Smashing the Barriers to g Adoption of Enterprise Cloud Computing

Smashing
g the Barriers to
Adoption of Enterprise Cloud
Computing
Jason P. Noel
Vice President
Gl b l Customer
Global
C
Ad i
Advisory
February 2009
What’s
What
s Driving IT to a New Approach?
Market Forces
Business Forces
• The Economy
• Defer and avoid costs
• Anytime, anywhere IT
• Fix the IT bottleneck
• IT as strategic enabler
• Tectonic shift in
technology
CLOUD
COMPUTING
• Map supply and
demand more
effectively
• De-capitalize IT
• The Environment
(Green)
• Automate
A t
t Operations
O
ti
Perceived barriers to a new approach
Public Cloud
Private Cloud
• Security
• Existing investments
• Compliance
• Labor intensive, steep learning curve
• Application Rewrites
• Skeptical about results
© 2009 Unisys Corporation. All rights reserved.
Page 2
What is Cloud Computing?
Cloud computing is an approach that enables organizations to leverage
scalable,
l bl elastic
l ti and
d secure resources as services
i
with
ith the
th expected
t d
results of simplified operations, significant savings in cost and nearly
instant provisioning.
The key attributes “usually” associated with Cloud Computing
1. Multi-tenant – the ability to process the needs of multiple users with shared resources in a
dynamic and transparent fashion
2. Elastic and Scalable – resources can expand and contract as needed
3. Metered/Rented – some manner of “pay for only what you use”
4. Self-Provisioned – “self check-in” at least to some degree
5. Internet based – accessible using internet technology, usually over the public Internet
6. X as a Service – the details/concerns of implementation are abstracted for the customer
The seventh attribute sets Secure cloud computing apart
7. Secure – an overall decrease in risk due to greater security protocols and tools from the cloud
provider for data in motion, data at rest and data in process.
© 2009 Unisys Corporation. All rights reserved
Page 3
Why the Sudden Interest?
Gartner’s 10 Strategic Technologies for 2009
1.
2.
3.
4.
5.
6.
7
7.
8.
9.
10.
Virtualization (Ranked No. 5 last year)
Cloud computing
(New to the list)
Computing fabrics (No. 8 last year)
Web-oriented architecture (New but similar to “the Web platform” No. 7 last year)
Enterprise mashups (No. 6 last year)
Specialized systems (New to the list)
Social software and social networking (No.
(N 10 llastt year))
Unified communications
Business intelligence (New)
Green IT ((No. 1 last yyear))
Cloud Computing is generating significant interest due to the confluence of
emerging Cloudware technology and the drive to minimize additional capital
expenditures on data centers and infrastructure
Gartner Identifies the Top 10 Strategic Technologies for 2009: http://www.gartner.com/it/page.jsp?id=777212
Gartner Identifies the Top 10 Strategic Technologies for 2008: http://www.gartner.com/it/page.jsp?id=530109
© 2009 Unisys Corporation. All rights reserved
Page 4
The Key Business Driver for Cloud
Agility
Extreme
Automation
Self-service
capability
© 2009 Unisys Corporation. All rights reserved
Ready-to-go
Page 5
The Financial Benefits of Cloud Go
Beyond Capital Expenditure
Financial
Perspective
Traditional Data Center
Cloud Computing
Expenditure type
Capital expenditure (capex)
Operating expense (opex)
Operating expense (opex)
Cash flow
Servers and software are
purchased upfront
Payments are made as the
service is provided.
Financial risk
Entire financial risk is taken
upfront,
f t with
ith uncertain
t i
return.
Financial risk is taken
monthly
thl and
d iis matched
t h d tto
return.
Income statement Maintenance and
depreciated capital
expense
Balance sheet
Software and hardware are
carried as a long-term
capital asset.
asset
Maintenance expense only
Nothing appears on the
balance sheet.
