SlideShare a Scribd company logo
Building and Operating Clouds:What to Do Once You Hit The On SwitchRoy Ritthaler, Sr. Director Product Marketing, BMCRich Plane, Director, Solution Development and Delivery, Harris Corp.
ObjectivesYou should leave today’s session knowing….Building and operating cloud environments is a known scienceThere are commercially viable software and solution provider opportunities in the market today for cloudLeveraging out-of-the-box software, it’s now possible to achieve an enterprise-level, fully operational cloud
AgendaCloud Operations – Delivering Highly Available CloudsRoy Ritthaler, Sr. Director, Product MarketingTrust in the Cloud – From Definition to DeliveryRich Plane, Director, Solution Development and Delivery, Harris CorporationQuestion & Answers
Cloud availability is business criticalSo far,  cloud projects have  focused on automated provisioning…but  availability and  cloud operations are usually an after thought
Clouds are difficult to manage …With new cloud complexity:Incredible, global scale
Local and public resources
Highly movable workloads
Ongoing new/ retired services
End-user expectationsTraditional challenges remain:Complex IT infrastructures
End-to-End application monitoring
Multiple data sources
Security considerationsThe result, a loss of business reputationFrustrated CustomersLong Recovery TimesCost and Efficiency Overruns
Cloud Operations use casesEnforce service levels for services delivered through cloudImprove service quality with hybrid cloudIdentify issues with cloud infrastructure to avoid outagesEnsure quality of transient cloud servicesOptimally balance workload distribution in the cloudEnsure service availability of unpredictable workloads
Operations is asking for three key capabilitiesMeet the user’s ongoing expectations for service qualityService Level EnforcementProactive Service Performance ManagementEnsure the performance of services and infrastructureContinuous Resource OptimizationRight-size capacity of individual services and the entire cloudCloud Operations SolutionIncorporate all three capabilities into a unified, modular solution
Meet the user’s ongoing expectations for service qualityBMC End User Experience ManagementCloud OperationsService Level EnforcementProactive Service Performance ManagementContinuous Resource Optimization
Ensuring Infrastructure PerformanceBMC ProactiveNet Performance ManagementCloud OperationsService Level EnforcementProactive Service Performance ManagementContinuous Resource OptimizationPredictive analytics and prioritization based on business impactExtend service views into cloud, virtual and physical infrastructureSingle platform to monitor private and public (Harris, AWS, Azure) clouds
Right-size capacity of cloud services and the entire cloudBMC Capacity OptimizationCloud OperationsCloud Infrastructure PlanningIntelligent PlacementService Level EnforcementProactive Service Performance ManagementAssess overall health and performance of your cloud environmentCross-cloud visibility of resource capacity utilization and efficiencyProvide intelligent placement advisory to Cloud Lifecycle ManagementOptimally allocate workload according to performance and policy constraintsContinuous Resource Optimization
Cloud Operations – The Critical CapabilitiesEnd User Behavior MonitoringReal-time business and end user impact analysisPredictive Service ImpactProactive identification of service performance problemsBusiness-Aware Capacity PlanningContinuously alignment of  Cloud capacity with business demandOpen, Heterogeneous DesignPrevention of vendor lock-in and protection of long term business valueIntegrated Operating ModelIntegration with existing IT processes to maintain cloud services
Harris builds a trusted cloud using  BMC SoftwareHarris Corp.More than 16,000 employees including nearly 7,000 engineers and scientists
$6 billion annual revenue
Industry leader in mission critical networked systemsCloud GoalsDelivering  secure services in the cloud to their customersKey Use CasesRapidly provision new services for customers
Ensure customer service levels are met
Automated event identification & remediationImplementation HighlightsGreenfield implementation, building a new business from the ground upTrust in the Cloud – From Definition to DeliveryTrust – The Industry PerspectiveHarris Perspectives on TrustImplementing TrustYou Can Trust the Cloud!
About the TechAmerica CLOUD2 CommissionFormed to provide recommendations to Obama Administration Government deployment of cloud technologies
Public policies that will help drive US innovation in the cloudParticipation from 71 experts across industry and academiaCommissioned in April 2011 and final recommendations presented July 26, 2011DeliverablesFinal Report of recommendations
Cloud Buyer’s GuideSummary of CLOUD2 RecommendationsTrustTransparencyEnsuring the combination of factors that allows consumers of cloud services to be confident that the services are meeting their computing needsRequire vendors to share relevant information about their capabilities, offerings and service levelsTransnational Data FlowsTransformationRecommendations in policy, infrastructure, and training to help facilitate broader adoption of the cloudNeed for collaboration & standardization of data access across national bordersCommittee activities were structured around the four T’s
CLOUD2 Recommendations on TrustEnsuring that the cloud is meeting consumer’s needs for security, privacy, availabilityFactors Contributing to TrustTransparency of practices
Accountability
Resiliency
Redundancy
Access and Connectivity
Supply chain provenance
Life cycle integrity
GovernanceSpecific RecommendationsInternational standards for security and assurance Frameworks
Accelerate the development of  an identity management ecosystem
Enact and improve legislation related to data breaches
Develop a joint research agenda for cloud technologyContentsTrust – The Industry PerspectiveHarris Perspectives on TrustImplementing TrustYou Can Trust the Cloud!
The Pillars of Trust
Barriers to the Cloud are RealTrustCost & Control
Defining Cyber TrustAssumed Trust:Perimeter-Centric, Heuristic and/or Blacklist-based, used for both Data in Motion and Data at RestExplicit Trust:Infrastructure and Information-Centric with a focus on specific positive image and software reference measurement and attestationIntrinsic Trust:Building explicit, positive and immutable trust methods into the hardware and software systems, for example Root of Trust for Measurement (RTM) and Trusted Platform Modules (TPM’s), along with supply chain-anchored hardware and software provenance and attestation
ContentsTrust – The Industry PerspectiveHarris Perspectives on TrustImplementing TrustYou Can Trust the Cloud!
Trusted Reference Technology> 2.8B code component signatures as deployed directly from the sourceFirmware and software on all active network (switches, routers, firewalls) and computing components continuously monitoredBeyond Security – Explicit TrustControl over your ITCompliance posture delivered on demandSoftware supply chain integrityApplication Data and Signature Database+2000 other vendorsGlobal Trust Repository(GTR)Enterprise Trust ServerReferenceConfigurationsCompliance AssessmentReportingCompliance ReportsInventory ReportsChange ReportsNotificationsIT InfrastructureEcommerce Service
Trading Service

