIAL 83951c01.qxd:Layout 1 1/24/07 10:14 PM Page 1 PART Technology Evolution COPYRIGHTED MATERIAL I 83951c01.qxd:Layout 1 1/24/07 10:14 PM Page 2 83951c01.qxd:Layout 1 1/24/07 10:14 PM Page 3 CHAPTER 1 Blades

More information