Source: Forrester Research, “Talking To Your CFO About Cloud Computing”, October 29, 2008
© 2009 Unisys Corporation. All rights reserved
Page 6
How Cloud is Typically Used Today
This is relative, not definitive positioning
Cl d
Cloud
T diti
Traditional
l
HIGH
Mail and
Collaboration
Conventional
C
ti
l business
b i
applications with:
Document
Management
Financials
a cas
and
Planning
• Patient Data
Analytics
and
Reporting
S
Security
it
Requirements
• Employee Information
• Financial Information
• Customer Information
Web
DR
Mission
Critical/
OLTP
• Government
S ft
Software
Development/
Test
LOW
Routine
Applications
Business
Applications
© 2009 Unisys Corporation. All rights reserved
Critical
Applications
Page 7
Survey #1: What is Your Greatest Concern
About Moving Workloads to the Cloud?
72% cited SECURITY concerns
34% selected Integration issues
14% cited TCO
8% none of the above
TCO
NONE
INTEGRATION
SECURITY
Results from 90 respondents,
Unisys online survey taken 25 June 2009
2009, Webinar - Cloud Computing Security: Protecting your Data in the Cloud
More than one choice selected thus total exceeds 100%
© 2009 Unisys Corporation. All rights reserved
Page 8
Survey #2: What Do You See as Your
Greatest Barrier to Moving to Cloud?
51% cited SECURITY/Data Privacy concerns
21% selected Integration of cloud
cloud-based
based applications with existing systems
18% cited Bring systems back in-house
10% selected Regulatory/Compliance issues
REGULATORY/COMPLIANCE
BACK IN-HOUSE
INTEGRATION
SECURITY/DATA
PRIVACY
Results from 312 respondents,
Unisys press release
release, “Unisys
Unisys Poll Shows Security Concerns as Leading Cause of User Hesitancy in Adopting Cloud
Computing”, September 15, 2009
© 2009 Unisys Corporation. All rights reserved
Page 9
Survey #3: What Concerns Do You Have
About Moving to the Cloud for IT Service?
83% cited SECURITY
9% selected What to put in the cloud
6% selected How to transform to the cloud
2% cited Internal or External cloud
WHAT
INTERNAL/EXTERNAL
HOW
SECURITY
Results from 272 respondents,
Unisys survey on sys-con
sys con.com;
com; results as of October 13
13, 2009
© 2009 Unisys Corporation. All rights reserved
Page 10
Security
y
is
© 2009 Unisys Corporation. All rights reserved
Page 11
Why Security is a Top Concern
Do you worry about
about…
• Securing your data outside your firewall?
Data Protection
and Privacy
• Unauthorized visibility to your data when in a
shared computing environment?
• Unintentional cloud administration errors?
– Providing unauthorized access/rights to others
– Causing your data to go to other organizations,
customers,
t
or competitors
tit
• Potential breech of the virtualization
hypervisor (i.e. virus)?
Compliance
• The cloud provider’s auditing procedures?
• The cloud provider’s ability to help you meet
your regulatory and compliance requirements?
What if these concerns were eliminated and your cloud was really
secure?
© 2009 Unisys Corporation. All rights reserved
Page 12
Secure + Private Clouds = More Options
This is relative, not definitive positioning
Secure Cloud
Traditional
Private Cloud
Cloud
HIGH
Mail and
Collaboration
Conventional business
applications with:
Document
Management
Financials
and
Planning
• Patient Data
Analytics
and
Reporting
S
Security
it
Requirements
• Employee Information
• Financial Information
• Customer Information
Web
DR
Mission
Critical/
OLTP
• Government
S ft
Software
Development/
Test
LOW
Routine
Applications
Business
Applications
© 2009 Unisys Corporation. All rights reserved
Critical
Applications
Page 13
Considerations to Weigh
This is relative, not definitive positioning
Secure Cloud
Traditional
Private Cloud
Cloud
HIGH
Mail and
Collaboration
Conventional business
applications with:
Risk Tolerance
Document
Management
Financials
and
Planning
• Patient Data
Analytics
and
Reporting
S
Security
it
Requirements
Web
S ft
Software
Development/
Test
• Employee Information
• Financial Information
Cyclical
Workloads
• Customer Information
DR
Mission
Critical/
OLTP
• Government
Payment Options
LOW
Routine
Applications
Business
Applications
© 2009 Unisys Corporation. All rights reserved
Critical
Applications
Page 14
Assessing the Transformation
1
Business Drivers
Modernize?
Existing Application?
