Cisco Blogs


Cisco Blog > Data Center and Cloud

So many workloads and so many clouds ….

 

Recently, I had the opportunity to join a discussion regarding the #FutureOfCloud in the #InnovateThink  Tweet Chat. One of the questions that came up revolved around the process typically used to associate a workload with a specific cloud deployment model. That is an important question and top of mind whenever we speak with customers.

One of the most appealing qualities of the cloud is the variety of ways in which it can be delivered and consumed. A successful cloud strategy will let you take advantage of a full range of consumption models for cloud services to meet your specific business needs. In reality, when we think about it, the process is very similar to what any company in virtually any industry goes through when shaping its business strategy. For each area of the business, inevitably the question arises: Build, Buy or Partner?

Build versus Buy

When formulating their sourcing strategies, IT organizations repeatedly face very similar service-by-service, “build-versus-buy” decisions. The predisposition of IT organizations is to create and build IT services on their own. That is what many IT professionals want to do … create new services, invent ‘new things’. And that may very well be the best option. However, many customers also realize that it is often beneficial to adopt best-in-class capabilities to remain competitive even if this requires outsourcing select portions of the IT value chain. Hence the emerging role of IT as a broker of IT services that we discussed in the past (for more information please visit our web site.) And this requires a paradigm shift for many IT organizations.

Solving the ‘Equation’

To solve the “build versus buy” equation when sourcing their IT services, IT needs to evaluate cost, risk, and agility requirements to determine the best strategy for their business. IT needs a plan and a set of governance principles to evaluate each service based on its strategic profile. A collaborative approach between business and IT is also required. For example: Is the service core to the business? What is the business value associated with it (e.g., strategic importance, sustainable differentiation it can provide, time to market requirements etc..)? What are the cost implications (CapEx vs OpEx), risk profile, security, SLAs, data privacy and regulatory compliance requirements?  And … do you have the expertise to plan, build and manage the new IT service while meeting the expectations of your business counterparts?

Hybrid Cloud Rapidly Emerging as the New ‘Normal’

Not surprisingly, my experience when talking to customers that operate in regulated industries or that are concerned about security -- and the privacy of their data more specifically – is that they tend to favor private cloud deployments. For example, I was talking to a compliance manager part of a global financial institution and as soon as I uttered ‘public cloud’ his reaction was quite predictable …. He shook his head, got serious and quipped “Public cloud … I do not think so …” Real or perceived, security concerns remain top of mind and a major barrier to cloud adoption, and this is validated by market research data.

Hybrid Cloud

The predictability of the application with respect to resource consumption is also a factor. Applications that have high elasticity requirements are well positioned to benefit from the economics, agility and scale that public clouds can offer. Infrastructure capacity planning and optimization is a big task for most IT organizations. Having the ability to burst into the public cloud represents an appealing option. This is also why ultimately hybrid cloud is becoming the new normal, and results of the 2014 North Bridge Future of Cloud Computing Survey supports that view.

2014 Future of Cloud Annual Survey Results - Source Gigaom

2014 Future of Cloud Computing - Annual Survey Results

The Power of Choice

Arguably the most important thing your IT organization can do is to diversify its choice of cloud providers ….. Simply because without choice you really do not have a strategy …. And no contingency plans to go along with it ….

What do you think?

Additional Resources:

 

 

Tags: , , , , , , , ,

Get Started on SDN and Cisco ONE: Learn from Our New Technical White Paper

February 14, 2014 at 11:26 am PST

If you were to believe the industry press, you could easily be forgiven for thinking that many companies across the world were rolling software defined networking (SDN) technologies into their networks today.  I’m part of Cisco’s Services team and my colleagues across the world are the experts in helping you all design and deploy networks.  If there is a large or complex leading (or bleeding!) edge network out there being designed, you can place a safe bet that someone from the Cisco Services team is involved helping our customers achieve their targets.  If you’re involved in deploying any type of high technology equipment, you’ll appreciate that there is a world of difference between selling, demoing, and actually making it all work in your environment when it comes to new technology. Our team are in the latter camp.