More Related Content

PPTX
Finding application problems before they impact users
PPTX
AWS Outage Analysis
PPTX
Modernizing Your DNS Platform with NS1 and ThousandEyes
PPTX
ThousandEyes EMEA - Why 74% of IT Teams Are Not Ready for the Cloud
PDF
AWS security monitoring and compliance validation from Adobe.
PDF
ThousandEyes Overview
PPTX
The Top Outages of 2021: Analysis and Takeaways
PDF
Automating Performance Monitoring at Microsoft
Finding application problems before they impact users
AWS Outage Analysis
Modernizing Your DNS Platform with NS1 and ThousandEyes
ThousandEyes EMEA - Why 74% of IT Teams Are Not Ready for the Cloud
AWS security monitoring and compliance validation from Adobe.
ThousandEyes Overview
The Top Outages of 2021: Analysis and Takeaways
Automating Performance Monitoring at Microsoft

What's hot (9)

PPTX
Can you process 10 trillion logs per day software architecture conference 2015
PDF
Petabytes and Nanoseconds
PDF
Monitoring Apps & Networks in a Cloud-Centric World at Gartner IOSS 2016
PDF
Cisco IT and ThousandEyes
PPTX
Cyber Security Compliance Solutions for Foreign Companies in China - Alibaba ...
PPTX
Event-Driven Serverless Architecture - the next big thing in the cloud (Cleme...
PDF
Serverless Computing: Driving Innovation and Business Value
PPTX
How McGraw Hill Uses Sumo Logic and AWS for Operational and Security Intellig...
PDF
Keynote: Customer Journey with Streaming Data on AWS - Rahul Pathak, AWS
Can you process 10 trillion logs per day software architecture conference 2015
Petabytes and Nanoseconds
Monitoring Apps & Networks in a Cloud-Centric World at Gartner IOSS 2016
Cisco IT and ThousandEyes
Cyber Security Compliance Solutions for Foreign Companies in China - Alibaba ...
Event-Driven Serverless Architecture - the next big thing in the cloud (Cleme...
Serverless Computing: Driving Innovation and Business Value
How McGraw Hill Uses Sumo Logic and AWS for Operational and Security Intellig...
Keynote: Customer Journey with Streaming Data on AWS - Rahul Pathak, AWS
Ad

Similar to Building and Operating Clouds (20)

PPTX
Can I Trust the Cloud?
PDF
Securing The Clouds with The Standard Best Practices-1.pdf
PPT
Cloud Computing Realities - Getting past the hype and setting your cloud stra...
PPT
Virgílio Vargas Presentations / CloudViews.Org - Cloud Computing Conference 2...
PPTX
Moving Enterprise Applications to the Cloud
PDF
Cloud Clinique Enterprise IT Certification Program - Module Matrix
PPTX
Managed Cloud Services CIO Conference Oil Gas
PDF
Fundamentals for Stronger Cloud Security2.pdf
PPT
(Dee fleming) Ccloud computing_la_press_final
PDF
Harvey Nash USA Webinar: Cloud Computing
PPTX
2014 2nd me cloud conference trust in the cloud v01
PPTX
CloudHesive x Datadog Multi Generational Observability
PPTX
Cloud Is Built, Now Who's Managing It?
PDF
EMC Perspective: What Customers Seek from Cloud Services Providers
 