2
Key Client
Considerations
Security &
Compliance?
Cyclical
Workloads?
Network
Latency?
Relative
Costs?
New Application?
Will My
Applications
Run?
Business
Continuity?
3
Client
Deployment
Options
Traditional IT
Private Cloud
© 2009 Unisys Corporation. All rights reserved
Public Cloud
Page 15
How is Unisys Tackling
E t
Enterprise
i Cloud???
Cl d???
© 2009 Unisys Corporation. All rights reserved
Page 16
Unisys Areas of Strength Play to a
New Approach to IT
Data Center
Transformation
and Outsourcing
End User Outsourcing
and Support Services
Security
Application
Modernization
and Outsourcing
We help you transform your data centers and make the right IT sourcing
decisions. We do this by leveraging our transformational services and
outsourcing capabilities to help you achieve maximum return, and make
your operations more agile, secure and efficient while lowering your overall
costs.
Anywhere, anytime secure support for your hardware and software needs with
Anywhere
measurable cost reductions, improved satisfaction and faster incident resolution. With
31 ITO Operations Centers with multi-language capabilities and global ITIL-based
Resolution Optimization Model, ISO-certified global logistics network and remote
infrastructure management with last mile delivery capabilities in over 100 countries.
Unisys has tackled some of the toughest security challenges in the world for both public
and private sector clients. We bring an holistic approach to security that spans digital
and physical environments, securing your people, places, assets and data.
Unisys Application Services helps you minimize the risk of change by anticipating
roadblocks while enabling better alignment to business needs – and creating an efficient
e ace be
between
ee you
your bus
business
ess a
and
d IT.
interface
© 2009 Unisys Corporation. All rights reserved
Page 17
Unisys Plan for Delivering Secure IT
Services in the Cloud
1
2
D
Data
C
Center T
Transformation
f
i
U i
Unisys
S
Secure Cl
Cloud
dS
Solution
l i
Delivering profound business results
through Data Center transformation
Extremely Secure Cloud Computing
Available now
Available now
Virtualization
Automation
Internal
Cloud
Cloud Transformation Services
Internal Cloud
External Cloud
4
3
Unisys Secure Private
Cloud Solution
All the advantages of Cloud Computing –
internally
Available December 2009
Optimized on + off premises
Hybrid Cloud
• Secure IaaS
• Secure PaaS
• Secure SaaS
• My Secure AaaS
• Secure DRaaS
Cloud security
powered by
Unisys Stealth
Combining the best of Internal and
External Cloud for maximum agility,
elasticity and security, at minimum cost
Available Q1 2010
© 2009 Unisys Corporation. All rights reserved
Page 18
Unisys Secure Cloud Solution:
Managed End
End-to-End
to End, Anytime
Anytime, Anywhere
Secure Infrastructure as a Service (IaaS)
• cc-RIM
RIM Service Desk & Server Management
• Provisioning virtual and physical servers, scale-up
or scale-out
Secure Platform as a Service (PaaS)
• One click selection of platform, web, application, and
database servers
• Automated middleware application management with
c-RIM Enterprise Management Service
• Sun Java™ stack
Secure Software as a Service (SaaS)
Secure Document Delivery Service
• Secured documents for electronic delivery directly into
clients’ e-mail inbox
Secure Unified Communication as a Service
• Cloud-based e-mail, SharePoint and Office
Communication Services
Secure Virtual Office as a Service
My
y Secure Application
pp
as a Service
• Provisioning and de-provisioning of your multitiered application on our PaaS platform
• Hosted desktop via Secure Cloud with centralized
control and management
Subscription based Pricing
Subscription-based
© 2009 Unisys Corporation. All rights reserved
Page 19
Unisys Secure Cloud Solution:
What’s
What
s New – November 2009
Secure Infrastructure as a Service (IaaS)
• cc-RIM
RIM Service Desk & Server Management
• Provisioning virtual and physical servers, scale-up
or scale-out
Secure Platform as a Service (PaaS)
• One click selection of platform, web, application, and
database servers
• Automated middleware application management with
c-RIM Enterprise Management Service
• Sun Java™ stack
Secure Software as a Service (SaaS)
Secure Document Delivery Service
• Secured documents for electronic delivery directly into
clients’ e-mail inbox
Secure Unified Communication as a Service
• Cloud-based e-mail, SharePoint and Office
Communication Services
• Microsoft stack: IIS web server
server, .Net
Net application
server, SQL Server
• Custom stacks (IBM WebSphere, Oracle, etc.)