So what are our consultants telling me about SDN in the real world?  Excluding a few notable high profile cases (usually involving hyper-scale data centers) they are not seeing -- as yet, to be honest -- many early deployments.  However they are seeing a growing number of customers interest in learning about and evaluating SDN related technologies -- including Cisco ONE, NFV and in particular Application Centric Infrastructure (ACI).  And they are providing some early feedback on the use cases of SDN that customers are most interested in.  They are all clear, however, on this point: this is the time to learn what SDN and Cisco ONE can do for your network in the future.

So how do you get started in SDN?  Let me outline 5 key steps to help you get started.  I’ll also point you to a technical white paper written by Mitch Mitchiner and Reema Prasad, two of our Customer Solutions Architects in Cisco Services, two of our experts responsible for making all of this work for you, your team and your business.  I also recommend you check out the video link I’ve provided, for an excellent live demo of Cisco ONE technology, first presented at Cisco Live last year.  This video gives a live demo of latency-based routing, one of the use cases described in Mitch and Reema’s paper.

Read More »

Tags: , , , , , , , , ,

Securing Cloud Transformation through Cisco Domain Ten Framework v2.0

Businesses of all sizes are looking for Cloud solutions to solve some of their biggest business and technology challenges—reducing costs, creating new levels of efficiency, transform to create agile environment and facilitate innovative business models. Along with the promise of Cloud comes top concern for Security. With rise of applications, transactions and data in the Cloud, business are losing control and have less visibility on who and what is moving in and out of the business boundaries. 

Any  transformation initiative with Cloud, whether a private, hybrid or public, with early focus on security from architecture, governance, risks, threats and compliance perspective can enable the business with a compelling return on investment with a faster time to business value – regardless of geographic, industry vertical, operational diversity or regulatory needs.

Here, I would like to bring to your attention on Cisco Domain Ten framework v2.0 and my blog on What’s New in Cisco Domain Ten Framework 2.0 that is born from Cisco’s hard won experience of deploying both private, hybrid and public Cloud environments, Cisco has developed the Cisco Domain Ten framework and capabilities to help customers accelerate IT transformation.

The Cisco Domain Ten does not prescribe that customers must build each domain into their strategy – rather it provides guidance on what aspects should be considered, what impacts should be identified, and what relationships exist between domains.  Cisco Domain Ten framework 2.0, we can establish the foundation of a true IT transformation and the factors you need to consider for success. Key is to identify, establish and track strategic, operational and technological outcomes for IT transformation initiates. A major thrust of the Cisco Domain Ten is to help customers strategize for transformation vision, standardize their technology components and operational procedures, and automate their management challenges, to deliver on the potential of IT Transformation– covering Internet, Branch, Campus and Data Center environments.

Security consistently tops CIO’s list of cloud concerns. The security domain highlights identification of security and compliance requirements, along with an assessment of current vulnerabilities and deviations from security best practices for multisite, multitenant physical and virtual environments for one’s IT transformation vision.

Security should be a major consideration in any IT transformation strategy. The architecture should be designed and developed with security for applications, network, mobile devices, data, and transactions across on-premise and off-premise solutions. Moreover, security considerations for people, process, tools, and compliance needs should be assessed by experts who understand how to incorporate security and compliance safeguards into complex IT transformation initiatives.

Security is an integral part of the Cisco Domain Ten framework, applies to all ten domains, and provides guidance to customers on all security aspects that they needs. Our Senior Architect from Security Practice – Ahmed Abro articulates well in Figure – 1 Cisco Domain Ten Framework with Security Overlay that there are security considerations for all ten domains for Cloud solutions.

 d10secoverlay

Figure – 1 Cisco Domain Ten with Security Overlay

Now that we understand how Cisco’s Domain Ten Overlay approach that helps one to discuss security for each domain of Cisco Domain Ten Framework, let’s now talk about the how Cisco Domain Ten aligns with Cloud Security Alliance’s (CSA) Cloud Control Matrix to discuss the completeness and depth of the approach.