PPTX
BSM for Cloud Computing
PDF
ISACA Cloud Computing Risks
PDF
Security Considerations When Using Cloud Infrastructure Services.pdf
PPTX
Your path to the cloud local event presentation
PPTX
Cloud Security - Reality or Illusion
PPTX
Financial and Operational Results by moving to the Cloud!
Can I Trust the Cloud?
Securing The Clouds with The Standard Best Practices-1.pdf
Cloud Computing Realities - Getting past the hype and setting your cloud stra...
Virgílio Vargas Presentations / CloudViews.Org - Cloud Computing Conference 2...
Moving Enterprise Applications to the Cloud
Cloud Clinique Enterprise IT Certification Program - Module Matrix
Managed Cloud Services CIO Conference Oil Gas
Fundamentals for Stronger Cloud Security2.pdf
(Dee fleming) Ccloud computing_la_press_final
Harvey Nash USA Webinar: Cloud Computing
2014 2nd me cloud conference trust in the cloud v01
CloudHesive x Datadog Multi Generational Observability
Cloud Is Built, Now Who's Managing It?
EMC Perspective: What Customers Seek from Cloud Services Providers
 
BSM for Cloud Computing
ISACA Cloud Computing Risks
Security Considerations When Using Cloud Infrastructure Services.pdf
Your path to the cloud local event presentation
Cloud Security - Reality or Illusion
Financial and Operational Results by moving to the Cloud!
Ad

More from BMC Software (20)

PDF
The Accelerator's Guide to Digital Transformation
PDF
Flip the Switch On Continuous Delivery
PDF
Peer Into the Bright Future on the Service Desk Horizon
PDF
Remedyforce helps General Dynamics meet ever-changing user needs
PDF
BMC Software Remedyforce Case Study
PDF
Mission: Launch a Digital Workplace
PPTX
How Will Your Cloud Strategy Impact Your Cyber Strategy?
PDF
The Power of Monitoring Studio in TrueSight
PDF
MasterCard Optimizes Big Data Management with BMC High Speed Utilities for DB2®
PPTX
Digital Transformation Playbook: Guide to Unleashing Exponential Growth
PPTX
Salesforce Lightning Process Builder IS the next-generation workflow tool
PPTX
Remedyforce Localization and Translation
PDF
What Do Executives Need to Do to Go Digital?
PDF
Curating Your Digital Workplace: Key Steps for IT
PDF
Delivering the Digital Workplace Without the Chaos
PPTX
Salesforce and Remedyforce ISV Tech Talk: Pushing New Versions of your App
PPTX
Data Migration for Remedyforce SaaS Help Desk and High-Speed Digital Service ...
PPTX
Data Segregation for Remedyforce SaaS Help Desk and High-Speed Digital Servic...
PDF
Next Generation Technology Utility Benchmarks
PPTX
How to Manage MLC Costs to Optimize the Mainframe
The Accelerator's Guide to Digital Transformation
Flip the Switch On Continuous Delivery
Peer Into the Bright Future on the Service Desk Horizon
Remedyforce helps General Dynamics meet ever-changing user needs
BMC Software Remedyforce Case Study
Mission: Launch a Digital Workplace
How Will Your Cloud Strategy Impact Your Cyber Strategy?
The Power of Monitoring Studio in TrueSight
MasterCard Optimizes Big Data Management with BMC High Speed Utilities for DB2®
Digital Transformation Playbook: Guide to Unleashing Exponential Growth
Salesforce Lightning Process Builder IS the next-generation workflow tool
Remedyforce Localization and Translation
What Do Executives Need to Do to Go Digital?
Curating Your Digital Workplace: Key Steps for IT
Delivering the Digital Workplace Without the Chaos
Salesforce and Remedyforce ISV Tech Talk: Pushing New Versions of your App
Data Migration for Remedyforce SaaS Help Desk and High-Speed Digital Service ...
Data Segregation for Remedyforce SaaS Help Desk and High-Speed Digital Servic...
Next Generation Technology Utility Benchmarks
How to Manage MLC Costs to Optimize the Mainframe

Recently uploaded (20)

PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPTX
Big Data Technologies - Introduction.pptx
PDF
Approach and Philosophy of On baking technology
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
KodekX | Application Modernization Development
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf
Spectral efficient network and resource selection model in 5G networks
Review of recent advances in non-invasive hemoglobin estimation
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
“AI and Expert System Decision Support & Business Intelligence Systems”
Encapsulation_ Review paper, used for researhc scholars
The Rise and Fall of 3GPP – Time for a Sabbatical?
Chapter 3 Spatial Domain Image Processing.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
NewMind AI Weekly Chronicles - August'25 Week I
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Big Data Technologies - Introduction.pptx
Approach and Philosophy of On baking technology
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
KodekX | Application Modernization Development
Agricultural_Statistics_at_a_Glance_2022_0.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
20250228 LYD VKU AI Blended-Learning.pptx
Building Integrated photovoltaic BIPV_UPV.pdf