Secure Virtual Office as a Service
My
y Secure Application
pp
as a Service
• Provisioning and de-provisioning of your multitiered application on our PaaS platform
• Hosted desktop via Secure Cloud with centralized
control and management
• Qualified client-supplied devices now supported
Secure Disaster Recovery as a Service
• Database replication: configure the secure cloud
environment as a Disaster Recovery Backup
© 2009 Unisys Corporation. All rights reserved
Page 20
Addressing Your Global Compliance
Requirements
Alingsas, SE
St Just,
Milton Keynes,
UK
Eagan, MN
Budapest, HU
Schipol, NL
Roseville, MN
Shanghai, China
Rochester, NY
Blue Bell, PA
Reston, VA
Salt Lake City, UT
Hong Kong
Austin, TX
Mexico City
Bogota
Bogota,
Columbia
Bangalore, India
Singapore
Milton,
Queensland
Australia
IT Outsourcing
Centers
Rio de Janeiro, Brazil
Auckland,
New Zealand
Perth Australia
Perth,
Global Cloud Center
Regional Cloud
Centers
C-RIM Centers
Sao Paulo, Brazil
Sandton, South Africa
Santiago,
g , Chile
© 2009 Unisys Corporation. All rights reserved
Rhodes,
Australia
Wellington,
New Zealand
Page 21
Comprehensive Security Enables You
to Confidently Make the Move
The Unisys
Difference
Security
S
it Best
B t
Practices
Operational
Maturity
Independently
Certified Security
Program
Independently
Audited and Certified
Services Centers
Patent-pending Stealth technology that allows private
communities of interest based on FIPS 140-2
140-2, 256-bit AES
AES*
encryption and cloaks the data with proprietary “bit splitting”.
Layered multi-vendor approach to security with Intrusion
Detection and Prevention Services (IDPS)
(IDPS), firewall management
management,
24x7 security monitoring, advanced correlation and analytics,
auditable logs…
Secure Cloud services team operates ISO 20000-certified
delivery processes that are ITIL V3-compliant.
Secure Cloud services are provided from ISO 27001-certified
27001 certified
delivery centers.
SAS-70
SAS
70 Type II-certified
II certified data centers.
*Advanced Encryption Standard
© 2009 Unisys Corporation. All rights reserved
Page 22
Securing Your Cloud:
Unisys Stealth Security
Unisys Stealth Solution for Network secures data-in-motion for LAN, WAN and wireless
networks – available now
• Stealth technology:
• “cloaks” data and devices from unauthorized access, e.g. sniffers
• secures data within client-defined community of interest
Stealth solution for storage secures SAN data-at-rest
data at rest – planned Q1 2010
• Stealth technology:
• goes beyond encryption, dispersing storage across virtual disk, local or remote
• secures data within client-defined community of interest
Benefits:
f
•
•
•
•
Protects the confidentiality and integrity of data-in-motion and data-at-rest
Eliminates the need to modify applications, or to web-enable them for the cloud
y deployed,
p y
dramatically
y simplifies
p
IT infrastructure, resulting
g in lower costs
Easily
Establishes verifiable chain of custody for your data
© 2009 Unisys Corporation. All rights reserved
Page 23
Today’s Challenges with
Securing a Cloud Service
Typical Cloud Facility
Client A
Cli t A
Client
Virtual Web Server
VPN/SSL
Network
Client B
Virtual Web Server
Client A
Virtual App Server
Client B
VPN/SSL
Network
Client B
Virtual App Server
Client A
Virtual DB Server
Must web-enable applications
Client B
Virtual DB Server
Bottom Line
SAN
• More expensive: For client and Cloud provider
• In-elastic: Unique solution for each application / client
Client A
Storage encryption
Client B
Storage encryption
• Impractical: Takes significant time and cost to set up and maintain
© 2009 Unisys Corporation. All rights reserved
Page 24
In Contrast:
Stealth Secures and Simplifies
Typical
Facility
UnisysCloud
Data Center
Stealth Protected
Stealth
Network
Appliance
Client A
Stealth
Network
Appliance
Client B
