Handout

advertisement
Smart Terminal Architecture with
Secure Hosts
A New Evolution in Smart Computing for an Enterprise
System z Virtual Desktop Infrastructure:
VDI on Steroids
What problems does STASH solve?
 Originally intended to secure Enterprise servers, by having a more secure end to
end connection
 Security of “target servers” is only as good as the “weakest link” which is typically the


end user computing interface.
Experience has shown that desktop weakness can impact server security.
Reduce end user role as Systems Programmer of their device to further reduce risk
 In the process, we learned that this was a cost competitive alternative to any
virtual desktop solution
 Improves security, resilience and utilization
 Can save money on TCO and TCA
 A simpler solution to deploy than alternatives
 Helps a business/agency look at organizational inefficiencies (separate IT
operational units based on server type) and reconsider infrastructure based on
business needs
 End to end computing – human/machine to target applications and data
 Address services levels of workloads (e.g. security, resilience, utilization)
© 2012 STASH Consortium
9/14/12
2
Creating Stateless devices for business
Personal Computers
Smart Phones/Tablets
 Business Computer
 Remote PC access
 Thin/Zero Client
 Re-use existing PC with
application (e.g. RDP,
SPICE, Nx)
stateless operating system
 Remote presentation API on
 Bring your own device
device (e.g. Amazon
browser)
 Bootable USB image that
keeps state off PC
 Secure Virtual Machine
 Bluetooth or USB device for
remote access in a stateful
way (e.g. ME4SURE)
 Support multiple networks to
single device
© 2012 STASH Consortium
9/14/12
3
Target Customer: Breaking down organizational barriers
Risk
Across
organizations
PureSystems
Server of
Enterprise
Mainframe
Unix
Windows, Linux, VDI mgt
Reduced
Risk
Desktops, Thin Client, mobile
Internet