Building and Operating Clouds

  • 1. Building and Operating Clouds:What to Do Once You Hit The On SwitchRoy Ritthaler, Sr. Director Product Marketing, BMCRich Plane, Director, Solution Development and Delivery, Harris Corp.
  • 2. ObjectivesYou should leave today’s session knowing….Building and operating cloud environments is a known scienceThere are commercially viable software and solution provider opportunities in the market today for cloudLeveraging out-of-the-box software, it’s now possible to achieve an enterprise-level, fully operational cloud
  • 3. AgendaCloud Operations – Delivering Highly Available CloudsRoy Ritthaler, Sr. Director, Product MarketingTrust in the Cloud – From Definition to DeliveryRich Plane, Director, Solution Development and Delivery, Harris CorporationQuestion & Answers
  • 4. Cloud availability is business criticalSo far, cloud projects have focused on automated provisioning…but availability and cloud operations are usually an after thought
  • 5. Clouds are difficult to manage …With new cloud complexity:Incredible, global scale
  • 6. Local and public resources
  • 9. End-user expectationsTraditional challenges remain:Complex IT infrastructures
  • 12. Security considerationsThe result, a loss of business reputationFrustrated CustomersLong Recovery TimesCost and Efficiency Overruns
  • 13. Cloud Operations use casesEnforce service levels for services delivered through cloudImprove service quality with hybrid cloudIdentify issues with cloud infrastructure to avoid outagesEnsure quality of transient cloud servicesOptimally balance workload distribution in the cloudEnsure service availability of unpredictable workloads
  • 14. Operations is asking for three key capabilitiesMeet the user’s ongoing expectations for service qualityService Level EnforcementProactive Service Performance ManagementEnsure the performance of services and infrastructureContinuous Resource OptimizationRight-size capacity of individual services and the entire cloudCloud Operations SolutionIncorporate all three capabilities into a unified, modular solution
  • 15. Meet the user’s ongoing expectations for service qualityBMC End User Experience ManagementCloud OperationsService Level EnforcementProactive Service Performance ManagementContinuous Resource Optimization
  • 16. Ensuring Infrastructure PerformanceBMC ProactiveNet Performance ManagementCloud OperationsService Level EnforcementProactive Service Performance ManagementContinuous Resource OptimizationPredictive analytics and prioritization based on business impactExtend service views into cloud, virtual and physical infrastructureSingle platform to monitor private and public (Harris, AWS, Azure) clouds
  • 17. Right-size capacity of cloud services and the entire cloudBMC Capacity OptimizationCloud OperationsCloud Infrastructure PlanningIntelligent PlacementService Level EnforcementProactive Service Performance ManagementAssess overall health and performance of your cloud environmentCross-cloud visibility of resource capacity utilization and efficiencyProvide intelligent placement advisory to Cloud Lifecycle ManagementOptimally allocate workload according to performance and policy constraintsContinuous Resource Optimization
  • 18. Cloud Operations – The Critical CapabilitiesEnd User Behavior MonitoringReal-time business and end user impact analysisPredictive Service ImpactProactive identification of service performance problemsBusiness-Aware Capacity PlanningContinuously alignment of Cloud capacity with business demandOpen, Heterogeneous DesignPrevention of vendor lock-in and protection of long term business valueIntegrated Operating ModelIntegration with existing IT processes to maintain cloud services
  • 19. Harris builds a trusted cloud using BMC SoftwareHarris Corp.More than 16,000 employees including nearly 7,000 engineers and scientists
  • 20. $6 billion annual revenue
  • 21. Industry leader in mission critical networked systemsCloud GoalsDelivering secure services in the cloud to their customersKey Use CasesRapidly provision new services for customers
  • 22. Ensure customer service levels are met
  • 23. Automated event identification & remediationImplementation HighlightsGreenfield implementation, building a new business from the ground upTrust in the Cloud – From Definition to DeliveryTrust – The Industry PerspectiveHarris Perspectives on TrustImplementing TrustYou Can Trust the Cloud!
  • 24. About the TechAmerica CLOUD2 CommissionFormed to provide recommendations to Obama Administration Government deployment of cloud technologies
  • 25. Public policies that will help drive US innovation in the cloudParticipation from 71 experts across industry and academiaCommissioned in April 2011 and final recommendations presented July 26, 2011DeliverablesFinal Report of recommendations
