Cisco Blogs
Share
tweet

How Do You Plan for 2011 – Part 2: Think Outside the Box about Cloud

- January 14, 2011 - 0 Comments

In my previous post on virtualization, I discussed the potential to make greater use of this technology beyond just better server utilization. If you have already done a lot of virtualization projects, you would likely agree that eventually virtualization alone is not enough. Read this interesting story to see how a tech company reached this conclusion based on their multi-year experience with virtualization. The next stage, from an IT architectural perspective, is to incorporate automation, elasticity and governing to deliver on-demand and pay-per-use computing services. As you guessed it, we are talking about cloud computing here.

Much has been written to describe the business advantages, various service types (SaaS, PaaS and IaaS, to name a few common ones) and deployment models (public, private and hybrid) about cloud computing. But, where do you start to plan for cloud?

Cloud computing is not a simple collection or allocation of resources.  It will require new thinking on the way you run business – how you support your end users, how you deploy your applications and how you protect your sensitive data.  For example, traditionally, some of the most powerful security controls are network-centric (ACLs and Firewalls) and host-centric (file system permissions). With cloud computing, these controls are still needed but may not be sufficient, because your boundaries are no longer defined by your networks or your physical machines. Logical controls based on customer information and runtime data will become more critical. Such logical controls provide safeguards for you, when you share with others the same cloud and the same underlying infrastructure while your sensitive data remains securely separated in the cloud.

The Cisco Virtual Security Gateway helps you implement zone-based security policies, which include logic controls based on customer attributes and run time information such as virtual machine attributes.

Begin planning for cloud this year by examining how your business processes will be impacted when you adopt private or public cloud computing.

Tags:
Leave a comment

We'd love to hear from you! To earn points and badges for participating in the conversation, join Cisco Social Rewards. Your comment(s) will appear instantly on the live site. Spam, promotional and derogatory comments will be removed.

In an effort to keep conversations fresh, Cisco Blogs closes comments after 60 days. Please visit the Cisco Blogs hub page for the latest content.

Share
tweet