All data in blue is safe
Cli t A
Client
AVirtual
VirtualWeb
WebServer
Server
VPN/SSL
Network
Client
B Server
B Virtual
Web
Virtual Web Server
Client A
A Virtual App Server
Virtual App Server
Internet
VPN/SSL
Network
Client
B Server
B Virtual
App
Virtual App Server
Client A
Virtual
DBDB
Server
A Virtual
Server
Must
web-enable
applications
No need
to change
the application
Client B
B Virtual
Server
Virtual
DBDB
Server
Bottom Line
More expensive:
for less
clientexpensive,
and Cloud provider
• More
secure and
multi-tenant
•• In-elastic:
Unique solution and
for each
application
/ client
Simpler standardized,
Simpler,
standardized
much
more elastic
• Impractical: Takes significant time and cost to set up and maintain
SAN
Stealth
Storage
Appliance
SAN
Client A
Storage encryption
Client B
Storage encryption
Stealth Endpoint
© 2009 Unisys Corporation. All rights reserved
Page 25
Unisys Stealth Security Overview
©©
2009
Allrights
rights
reserved
2009Unisys
Unisys Corporation.
Corporation. All
reserved.
Page 26
Unisys Stealth Bit-Splitting Overview
©©
2009
Allrights
rights
reserved
2009Unisys
Unisys Corporation.
Corporation. All
reserved.
Page 27
Foundation for Building a
Cost-effective
Cost
effective Secure Cloud
Provide self-service access to software and server
provisioning
i i i and
d ITSM supportt
Secure Cloudware Stack
Security
Service
Management
g
Provisioning
Virtualization
Implement Stealth DIM
DIM* and DAR
DAR* security to provide
effective isolation
Implement robust ITIL-based service management
through
g automation
Fully automate provisioning (virtual, physical), configuration and
compliance management of virtual software and “personas”
Fully
F
ll virtualize
i t li th
the server and
d storage
t
resources tto provide
id
flexibility and scalability
A server/storage farm populated with both scale-up and
scale-out servers.
*Data in Motion (DIM); Data at Rest (DAR)
© 2009 Unisys Corporation. All rights reserved
Page 28
A Secure Stack for Multi-Tiered Applications:
Dynamic Scalability,
Scalability Rapid Repurposing
Repurposing, and Process Automation
Provide self-service access to software and server
provisioning
i i i and
d ITSM supportt
Secure Cloudware Stack
Security
Service
Management
g
Provisioning
Virtualization
Unisys Stealth Solution for Network
Unisys Stealth solution for storage
Unisys Converged Remote Infrastructure Management (C-RIM);
Unisys uChargeback™software; Unisys uGovern™ software*
Unisys uOrchestrate™ software; predefined Runbooks.
Unisys uProvision™ software
VMware®, Windows®
Unisys uAdapt™ software
Unisys Enterprise Servers using Intel® Xeon® 7400 series
processors, EMC® storage, etc.
*Available Q1 2010
© 2009 Unisys Corporation. All rights reserved
Page 29
What is Private Cloud Computing?
Cloud computing is an approach that enables organizations to leverage scalable,
elastic and secure resources as services with the expected results of simplified
operations, significant savings in cost and nearly instant provisioning.
The key attributes “usually” associated with Cloud Computing
1
1.
2.
3.
4.
5.
6.
Multi tenant – the ability to process the needs of multiple users with shared resources in a dynamic and transparent fashion
Multi-tenant
Elastic and Scalable – resources can expand and contract as needed
Metered/Rented – some manner of “pay for only what you use”
Self-Provisioned – “self check-in” at least to some degree
Internet based – accessible using internet technology, usually over the public Internet
X as a Service – the details/concerns of implementation are abstracted for the customer
A seventh
th attribute
tt ib t sets
t Secure
S
cloud
l d computing
ti
apartt
7.
Secure – an overall decrease in risk due to greater security protocols and tools from the cloud provider for data in
motion, data at rest and data in process.