  • 26. Cloud Buyer’s GuideSummary of CLOUD2 RecommendationsTrustTransparencyEnsuring the combination of factors that allows consumers of cloud services to be confident that the services are meeting their computing needsRequire vendors to share relevant information about their capabilities, offerings and service levelsTransnational Data FlowsTransformationRecommendations in policy, infrastructure, and training to help facilitate broader adoption of the cloudNeed for collaboration & standardization of data access across national bordersCommittee activities were structured around the four T’s
  • 27. CLOUD2 Recommendations on TrustEnsuring that the cloud is meeting consumer’s needs for security, privacy, availabilityFactors Contributing to TrustTransparency of practices
  • 34. GovernanceSpecific RecommendationsInternational standards for security and assurance Frameworks
  • 35. Accelerate the development of an identity management ecosystem
  • 36. Enact and improve legislation related to data breaches
  • 37. Develop a joint research agenda for cloud technologyContentsTrust – The Industry PerspectiveHarris Perspectives on TrustImplementing TrustYou Can Trust the Cloud!
  • 39. Barriers to the Cloud are RealTrustCost & Control
  • 40. Defining Cyber TrustAssumed Trust:Perimeter-Centric, Heuristic and/or Blacklist-based, used for both Data in Motion and Data at RestExplicit Trust:Infrastructure and Information-Centric with a focus on specific positive image and software reference measurement and attestationIntrinsic Trust:Building explicit, positive and immutable trust methods into the hardware and software systems, for example Root of Trust for Measurement (RTM) and Trusted Platform Modules (TPM’s), along with supply chain-anchored hardware and software provenance and attestation
  • 41. ContentsTrust – The Industry PerspectiveHarris Perspectives on TrustImplementing TrustYou Can Trust the Cloud!
  • 42. Trusted Reference Technology> 2.8B code component signatures as deployed directly from the sourceFirmware and software on all active network (switches, routers, firewalls) and computing components continuously monitoredBeyond Security – Explicit TrustControl over your ITCompliance posture delivered on demandSoftware supply chain integrityApplication Data and Signature Database+2000 other vendorsGlobal Trust Repository(GTR)Enterprise Trust ServerReferenceConfigurationsCompliance AssessmentReportingCompliance ReportsInventory ReportsChange ReportsNotificationsIT InfrastructureEcommerce Service
  • 48. Directory ServersTrust and Supply ChainDo I know that the software elements that I am loading and running on my platform ARE what they say they are?What proof do I have that the code I am using was actually built by the named vendor?Is an increasing concern for software & hardware vendors and users in all sectorsProof that the code was actually built by the named supplier is a crucial element of software and device validation or attestation
  • 49. Delivering Cyber Assurance Through Continuous Monitoring and Control
  • 50. ContentsTrust – The Industry PerspectiveHarris Perspectives on TrustImplementing TrustYou Can Trust the Cloud!
  • 51. The Trusted Enterprise CloudWorld-class and purpose-built infrastructure – the Cyber Integration Center and Harris’ network of cyber facilities and operations centersBest-of-breed systems and processes – focused on virtualization, automation, a unique end-to-end service model, and customized control through the client portalTrust Enablement Technology – continuous monitoring and assessment of the device and software supply chain using our Global Trust Repository of industry standard reference images and external vulnerability feedsApplication Data and Signature Database+2000 other vendorsGlobal Trust Repository(GTR)Enterprise Trust ServerCompliance AssessmentReferenceConfigurationsReportingCompliance ReportsInventory ReportsChange ReportsNotificationsIT InfrastructureEcommerce Service
  • 57. Directory ServersThe industry’s first enterprise-grade, high-assurance cloud computing solution
  • 58. Trust In The CloudThe industry’s first enterprise-grade, high-assurance cloud computing solutionWorld class partners providing best of breed technologyCyber integration expertise to cost effectively meet the unique needs of your businessTrust enablement technology that goes beyond security to unprecedented visibility and control of your infrastructurewww.cyber.harris.com
  • 59. Q & A To ask a question, Follow Operator InstructionsOr use the webex chat window
  • 62. Delivering Explicit Trust: Positive Assurance MethodsWhen the system needs to prove its integrity, it sends the collected measurements in a process called attestation.Before each subsequent level of the stack is loaded, it is measured by the preceding level and the result is stored in trusted hardware. Trust is established at the hardware level via Trusted Computing Group (TCG) defined standard methodologies (TPM, Integrity Management Model)
