It’s Wednesday, time for the new episode of Engineers Unplugged, and this is a great one. Watch as EMC’s Brian Gracely (@bgracely) and NexusIS’s Colin McNamara (@colinmacnamara) discuss the trends in converged and hyperconverged infractructure.
Welcome to Engineers Unplugged, where technologists talk to each other the way they know best, with a whiteboard. The rules are simple:
Episodes will publish weekly (or as close to it as we can manage)
Return on investment has been around for ages, but the meaning of ROI is taking a spin in today’s business world. Companies are no longer purchasing solutions for technology improvement; they are investing in better industry processes as a whole. In return, they can achieve positive cash flows.
Concentra, a national healthcare company, provides a perfect example. With an outdated data center, the company had exhausted their power and cooling resources and was in need of reconstruction.
Concentra did some research and discovered that, by significantly investing in revamping their IT infrastructure, not only could they dramatically improve efficiencies and performance, but they could also create a positive cash flow for the company.
Furthermore, implementation doesn’t have to be risky. Concentra’s Senior Vice President and CIO, Suzanne Kosub, says, “With the right planning and financial analysis, we were able to show exactly how much the project would cost, how long it would take to pay for itself, and what the company would gain moving forward.”
Migrating mission-critical applications have known benefits, which are often accorded significant attention -- and for good reason. But what’s left unsaid is how the process is successfully carried out.
Application migration can be fearful – poor execution could result in unexpected and detrimental IT issues, which may negatively impact service levels for the entire company. But simply avoiding a migration is not solving the problem, either. More than likely, you will have to face an application migration at some point, due to poor application performance, outdated technology, or compromised architecture. This is when it becomes crucial to consult the right technology, and the right people.
Cisco provides a framework to help you understand the process of undergoing a data center transformation. In the Cisco® Domain Ten Framework, Cisco Services outlines information such as network standards, management procedures, security, and outsourcing options -- just to name a few.
The Cisco Domain Ten Framework will guide you through the most important aspects of the migration process, and what you should expect. You will gain insight into your environment that will enable you to predict whether your migration will be successful, and how to best execute the transformation – whether you are working with a virtualized, automated, or full cloud environment.
CSC’s portfolio of cloud solutions has quadrupled along with the global customer base. It’s unique offering, BizCloud, saves months and millions of dollars over the other “do it yourself” private clouds.
What’s the secret behind this success?
A unique cloud-business model
Take the best elements of a public cloud – scalability and convenience, combine with the security of a private cloud. Add a best-in-class infrastructure-as-a-service layer. Top it off with a menu of cloud services options. Then bill as a service from a standard rate card and include a pay-as-you-go plan.
What do you get? A unique solution that CSC calls BizCloud.
BizCloud delivers the security and exclusivity of a private cloud with elasticity and a pay-as-you-go rate structure.
Differentiation through automation
You might wonder, how did CSC circumvent the time consuming and costly business of managing a cloud environment? The answer is: better automation.
“The Cisco Intelligent Automation solution is also used by Cisco IT, and when we saw how Cisco uses its own cloud automation product, we were encouraged. It will be an essential component of our long-term reference architecture for the enterprise cloud,” says Eli Almog, CTO for Cloud, CSC
In this last part of this series I will discuss the top customer priority of visibility. Cisco offers customers the ability to gain insight into what’s happening in their network and, at the same time, maintain compliance and business operations.
But before we dive into that let’s do a recap of part two of our series on Cisco’s Secure Data Center Strategy on threat defense. In summary, Cisco understands that to prevent threats both internally and externally it’s not a permit or deny of data, but rather that data needs deeper inspection. Cisco offers two leading platforms that work with the ASA 5585-X Series Adaptive Security Appliance to protect the data center and they are the new IPS 4500 Series Sensor platform for high data rate environments and the ASA CX Context Aware Security for application control. To learn more go to part 2 here.
As customers move from the physical to virtual to cloud data centers, a challenge heard over is over is that they desire to maintain their compliance, security, and policies across these varying instantiations of their data center. In other words, they want to same controls in the physical world present in the virtual – one policy, one set of security capabilities. This will maintain compliance, overall security and ease business operations.
By offering better visibility into users, their devices, applications and access controls this not only helps with maintaining compliance but also deal with the threat defense requirements in our overall data center. Cisco’s visibility tools gives our customers the insight they need to make decisions about who gets access to what kinds of information, where segmentation is needed, what are the boundaries in your data center, whether these boundaries are physical or virtual and the ability to do the right level of policy orchestration to maintain compliance and the overall security posture. These tools have been grouped into three key areas: management and reporting, insights, and policy orchestration.