Desktop to Thin Client
Thin Client to Trusted Thin Client
Reduce deskside support  Military grade security
90%
 Up to 8 desktops consolidated
Share processing
to single thin client
capacity; fewer processors
 Reduces network cabling
Standardize on software
 Reduces electricity, noise
and central change
 Pushes “firmware” to desktops;
management
reduces end user risks
Reduce data leakage at
 Options to re-use existing PCs
end user; Centralize
or leverage Secure USB in
security mgt
existing PCs for secure
Improve availability to end
connections
users
 Reduces mainframe security
Pure Systems
risk due to poor desktop
security
STASH Value add
© 2012 STASH Consortium
9/14/12
X86 vs Enterprise Server VDI mgt
Similar to desktop/VDI mgt +:
 Leverage z/OS or Linux for z
security servers
 Add engines to existing z vs.
installing new Enterprise Linux
servers; faster/easier C&A
 Add IDAA/Neteeza for desktop
analytics but also for z/OS analytics
 Desktops that access mainframe
apps and data have direct
interconnect
 Reduces intranet bandwidth
 Coordinated DR and security for
end to end workloads
System z Value add
4
Deployment Possibilities
Supporting End User Computing
 Traditional PCs and Laptops
 Thin Client PCs with x86 Virtualization (SmartCloud
offering)
 Trusted Thin Client (TTC) with x86 Virtualization
(SmartCloud with STASH Value Add)
 TTC with PureSystem Virtualization and System z
Management (SmartCloud with z Value Add)
© 2012 STASH Consortium
9/14/12
5
“Typical” Layers of a Thin Client PC Solution
Virtualizing Desktops with a Server-hosted Architecture
4. Virtualization Software
1. Thin Client
Front-end
Outsourced
or Branch
Office PCs,
Call Centers
3. User Management
2. Network
Ethernet/
Wireless
6. Systems
Management
Microsoft Active
Directory / LDAP
(Manages Users)
Connection
Server
Developer
Desktops
Fault & security isolated
Shared Storage
Remote /
Laptop
Users
Virtual Center
(Assigns VMs)
5. Data CenterHardware
System x Servers BladeCenter
Blades IBM System Storage
x3650
DS3400/4700
x3755
© 2012 STASH Consortium
9/14/12
x3850
x3950
BC or BC-H
HS21 LS21
LS41
6
Virtual Bridges Architecture
Managed Endpoint
True Offline VDI
Zero Endpoint
Home
No Install, Boot to VDI
SmartSync™
SmartSync™
Legacy Endpoint
Branch Office
Repurpose Older PCs
WAN/INTERNET
CLOUD
Gold Master Technology
Storage
Optimizer
Application Management
Employee
LAN
Shared Datastore
(NAS/SAN)
Persistent User Data
(One or More Servers)
Hypervisor + Distributed Connection Broker
+ Direct Attached Storage
Contractor
DATA CENTER
Directory / Authentication
Service
© 2012 STASH Consortium
9/14/12
7
User Segmentation
Task
Workloads
Access End Point Device
•
Call Center
•
Office
•
Transactional
•
LOB
•
Lite Desktop User
Remote Protocol
Considerations
© 2012 STASH Consortium
Power
•
High Performance
Desktop
•
Multimedia
•
Design
•
High-end Desktops /
Workstations
•
Repurposed Desktops
•
Desktops
•
Thin Clients
•
iPads
•
Kiosks
•
Laptops
•
Power Laptops
•
Remote branch VDI,
Online VDI
•
Station Access Points
(e.g. Nurses
Workstations)
•
High Mobility (exec
travel)
•
Integrated offline VDI,
remote branch VDI,
Online VDI
•
Remote branch VDI,
integrated offline VDI,
Online VDI
•
Up to ~16 Concurrent
Virtual Desktops / Server
Processor Core
•
Up to ~12 Concurrent
Virtual Desktops / Server
Processor Core
•
Up to ~8 Concurrent
Virtual Desktops / Server
Processor Core
•
Per Desktop:
•
Per Desktop:
•
Per Desktop:
•
Linux: 512MB
•
Linux: 512MB
•
Linux: 1GB
•
Win7 / XP: 512MB
•
Win7 / XP: 1GB
•
Win7 / XP: 1-2GB+
•
RDP, Nx
•
RDP, Nx, SPICE
•
SPICE
Scaling Considerations
Memory Configurations
Knowledge
9/14/12
8
Trusted Thin Client Solution
Smart Terminal: Simplification of Networking and Collaboration
4. Virtualization Software
3. User Management
1. Trusted Thin Client
Front-end
Microsoft Active
Directory / LDAP
(Manages Users)
Outsourced
or Branch
Office PCs,
Call Centers
2. Network
Developer
Desktops
Remote /
Laptop
Users
6. Systems
Management
Ethernet/
Wireless
Secure
Connection
Server
Fault & security isolated
Shared Storage
8. Multiple Secure
Networks
A “Controlled Access Device” for cloud
computing.
TTC software utilizes a trusted
operating system to enforce security
policy at DCID 6/3 PL4 and CCEVS
EAL4+ levels. – Only platform from edge
to cloud that meets these criteria.
TTC software runs on at the desktop
and on a server console providing
separation of any number of networks,
applications, or systems.
© 2012 STASH Consortium
Virtual Center
(Assigns VMs)
5. Data CenterHardware
System x Servers BladeCenter
Blades IBM System Storage
x3650
DS3400/4700
x3755
9/14/12
x3850
x3950
BC or BC-H
HS21 LS21
LS41
9
Trusted Thin Client
The last workstation you will ever need
•
•
•
•
•
•
•
•
•
•
© 2012 STASH Consortium
Multiple user deployment options
Provides accredited system separation
Protects internal systems from external intrusion
Protects mission critical data
No “cut and paste” from one system to another
Security policy enforcement via a Trusted OS
Trusted operating system maintains lock down at the desktop
No intentional or unintentional data leakage
Protection from APTs
Dynamic allocation of user access
9/14/12
10
System z Management
x86 Virtualization – Reducing Control Points
3. User Management
6. Systems Management
7. Fraud Analytics
1. Trusted Thin Client
Front-end
Outsourced
or Branch
Office PCs,
Call Centers
Virtual Center
(Assigns VMs)
2. Network
Remote /
Laptop
Users
Developer
8. Multiple Secure
Networks
IBM System x
2A. Network
Developer
Desktops
IBM System z
z/OS
Ethernet/
Wireless
z/VM
4a. Virtualization
Software
5. Data CenterHardware
Shared Storage
System z196 Server
System x Servers IBM
System Storage
© 2012 STASH Consortium
4. Virtualization
Software
9/14/12
x3650
x3850
x3755
x3950
11
© 2012 STASH Consortium
© Intellinx Ltd. All Rights Reserved.Intellinx Ltd. All Rights Reserved
9/14/12
12
System z Virtualization value
x86 Virtualization
Mainframe Virtualization
Security
Guests/Clients can be compartmentalized on
individual virtualized x86 servers
Alleviates issues with hardware and
critical data theft ;reduces viruses
Centralized
Desktop
Hosted desktops has the potential to significantly