  • 63. Proving Trust: Active & Continuous Transparency
  • 64. Key Features & Benefits
  • 65. BMC Cloud Lifecycle ManagementDelivers the foundation of Cloud OperationsDeliver business services with end-to-end cloud managementAutomatically installs, deploys and configures monitoringGuided monitoring configuration in CLM PlannerIntelligent policy-based placement and ongoing operations with the industry’s first Service GovernorSupport for heterogeneityIntegrated with key operational processes, performance and capacity management
  • 66. Organizations are waking up to the problemThey are asking for three Cloud Management capabilities ….Service Level EnforcementMeet the user’s ongoing expectations for service quality End-user experience is managed according to business priorities, user identity, workload, location and impactProactive Service Performance ManagementEnsure the performance of services and infrastructureDynamically monitor the cloud by analyzing known behaviors against established KPI’s to anticipate and automate management actionContinuous Resource OptimizationRight-size capacity of individual services and the entire cloudOptimize the cloud infrastructure capacity for maximum business impact and utilizationCloud Operations SolutionIncorporate all three capabilities into a unified, modular solution
  • 67. Service Level Enforcement End to end visibility for cloud and enterprise servicesCloud OperationsService Level EnforcementFrom the data-center perspectiveDB TierCDNService Level EnforcementApp TierEnd to EndWeb TierBMC End User Experience MgmtDeep DiagnosticsProactive Service Performance ManagementFrom the end-user perspectiveContinuous Resource Optimization
  • 68. Service Level EnforcementTurn Visibility into ActionCloud OperationsService Level EnforcementProactive Service Performance ManagementContinuous Resource OptimizationManage horizontally – by site, by location, by customer, by delivery networkManage vertically – by application, business priority, audience, high value user, web page
  • 69. Proactive Service Performance ManagementExtend monitoring to public cloud resources Single platform to monitor hybrid (public and private) IT servicesPublic Cloud monitoring OOTB – Amazon Web Services and Microsoft Azure Remote public cloud deployment of agentsCloud OperationsEnterprise Data Center BMC ProactiveNet Performance ManagementReal-Time Predictive AnalyticsService Level EnforcementPredictive Service ImpactPredictive Root CausePredictive CorrelationBehavior LearningProactive Service Performance ManagementPublic Cloud KMCloud Public APIBPPM AgentBPPM AgentSecure ConnectionContinuous Resource OptimizationPublic Cloud ResourcesIn-house Resources
  • 70. SLAsRisk ToleranceBusiness VolumeBudgetsTIMEContinuous Resource OptimizationMaintaining the Right InfrastructureOptimize Physical Server UtilizationOptimize Virtual Machine DensitySupport multi-platform, multi-vendor physical, virtual cloud resourcesCloud OperationsService Level EnforcementIT INFRASTRUCTUREProactive Service Performance Managementvs.Continuous Resource Optimization
  • 71. Current ChallengesAvailability Reactive management processes struggling in an elastic environmentService PerformanceUnmet service expectationsRiskHigh decision latency caused by information silosOperational EfficiencyService delivered by underutilized infrastructure and over burdened human resources
  • 72. Meet the user’s ongoing expectations for service qualityBMC End User Experience ManagementCloud OperationsService Level EnforcementProactive Service Performance ManagementContinuous Resource Optimization
  • 73. Ensuring Infrastructure PerformanceBMC ProactiveNet Performance ManagementCloud OperationsService Level EnforcementProactive Service Performance ManagementContinuous Resource OptimizationPredictive analytics and prioritization based on business impactExtend service views into cloud, virtual and physical infrastructureSingle platform to monitor private and public (AmazonWS, Azure) clouds
  • 74. Right-size capacity of cloud services and the entire cloudBMC Capacity OptimizationCloud OperationsCloud Infrastructure PlanningIntelligent PlacementService Level EnforcementProactive Service Performance ManagementAssess overall health and performance of your cloud environmentCross-cloud visibility of resource capacity utilization and efficiencySupport for VMWare and Citrix XenServer environmentsProvide intelligent placement advisory to CLMOptimally allocate workload according to performance and policy constraintsIncrease the efficiency and utilization level of the entire cloud infrastructureContinuous Resource Optimization