Private cloud computing delivers self-provisioned and automated IT
capabilities as services to internal users on an immediate and
as-needed basis.
© 2009 Unisys Corporation. All rights reserved
Page 30
Unisys Secure Cloud Solution Now
Available for the Private Cloud
Self-service p
portal speeds
p
provisioning
p
g
Secure Cloudware Stack
Security
Optional Stealth security solution provides effective
effective,
multi-tenant isolation
Service
Management
g
Greatest number of management options – in-house or
by Unisys – enabling visibility to your Cloud resources
Provisioning
Virtualization
Fully automated provisioning frees up IT resources
Fully
F
ll virtualizes
i t li
th
the server and
d storage
t
resources to
t provide
id
flexibility and scalability
A server/storage farm populated with both scale-up and scale-out servers:
clients or Unisys.
© 2009 Unisys Corporation. All rights reserved
Page 31
Unisys Secure Private Cloud Solution
Innovation for Your Internal Data Centers
Self-Service
Portal
Secure Cloudware Stack
Benefits
• Automated Provisioning
Security
• Metering & Usage
Service
Management
Unisys
U
sysg Secu
Secure
e
c-RIM or
BMC Remedy
Option
• Service Management
and
a
d Operations
Ope at o s
Private Cloud
Provisioning
Appliance
Virtualization
Service Desk
Your Cloud Infrastructure
Your qualified
Y
lifi d assets
t or U
Unisys
i
h
hardware
d
(I S & PaaS)
(IaaS
P S)
Virtualized & Non-Virtualized / Scale Up & Scale Out
© 2009 Unisys Corporation. All rights reserved
Page 32
Unisys “Walks
Walks the Walk
Walk”
Request Type
Server & Desktop
Virtualization
# per
Year
~700/
`200
Before
Provisioning
Time
10+ Days
After
Provisioning
Time
Before
Resources
After
Resources
5 minutes
3 with projection
of doubling
every year
95% of requests
require 0 people
resources, other
5% is 2 Offshore
2 Offshore
5 with flat future
head count
Standard Physical
Configurations
~250
15+ Days
20 minutes
9 with projection
of doubling next
year
Custom Physical
Configurations
~200
20+ Days
2-3 days
Same resources
as above
© 2009 Unisys Corporation. All rights reserved
Page 33
Taking Your First Step into the Cloud
Advisory and
Assessment Services
Planning and
Design Services
Implementation
Services
Advisory
y and Assessment
Migration
Services
• Understand
implications that cloud
might
have
• Create awareness
• Create design
for
•strategic
Deploy and
• Migrate
and
the transformed
configure cloud
consolidate
for your business.
• Analyze feasibility
infrastructure
technologies
applications on cloud
• Create business case
Explore
alternatives
such
as
internal
or
private,
external
•
including
infrastructure
• Integrate
I t
t existing
i ti
and value model
St t i technologies,
Strategic
or public, or hybrid
clouds and
might gain
infrastructure
withhow a client
• Transform
existing
• Create alignment with
value from internally
optimizing
their
processes
and
operations, and
cloud
infrastructure into
current technology,
security
infrastructure
based
on
the
Unisys
vision
for a infrastructure
Real-Time
cloud
• Integrate operations
operations, and
Infrastructure with
(RTI).
• Develop
cloud
security
transformation plans
(
(e.g.
c-RIM)
RIM)
• Fast track the
for infrastructure
adoption
deployment •and
Examines the characteristics of business services that
• Identify candidate
application migration
have sub-components with the potential to be moved to the
transformation
areas
Cloud
Feasibility
cloud, and what positive impacts would be realized.
based on application
& Workload
workload Assessment
• Assesses the readiness of the client’s infrastructure to
support the consumption of a cloud IT delivery model.
© 2009 Unisys Corporation. All rights reserved
Page 34
Balance Efficiency and Effectiveness
The Performance Zone
IT Waste And
Overspending
p
g
Point Solution
Delivery
Silo Delivery
Missed Business
Expectations
© 2009 Unisys Corporation. All rights reserved
Page 35
Standardized Infrastructure Footprints
The Current Environment
• Many Current Datacenters
are built
b ilt around
d th
the conceptt
of standardizing 3 levels of
infrastructure footprints
– This leads to missed SLAs
Wasted
andInternal
Wasted
CloudResources.