impact the performance, availability, and cost of
the client solutions
1000’s of virtual images on far fewer
server instances
Manageability
Manage remotely, alleviating issues around
software upgrades or fixes, tracking hardware
assets, moving users’ hardware, support call
transit time, reduces user down time
Change management is reduced;
SLA’s by user groups
Operating
Cost
Centralization minimizes install & config issues;
speeds time for moves, user changes; lowers
time to problem resolution by eliminating trips to
the user workspace
Less hardware; Rapid deployment;
fewer points of failure; built in
redundancy
End User
Adoption
Better end user experience with better ‘fat’ client
features
Same as x86 Virtualization
Improved
Productivity
Infrastructure standardization, common service
levels for all device types
Same as x86 Virtualization
Access latest
technology
Ease of upgrading HW and SW
Easier and faster deployment of new
tech.
Capital Cost
Share resources across multiple users; Single
application classification per server
‘Client by day, Enterprise by
night’
© 2012 STASH Consortium
9/14/12
13
CSL-WAVE Foundation
 GUI: Rich and intuitive graphic environment with
dynamic views of the server farm as the workplace
1)
2)
3)
4)
5)
6)
7)
8)
© 2012 STASH Consortium
9/14/12
Simplification
Automation
Provisioning
Graphical Control
Auto-Detection
Enhanced Server
Farm Administration
Network Support
Extended Security
14
IBM Smartcloud Desktop Infrastructure Objective
Secure Hosts: Simplifying Security and Resilience
3. User Management
6. Systems Management
7. Fraud Analytics
1. Trusted Thin Client
Front-end
Outsourced
or Branch
Office PCs,
Call Centers
Applications
and
Data
Pure
2. Network
Ethernet/
Wireless
Developer
Desktops
8. Multiple Secure
Networks
Remote /
Laptop
Users
4. Virtualization Software
Fault & security isolated
IBM System z
Shared Storage
5. Data CenterHardware
IBM zEnterprise Servers
IBM System Storage
iOS
Android
z/VM
© 2012 STASH Consortium
9/14/12
9. Virtual Tape Server
15
IBM Smartcloud Desktop Infrastructure Reality
Secure Hosts: Simplifying Security and Resilience
3. User Management
6. Systems Management
7. Fraud Analytics
1. Trusted Thin Client
Front-end
Outsourced
or Branch
Office PCs,
Call Centers
Pure
2. Network
Ethernet/
Wireless
Developer
Desktops
IBM System z
8. Multiple Secure
Networks
Remote /
Laptop
Users
4. Virtualization Software
Shared Storage
Fault & security isolated
Pure
iOS
z/VM
5. Data CenterHardware
IBM zEnterprise Servers
Android
IBM System Storage
8. Single Network
9. Virtual Tape Server
© 2012 STASH Consortium
9/14/12
16
Why use a mainframe to manage infrastructure?
 Security and resilience of virtual machines and hosted
data
 Cost per virtual machine: CapEx, OpEx, energy
 Scale of solution: on demand, no outage necessary
 Speed of provisioning
 Simplicity of management through intuitive GUI
 Co-location with other applications and data for enhanced
end to end operations benefit
 Manage “Desktops by day, enterprise servers by night”
© 2012 STASH Consortium
9/14/12
17
Delivery Models
 Do this on your own
 If so, delete the services cost
 Leverage a services engagement to get this up and
running faster
 Get this delivered via “cloud” as a managed service
 Assume 2x the capital costs
© 2012 STASH Consortium
9/14/12
18
The “Consortium”
Smart Terminal
 Raytheon Trusted Computer Solutions delivers its proven Trusted Thin Client
software that is widely deployed across hundreds of thousands of U.S. military ,
intelligence agencies, and other government desktops.
 Empennage/Mantissa – z86VM to leverage Desktop on the mainframe and
later zARMvm to enable Android, iOS, Windows RT and Linux on zVM
 STASH V2-V4 only
Secure Hosts
 IBM provides a secure and resilient hosting environment for desktops within its
PureSystems and z/VM.
 CSL International provides customer-proven CSL-WAVE to easily manage
server instances using an intuitive graphical interface which makes the
mainframe consumable to “non-mainframe” skills.
 Virtual Bridges provides VDI management of desktop images and provisioning
 Intellinx’s zWatch provides user activity monitoring for fraud management.
 Vicom Infinity brings a variety of simplification software and experience with
many of the world’s largest financial organizations.
 CDS – managed desktop clouds using STASH
© 2012 STASH Consortium
9/14/12
19
STASH Virtualization
Secure Hosts: Simplifying Security and Resilience
3. User Management
6. Systems Management
7. Fraud Analytics
1. Trusted Thin Client
Front-end
Outsourced
or Branch
Office PCs,
Call Centers
Ethernet/
Wireless
Developer
Desktops
Remote /
Laptop
Users
zbx
2. Network
8. Multiple Secure
Networks
4. Virtualization Software
Fault & security isolated
IBM System z
Shared Storage
5. Data Center Hardware
IBM zEnterprise Servers
IBM System Storage
STASH Value Added
functionality
z/VM
9. Virtual Tape Server
© 2012 STASH Consortium
9/14/12
20
Complimentary Sales for STASH
Simplify, Save, Secure……..Smart



Less expensixe
z/OS build

Build for any
platform
Co-Locate with
other apps and
data on z

Change resilience
and security

System utilization
Developer
Ultimate Cloud
Server


IBM System z
z/OS

Application
Sandbox
Sell to ISPs for
mobile computing
hosting
Analytics

One server
applied to
desktops and
enterprise
applications
© 2012 STASH Consortium
z86VM
z/OS
zARMvm
z/VM
LPAR
LPAR
9/14/12
21
Start today – save tomorrow
 Deployment goals:
 Take out cost
 Reduce risk
 Improve Security and Resilience
 Meet or exceed service level needs
 Provide investment protection for the future
 Identify immediate ROI potential. For example:
 Infrastructure as a service
 Desktop computing in a Cloud
 Linux server instances
 Database consolidation
 Smart Analytics via data sharing
 Software as a Service
 Java virtual machines
 Mail and Collaboration
 Security Services
 Development environment
 Designate and execute pilot projects to validate/quantify ROI benefit
 Joint Agency/IBM effort
 Identify who will solicit other workloads for this model
 Provide results back within three months
© 2012 STASH Consortium
9/14/12
22
Download