Editor's Notes

  • #4: Rich PlaneArchitected and built the Harris Trusted Enterprise Cloud and the Harris Cyber Integration Center30-year history as a developer and enterprise consumer of information technologyC-level IT executive and thought leader in cloud computing and enterprise ITReference advisor for BMC, VCE, EMC, Cisco, and HP
  • #5: We know that availability is important to IT, but how important is service availability in the cloud? If we look at recent history, the evidence is clear – availability matters in the cloud. There is no magic to the cloud, and it’s not a given that you can simply turn your cloud on and expect it to work flawlessly. Hardware fails. Networks fail. Even software fails! The cloud must be managed just like anything else in IT. There have recently been several high profile outages of public clouds recently. In some cases, there was no recourse for companies that relied on it to run their business. This represented a huge risk to these businesses, which went unmanaged until it caused damage. There are numerous other examples of cloud services experiencing severe challenges with availability. How can businesses trust their critical workloads to cloud environments? Sticking your head in the sand is not an option as the increased agility and cost benefits that cloud the cloud provides are increasingly leveraged as a competitive advantage.
  • #7: How can I quickly identify issues with my cloud infrastructure to avoid outages?Before – “Silo’d cloud resource monitoring”After - Holistic Cloud Resource Monitoring & AnalyticsWhy BMC (differentiators)Single platform of analytics, events management, service impact management Tightly integrated with BSM Sophisticated analytics engine. Heterogeneous environmentHow do I enforce end-user service levels for services delivered through cloud platforms?Before – “No view of end-user experience”After – End User Service Level AssuranceWhy BMC (differentiators) Single platform to automate operation processes and help make holistic decisionsSelf-learning Analysis and Predictive Root CauseIntegration with BSMHow do I manage service availability of unpredictable real-time workloads in the cloud?Before – “Lack of visibility into cloud capacity”After – Cloud Capacity OptimizationWhy BMC (differentiators)Automated – optimal placement of cloud workloadsHolistic capacity mgmt. (server, storage, network, etc)Automated, exception-based analysis & reportingBusiness-aware capacity mgmt.BSM integrationHow can I improve service quality leveraging hybrid cloud?Before – “Unable to track app. Performance & capacity in hybrid cloud”After – Elastic cloud application service level assuranceWhy BMC (differentiators)Comprehensive coverage from end user experience to cloud resources from private, public, and hybrid cloudMap, monitor & dynamically track elastic cloud resourcesSingle platform of analytics, events management, service impact management in hybrid cloudBusiness-aware capacity optimizationHow do I ensure quality of cloud services when they are transient in nature?Before – “Unable to track movement of cloud resources and services“After – Dynamic Cloud ServicesReal-Time Predictive Service ImpactContinuous deep-dive diagnosticsUnified BSM architecture integrates operations, automation , ITSM and financial processes
  • #9: With real-time global dashboards, you can quickly assess user impact -- you can determine where users are coming from when they access your application, and where any problems are occurring right now
  • #12: Self Explanatory
  • #16: Presenter’s note: The remainder of this discussion will focus in more detail on the CLOUD2 recommendations on trustThe commission’s work focused on the four “T’s”Transnational data flowsNeed for collaboration & standardization of data access across national bordersTransparencyRequire vendors to share relevant information about their capabilities, offerings and service levelsTransformationRecommendations in policy, infrastructure, and training to help facilitate broader adoption of the cloudTrustEnsuring the combination of factors that allows consumers of cloud services to be confident that the services are meeting their computing needsThe remainder of this discussion will focus in more detail on the CLOUD2 recommendations on trustCommission also generated a buyer’s guide:Buyer’s GuideAdvises the government on how to be smart adopters of cloud services
  • #17: Security and assurance framework – specifically mentioned collaboration with NIST to develop best practices and standards and endorsed the work being done on SCAP and FedRAMP
  • #23: Our patented trusted reference technology is comprised of two major components:The Enterprise Trust Server sits inside your infrastructure to provide detailed auditing and configuration information on demand. It can provide reports on the IT inventory, report changes in software load or configuration and assess compliance against a number of different compliance templates. It compares its measurements against known good reference configurations.The enterprise trust server communicates with the second component, the global trust repository. The global trust repository is database of cryptographically derived signatures of over 2.8B unique code components. Because of the partner relationships we have in place, most of these signatures are derived directly from the sources and we have the largest database of known provenance software signatures available.These two components work together to provide complete and high fidelity visibility and control of your platform. You know what is running on your systems, where it came from, how it’s configured and if it’s been modified since it was deployed.This provides an extra layer of protection beyond traditional security tools, but also goes beyond security to provide you with explicit evidence and trust that your platforms are configured to your expectations.Protection against zero day attacks and advanced persistent threats.Some additional stats on the GTR & ETS:The Global Trust Repository is the largest collection of reference images provided directly from the vendor and continuously updated. The GTR is a cloud service providing known-provenance whitelist measurements of commercially available and open source software. The measurements are obtained via direct partnerships with many software vendors covering a broad range of operating systems, device drivers, third-party applications, and many other types of data representing the desired state of systems comprising IT business services. The GTR statistics as of June 2011:Current Product Count ~760,000Number of Vendors over 2,000+Microsoft Windows Platform Count ~100,000 packagesUnique Signature Count over 2.8 billion +Growing at ~5 million Signatures / DayThe Enterprise Trust Server (ETS) continuously monitors all active computing devices (network devices, servers, etc.) in the IT infrastructure, comparing the signatures for all the software and firmware installed in the devices to their reference configuration to the applicable signatures in the GTR and performs change detection to provide alerts of any unauthorized, unintended, or malicious, changes to the environment.