CSA Cloud Control Matrix Alignment with Cisco Domain Ten

Application & Interface Security

  • D-8 – Application

Audit Assurance & Compliance

  • D-10 – Organization, Governance, processes

Business Continuity Mgmt & Op Resilience

  • D10 – Organization, Governance, processes

Change Control & Configuration Management

  • D10 – Organization, Governance, processes and
  • D-3 – Automation

Data Security & Information Lifecycle Mgmt

  • D-9 – Security and Compliance

Datacenter Security Encryption & Key Management

  • D-9 – Security and Compliance and
  • D-1 – Infrastructure

Governance & Risk Management

  • D10 – Organization, Governance, processes

Human Resources Security

  • D10 – Organization, Governance, processes

Identity & Access Management

  • D-4 -- Customer Interface

Infrastructure & Virtualization

  • D-1 – Infrastructure and Environment and
  • D-2 – Abstraction and Virtualization

Interoperability & Portability

  • D-7 – Platform and
  • D-8 – Application

Mobile Security

  • D-8 – Application and
  • D-1 – Infrastructure and Environment

Sec. Incident Mgmt , E-Disc & Cloud Forensics

  • D-9 – Security and Compliance and
  • D10 – Organization, Governance, processes

Supply Chain Mgmt, Transparency & Accountability

  • D10 – Organization, Governance, processes
Threat & Vulnerability Management
  • D-9 – Security and Compliance

 Table – 1 CSA Cloud Control Matrix Alignment

with Cisco Domain Ten Framework

From above table, one can see that Cloud Security Alliance Cloud Control Matrix and Cisco Domain Ten aligns well and it also highlights key facts that many areas such as Mobile security requires one to focus on Application and Infrastructure (network, virtual servers), etc to address security needs. One should also note that Cisco Domain Ten’s focus on Catalog (Domain 5) & Financials (Domain 6) that highlights security specific SLA and assurance discussions for security controls.

Now that that we discussed, Cisco Domain Ten approach for Security, In the next blog, I would try to discuss how Cisco Service’s focus on the strategy, structure, people, process, and system requirements for Security can help business address an increasingly hostile threat environment and help successful migration to Secure Cloud based transformation. We will also discuss current questions in business asks or should ask to understand security and privacy in the vendor’s agreements.

 

Tags: , , , , , , , , , , , , , , , , , , , , , ,

IT’s New Role in Strategic Cloud Services

As cloud-enabled services transform IT departments everywhere, your path to success as an IT professional was made easier today with Cisco’s announcement to expand its cloud portfolio. With Cisco’s comprehensive cloud portfolio offerings, you can easily and securely combine workloads to manage cloud services across different clouds. By increasing your flexibility for strategic sourcing of cloud-enabled IT services, you can increase your influence as a trusted business partner to your stakeholders. And, as you take on these new strategic roles, Cisco and our channel partners can help you and your organization gain control of cloud services.

While defining and deploying a comprehensive cloud architecture presents tremendous opportunity for IT chiefs, this task is not without its challenges. Successful cloud implementation requires a cloud governance model fueled by strategic vision and a holistic approach that addresses all aspects of your data center and IT operations in the new application economy fueled by cloud.

ScottClark

Cisco: Cloud, ACI and the Application Economy

Following on the heels of our launch last fall of Application Centric Infrastructure, our enhanced Cisco Services for cloud portfolio provides strategic assistance to transition to a cloud governance model within your organization based on business outcomes. With our solutions spanning the plan, build, manage, and go-to-market phases of the cloud project lifecycle, Cisco Services has been recognized as an industry leader in cloud services by both IDC and Forrester.

Read More »

Tags: , , , , , , , , ,

The Quickest Way To Get Started with ACI

November 19, 2013 at 10:26 am PST

By now, given all the launch and blogging activity activity over the past week or so, I am sure your understanding of and interest in Application Centric Infrastructure (ACI) will have grown.   Many of you will be asking “how do I get started as quickly as possible?”, and “how can I free up some time and resources to investigate?”  You understand the “what” - now, as I blogged recently on SDN, it’s time to understand more about the “why” and take action on the “how”.   How then do you get off that start line as quickly as possible?

Get Set To Go With ACI

Get Set To Go With ACI

As with many things in life, it helps if you get help from someone who has “been there” and “done that”.  And that’s where Cisco Services comes in, as Scott Clark, the VP for our Data Center Services team, introduced  last week.  So let’s talk about why Cisco Services should be your partner in this application centric world, and what services can help you.

Read More »

Tags: , , , , , , , , ,