Resources
Missed SLAs
Current Datacenter
Small, Medium,
and Large
Standardized
Unisys
Infrastructure
Architecture
A
hit t
Footprints
Unisys
Patterns
Workload
Patterns
Application
Workloads
• Since all of the resources
are co-located in the
datacenter the connections
are also standardized
standardized.
External Cloud
© 2009 Unisys Corporation. All rights reserved
Page 36
Fit-for-Purpose℠ Design
Understanding Workloads
Service Levels and Work
Infrastructure
Services
Workload Types
Missed Expectations & Resource Waste
Service Executed / Waste Minimized
• Workloads fit in to a
number of architectural
patterns. Each pattern has
optimized hardware and
software
ft
solutions
l ti
th
thatt
support it.
• Running solutions on
optimized hardware allows
for optimal costs,
increased consumer
experience,
i
and
d minimal
i i l
resource waste.
© 2009 Unisys Corporation. All rights reserved
Page 37
Transforming the Delivery Model
Identifying Workloads
• Identification of workloads needs to
come from an understanding of the
business.
Business Value Chain
– Break the Business in to its Value Chain
Functions and Sub-Functions.
– Understand the workloads that each
Sub-Function utilizes to be effective.
Business Intelligence
ETL
Processing
Campaign
Management
– Model these workloads and the
requirements placed on them.
© 2009 Unisys Corporation. All rights reserved
Page 38
Legacy Approach
IT Waste & Overspending
Result
© 2009 Unisys Corporation. All rights reserved
Page 39
Demand Driven Approach
Fit for Purpose℠ Tailored Infrastructure Services
Fit-for-Purpose℠
Result
© 2009 Unisys Corporation. All rights reserved
Page 40
Using Patterns for Cloud Computing
Understand
U
de sta d tthe
e Workload
o oad
• There are three ways to optimize
th cloud
the
l d architecture.
hit t
– Internal Deployment – An
application with an internal
deployment has all of its component
workloads in the datacenter.
– External
Deployment
Current
Datacenter – An
application
pp
with an external
deployment has all of its component
workloads in an external cloud.
– Hybrid
Deployment – An
Unisys
Architecture
application
with some workloads in
Unisys
Patterns
the datacenter
andWorkload
some in the
external cloud.
Patterns
Internal Cloud
External Cloud
© 2009 Unisys Corporation. All rights reserved
Page 41
Critical Steps to achieve “elastic
datacenters in the cloud”
Educate & Energize the Enterprise
Determine how the Cloud
can be used
Enterprise
Cloud
Awareness
unWorkshop
Enterprise Cloud
Feasibility
Analysis
Modernization
Benchmark
Business
Workload
Decomposition
Service
Enterprise Cloud
Technology
Alignment Analysis
Enterprise Cloud
Operational
Alignment Analysis
Build a Strategy & Design
Enterprise Adoption Service
Enterprise Cloud
Business Case and
Value Engineering
Service
Performance Z
Zone Value
V l
Total Cost of
Ownership
Modeling Exercise
Cloud Adoption
Services
Cloud Readiness &
Strategic Roadmap
Service.
Cloud Transition
Services
© 2009 Unisys Corporation. All rights reserved
Enterprise Cloud
PoC Services
Page 42
• Unisys and the Unisys logo are registered trademarks of
Unisys Corporation.
products referenced herein are
• Anyy other brands and p
acknowledged to be trademarks or registered trademarks
of their respective holders.
