Information Management in a Converged World Martin Capurro Qwest Product Management
Agenda I. Changes In Information Technology II. III. IV. Exploring Technology Trends vs. Needs What is the Buying Opportunity Recommendations 2
The Perimeterless Enterprise The Day Extender Office with Fixed and Wireless Access Branch Offices Free Hotel Internet Mobile Computing Smart Phones Wifi Hotspots LANs with Endpoint Enforcement The Teleworker 3
Trends in Enterprise Information Technology IT Budgets Flat to Declining Compliance Requirement Enforcement (but little improvement in definitions) Additional Pro-sumer Technology Leaking into the Enterprise Security is Expected but Increasingly Harder to Integrate and Deliver Convergence Driving WAN Complexity 4
The Intelligent Network Utility Optimization Control Measurement Augmentation 1. Optimization Ability to optimize performance Caching, WAN Optimization, Compression, App Spoofing 2. Control Ability to modify fabric characteristics, service quality and flow shaping at a granular level l Rate Shaping, Bandwidth on Demand Policy Enforcement & Security 3. Augmentation Core network upgrade of raw network capacity Lambda Augments, Router Upgrades, Peering Capacity, impls/vpls Interconnects 4. Measurement Ability to measure application performance end to end End 2 End Application Reporting, Layer 2/3 Reporting, In Line and Passive, DPI
Service Utility Evolution Solution Creation Components Optimization Dedicated Virtualized Shared Application Utility Compute Utility Network Utility Measurement Control Augmentation Maturation Elements Optimization Measurement Control Augmentation Optimization Measurement Control Augmentation l Managed Elements Traditiona Voice / VoIP Seibel Exchange OS Instances Disks Arrays Servers Security HW Private Line See Dedicated Virtual Unix Boxes Virtual Disk Processing Utility Virtual SOC VPLS Hosted VoIP Salesforce.com Hosted Exchange Storage Capacity Shared Hosting Net Firewall/IPS MPLS Internet Costly Scalable
Contrasting L2 & L3 Services Customer Enterprise LAN Service Provider Serv Prov Enterprise LAN Layer 3 Routing Coordinated Routing Routing Routing Coordinated Routing Ethernet Layer 2 Ethernet Ethernet Switching Layer 3 Routing Routing Routing Routing Routing Routing SERVICE PROVIDER TRANSPARENT TO ROUTING Layer 2 Ethernet Ethernet Switching Ethernet
Teleworking is Good But Sometimes Bad Things Happen to Good People Your Company Network Is Here You are here Hacker with hotspot locator Don t let mobile computer users access your corporate network without properp security controls, including: Physically secure unattended computers Rely on industry best practices to secure wireless networks Deploy disk encryption software Use SSL or IPsec VPN technology when connecting to corporate resources Install anti-spyware, anti-virus, and antispam software locally or via network gateways Configure personal firewalls Use automated version and patch management software to remain up to date. 8
Secure the People smart clients enforce at the endpoint CONNECTIVITY FINDER KEEP AUDITORS HAPPY FIX WHAT S BROKEN Connection Manager Hotspot Locator Version Manager App Monitor Auto Remediation PROTECT SENSITIVE DATA LOW COST INSURANCE @$5 PER USER PER MONTH Smart Client Personal Firewall VPN Client Data Leak Prevention Disk Encryption 9
DDoS Mitigation Steps 1. Detect the DDoS Event 2. Activate Scrubber 3. Scrubber updates route on core router 4. Identify and filter traffic 5. Forward legitimate traffic 6. Non-target traffic flows freely Arbor Backbone Monitoring 1 4 Core Router 5 Core Router 3 2 Edge Router Diverts only the target s traffic via route update on core router Cisco Anomaly Guard Data Scrubber 10 Customer Edge Router
Learn From Others Top Five VoIP Threats for 2008* Unauthorized snoopings Beware automated calls from your bank Can t e-mail, make phone calls, message 1. DoS attack on VoIP network 2. VoIP eavesdropping 3. Microsoft Office Communications Server 4. Vishing (VoIP phishing) 5. VoIP attacks on service providers Microsoft will always be a Ask how your provider secures their infrastructure favorite target 11 *As reported in Forbes Magazine, Jan 2008
Managed Services = Simplified Solutions Traditional Managed Services Element Element Application Monitoring Element monitoring configuration management & Management Solve real customer business challenges Simplified Solutions The New Managed Services Self Contained & E2E Managed Solution Business-Relevant SLAs Simplified Offerings from Qwest Office Connect Integrated Access Managed IP Communication Contact Center Conferencing Managed Services Evolution Tired Simple Element Management Wired Cost Effective Simplified Solutions 12
Takeaways & Lessons Learned Do More With Less Decide what is CORE and what you can outsource efficiently for LESS Embrace Compliance Leverage New Technology Have Security Plans in Place Understand WAN Needs Generally requirements are lower than mature standards Make sure you meet your needs FIRST Setting Policy Proactively is less effort than resisting change and change can be good Work with Service Provider on Roles & Responsibilities Buy based on where you want to take your infrastructure Know your long-term requirements FIRST 13