  • #27: 1. World Class Purpose Built InfrasturctureInfrastructure built specifically for the cloudUptime Institute Tier III reliabilityTwo physically diverse telecom pathways Two water sources used for coolingDual power sources from two separate substationsPhysical Security100’ perimeter security fence with intrusion detectionInterior and exterior motion-activated video monitoringBiometric access scanners and man-trap portal4/7/365 on-site security guardsGREEN IT:LEED Certified Silver for designA total of 39,000 registered as LEED facilities, various certifications / worldwide (LEED public directory list)13,500 of these are registered at or over 100,000 square feet / world wideTotal 2,300 certified at LEED Silver in USA / various sizesOnly 17 were certified LEED Silver thru design in USA / various sizesOnly 11 centers listed at 100k sq. ft. or larger / in USA – we are one of them.2. Green construction3. High efficiency centrifugal chillers4. Cooling water reuseMulti-zone water containment allows us to repurpose chemical-free water to use as irrigation water….which allows us to conserve water and conserve energy2. Best of Breed Systems and Processes  ITIL v3 ISO 2000024/7/365 COSC3. Trust Enablement technologyThe Global Trust Repository is the largest collection of reference images provided directly from the vendor and continuously updated. The GTR is a cloud service providing known-provenance whitelist measurements of commercially available and open source software. The measurements are obtained via direct partnerships with many software vendors covering a broad range of operating systems, device drivers, third-party applications, and many other types of data representing the desired state of systems comprising IT business services. The GTR statistics as of June 2011:Current Product Count ~760,000Number of Vendors over 2,000+Microsoft Windows Platform Count ~100,000 packagesUnique Signature Count over 2.8 billion +Growing at ~5 million Signatures / DayThe Enterprise Trust Server (ETS) continuously monitors all active computing devices (network devices, servers, etc.) in the IT infrastructure, comparing the signatures for all the software and firmware installed in the devices to their reference configuration to the applicable signatures in the GTR and performs change detection to provide alerts of any unauthorized, unintended, or malicious, changes to the environment.“We’re not building a better network ‘mousetrap’. We’re creating a new cyber delivery model for business and government enterprises.”…..…..The industry’s first enterprise-grade, high-assurance cloud computing solution
  • #30: This slide is designed to be an opening or closing slide. This will allow the presenter to have a presentation cued up in slideshow mode without being on the title slide. The audience can take their seats, leave, or have open discussion with this slide up.
  • #35: BMC CLM provides the foundation for cloud operations. CLM ensures that services run on the cloud can be managed and monitored against service level agreements.Key Cloud Ops features:1. Automatically install, deploy, and configure monitoring as part of CLM installation2. Guided monitoring configuration in CLM Planner3. Intelligent policy-based placement and ongoing operations with the industry’s first Service Governor4. Support for heterogeneity, from physical to virtual, multi-hypervisor, public cloud integrations and more5. Easy-to-use cloud administration and user self-service portal6. Ongoing operations with integrated ITIL operational processes, performance and capacity management Lets take a closer look at CLM. (try to tie these features to what the customer cares about)Industry-first Service Governor – for policy-based placement and ongoing managementIndustry-first multi-tier configurable Service Blueprints – for design and provisioning of cloud services, from functional model to configurable options to deployment modelsEntirely new architecture – creating the foundation for multi-datacenter and cloud-scaling applicationsEnhanced cloud administration – for both cloud service design and resource on-boarding and managementEnhanced My Services portal for request and management of cloud servicesIntegrated performance monitoring of resources and cloud servicesExpanded multi-platform support – Citrix XenServer, NetApp storage, Amazon EC2, and OVF importTighter integration with BSM portfolio – CMDB, SRM and ITSMSouthbound and northbound APIs for integrations with portals and additional resource sourcesAnd… NEW Capacity Management integrations!If the customer has existing BMC technologies, this would be a good time to highlight the role of those solutions in this cloud environment.If not, this is a time to emphasize that this is an integrated, end to end solution
  • #38: To ensure service levels are met, Operations must ensure the availability and performance of mission critical applications running in increasingly complex, hybrid data centers – to include enterprise, SaaS, and cloud applications. Where there is continuous change due to virtualization and cloud technologies, as well as business directives to rapidly deploy new features or applications, it’s critical to proactively monitor and assess the end user experience for critical user scenarios, and to assess the impact application and infrastructure changes may have on end user performance. You need the ability to actively monitor the end-user experience to establish a normal baseline of performance over time, so that you can quickly determine when changes adversely impact performance. BMC End User Experience Mgmt (EUEM) provides both real and synthetic end user monitoring. Real User Experience – The solution monitors real user performance and behavior in real-time, providing insight into how, from where, and when users access the application so that you can be aware of and effectively manage fluctuating user demands. Synthetic – The solution deploys a software ‘robot’, physically located at or near a service consumer population center or end-user site, which periodically runs simple interactive scripts (i.e., "synthetic transactions") against the application interface and records simple statistics, such as availability, response time, and accuracy. These transactions establish a performance baseline for critical transaction flows so that you can evaluate performance over time and quickly assess the impact of application changes on the performance of those key transactions.Thomson Reuters - Quickly interrogated TrueSight’s stored transaction data and drilled down to identify the root cause, well ahead of calls coming to the help deskFull set of widgetsReal-time gauges, A/B bar graphs, etcManage on aggregate, by location, by delivery network, by audience or by user. User-defined dashboardsFocus vertical (application) or horizontal (load)Import web contentSecure export to external portals
  • #39: In the world of hybrid clouds, it’s not enough to simply manage performance within the datacenter. It’s critical to understand and manage the end-user’s experience with services that are provisioned to the public cloud. BMC ProactiveNet Performance Management can run in the data center, in a private cloud, or in the public cloud and provides a single pane of glass to manage the performance of business services coming from outside-in or inside-out.
  • #41: Self-explanatorySpend some time highlighting the challenges in your customer’s IT environment – or in other customers you’ve seen. This is a chance to make this a personal discussion and open up any issues they might be experiencing
  • #42: With real-time global dashboards, you can quickly assess user impact -- you can determine where users are coming from when they access your application, and where any problems are occurring right now