© 2009 Unisys Corporation. All rights reserved
Page 43
Additi
Additional
l Material
M t i l
© 2009 Unisys Corporation. All rights reserved
Page 44
Unisys Announces Cloud Strategy
and Offerings
© 2009 Unisys Corporation. All rights reserved
Page 45
Unisys Can Help You With Your Journey
From Data Center Transformation to Cloud Service Offerings
High
Business Impact
Secure “IT as
a Service”
Ability of IT function to help create
business process advantage
Manage Service Levels
Improve Delivery
Reduce Costs
Process and
P
d
Cultural Changes
Low
Time
Standardize,
Consolidate,
Virtualize
Automate technology
to improve delivery and
meet service levels
Business
B
i
““performancef
enabled” applications
Location-independent
L
ti
i d
d t
secure operations
S
Supported
d with
i h Standardized,
S d di d Integrated
I
d Global
Gl b l Delivery
D li
© 2009 Unisys Corporation. All rights reserved
Page 46
Cloud Computing Options
Public
Cloud
• Rented
services
• Multi-tenancy
• Self-service
Private
Cloud
Optimized
Workloads
• Automation
• Virtualization
T diti
l
• Traditional
data center
Hybrid
Cloud
© 2009 Unisys Corporation. All rights reserved
Page 47
Typical Cloud Services Delivered
Accessing the cloud is about renting X as a Service (XaaS)
SaaS Software as a Service
Renting execution of software solutions over the Internet (e.g.,
salesforce com)
salesforce.com)
PaaS Platform as a Service
Renting
g use of an application
pp
environment over the Internet ((e.g.,
g,
Google App Engine)
IaaS
Infrastructure as a Service
Renting use of computing power or storage over the Internet (e
(e.g.,
g
Amazon’s EC2 & S3)
Each successive service delivers a greater portion of the
overall solution as part of the “rented” bundle.
© 2009 Unisys Corporation. All rights reserved
Page 48
Data Center Transformation and
Outsourcing Experience and Innovation
• Decades of experience and expertise
Experience
Innovation
• Large-scale, high availability, high
transaction volume – our heritage
• Thousands of Outsourcing clients in 100+
countries
• Industry-recognized leader in IT
Outsourcing
• Unisys Real-time Infrastructure
technology: powers the cloud
• Scalable, integrated, repeatable, global
delivery model
• Time to value, unique visibility
• Robust portfolio and roadmap tracks to
the client’s IT maturity
• tools to assess, plan, model, and
select the best transformation projects
• long-term view and quick, high value,
l
low
risk
i k projects
j t with
ith d
defined
fi d cost/risk
t/ i k
• Optimized support model with end-toend view
¾
ITIL b
ITIL-based
d processes linking
li ki
all
ll
support levels: self-help and levels
1, 2, 3
Unisys
y Stealth – transformational security
y
© 2009 Unisys Corporation. All rights reserved
Page 49
Element Virtualization
plus Real-Time
Real Time Infrastructure
Automated Policy
Enforcement
Build &
Manage
Orchestration/Workflow
Resource
Utilization
Re-purposing
Client Virtualization
Server Virtualization
Servers
Element Virtualization
Network Virtualization
Network
Storage
© 2009 Unisys Corporation. All rights reserved
Application Virtualization
Storage Virtualization
Apps
Page 50
Real-Time Infrastructure
plus Secure Cloud
IT Frramewo
ork (e.g. ITIL)
X as a Service
Build &
Manage
Unisys
uProvision
Web Platform
Application
Platform
Automated Policy
Enforcement
Unisys uGovern
Orchestration/Workflow
Unisys uOrchestrate
Database
Platform
Resource
Utilization
Unisys
uChargeback
Re-purposing
Unisys uAdapt
Client Virtualization
Server Virtualization
Servers
Element Virtualization
Network Virtualization
Network
Storage
© 2009 Unisys Corporation. All rights reserved
Application Virtualization
Storage Virtualization
Apps
Unisys Cloud Transformation Services
Advisory and
Assessment Services
• Create awareness
• Analyze feasibility
• Create business case
and value model
• Create alignment with
current technology,
operations, and
security
• Fast track the
adoption
• Identify candidate
transformation areas
based on application
workload
Planning and
Design Services
• Create design for
the transformed
infrastructure
including
technologies,
operations, and
security
• Develop
transformation plans
for infrastructure
deployment and
application migration
Implementation
Services
• Deploy and
configure cloud
technologies
• Integrate
I t
t existing
i ti
infrastructure with
cloud
• Integrate operations
with cloud
(
(e.g.
c-RIM)
RIM)
© 2009 Unisys Corporation. All rights reserved
Migration
Services
• Migrate and
consolidate
applications on cloud
infrastructure
• Transform existing
infrastructure into
cloud infrastructure
Page 52