SlideShare a Scribd company logo
Embracing the Cloud
How is the Cloud built and how do you Secure It?
Lisa Guess
VP Juniper Networks - Systems Engineering
Lisa Guess - Embracing the Cloud
Lisa Guess - Embracing the Cloud
Your business challenges
How should I embrace the cloud?
How do I secure the cloud?
How do I innovate without disrupting business?
What is my Return on Investment (ROI)?
IT Quickly Moving Toward Cloud
Source: IDG Enterprise Cloud Computing Study 2014
Percentage of respondents
utilizing different types of
Cloud computing
environments……..
Public Cloud
Private Cloud
Hybrid Cloud
19%
15%
5%
61%
25%
21%
7%
47%
Private Cloud Public Cloud Hybrid Cloud Non-Cloud
% OF TOTAL IT ENVIRONMENT
IN THE CLOUD
Current In 18 months
Applications Driving Design Change
Network Virtualization
ATTRIBUTES
• Virtualized with Bare metal
• Introduction of Network Overlays
REQUIREMENTS
• Physical to Virtual (P2V) integration
• Overlay visualization & management
Everything “As-a-Service”
ATTRIBUTES
• Scale-out
• On-demand
REQUIREMENTS
• Multi-tenancy
• Simple to operate, easy to scale
Modern App Flows
ATTRIBUTES
• Increased Machine to Machine
• East-West traffic
REQUIREMENTS
• Flatter Topology
• High performance and consistent
Today You Are Here
User IT Admin
You Need to Be Here
User
CLICK HERE
Orchestration? Security? Protocols?SDN? Support?Intelligence?
Path to Success: Identify
Today You Are Here
• Resources are in silos
• Network services are on physical appliances
• Tasks are not automated
• Orchestration is decentralized
• Security is an afterthought
VLANS VLANS
FINANCE HR MARKETING
Firewalls
Load-Balancer
Physical
Servers
Local Hard
Drives
You Need to Be Here
VIRTUALIZED
HR MARKETINGFINANCE
• Resources are pooled
• Network services are virtualized and distributed
• Moves/adds/changes are fully automated
• Orchestration is completely centralized
• Security is integrated
Path to Success: Set Goals
Path to Success: Foundational Impediments
Security is difficult
Physical is the default
Bottlenecks
Automation is key
Difficult to automate
Box-by-box touch points
Difficult to mine data
Processes are manual
Suboptimal topologies
Inconsistent performance
Disaggregated elements
Network is complex
Application silos
Client/User
Employees CustomersFinance
Application
Mail EDIERP
95%
Portal:
Data Sources:
Applications:
Employees Customers Partners Suppliers DevicesDatabase Transactions Sensors Inventory Devices
Analysis Reporting CRM Database Administration
InventoryHRPurchasing
Analysis Reporting CRM Mail Order Processing
InventoryHRPurchasing
Network Devices Rich media New applications Digitized information Machine to MachineEmployees Customers Machines Suppliers Partners
“Any to Any” Services
Sharing, Flexibility, Velocity
Employees CustomersFinance
EDIMailERP Mail EDIERP
>75%
Portal:
Data Sources:
Applications:
Employees Customers Partners Suppliers DevicesDatabase Transactions Sensors Inventory Devices
Analysis Reporting CRM Database Administration
InventoryHRPurchasing
Analysis Reporting CRM Mail Order Processing
InventoryHRPurchasing
Network Devices Rich media New applications Digitized information Machine to MachineEmployees Customers Machines Suppliers Partners
Moving to the Cloud
Legacy DC
Suppliers DevicesInventory Devices
Database Administration
Inventory
Mail Order Processing
Inventory
Digitized information Machine to MachineSuppliers Partners
Moving to the Cloud
Legacy DC Virtualized DC Cloud DC
Design for five 9s
• Apps not resilient
• High end x86 servers
• Virtual machines
• Shared storage - FC
• L2 adjacency
Design for 3 9s
• Apps resilient
• Commodity servers
• Virtualization
• NAS storage
• L3 connectivity
Devices
Database
Inventory
Digitized information
Moving to the Cloud
Legacy DC Virtualized DC Cloud DC
Devices
Mail Order Processing
Inventory
Suppliers Partners
Devices
Mail
Inventory
Suppliers
Order Processing
Partners
Inventory
Devices
Inventory
Digitized information
Moving to the Cloud
Legacy DC Virtualized DC Cloud DC
Devices
Inventory
Suppliers
Order Processing
Partners
Inventory
Mail
Network
Big Data - Hadoop
Agility – Time to Provision
2 Months
Physical
Server
Time
Virtual
Server
2 WeeksNetwork
2 WeeksStorage
2 Minutes
Orchestration,
Automation,
Automation
“Crushing Grapes”
Orchestration
“Making Wine”
Automation ≠ Orchestration
Speeding up “IT” Workflows at scale while eliminating errors
Automation helps eliminate
repeatable manual tasks
through scripts or other
software tools
Orchestration is an extension
of automation that groups
automated tasks into
coordinated workflows.
Path to the Cloud
Self Provisioned
Clouds
Cloud DC
3
Optimization
Greater Agility &
Availability
Virtualized DC
2
Consolidation
Lower Cost
Legacy DC
1
Server Virtualization
Network, Automation
Orchestration
Public
Private
MetaFabric
VM
VM
VM
Virtual Physical
VM
VM
VM
Virtual Physical
VM
VM
VM
Virtual Physical
VM
VM
VM
Virtual Physical
My on-premises
data center
My hosted
service provider
My cloud
service provider
My managed
service provider
VM
VM
VM
Virtual
VM
VM
VM
Virtual
Architecture for building a coherent network within & between data centers
MetaFabric – Three Steps
Automate Operations
Orchestration
Network automation and analytics
Network virtualization
MH
Secure the NetworkNetwork
security
Simplify the Network
Network infrastructure
Data CenterDCIData Center
Simplify the network
Old Model:
Deploy individual
network elements
New Model:
Deploy a coherent
network
• Data plane driven • Shared distributed control plane
• Common management plane
Simplify the network
Coherent architecture
Building blocks
Topology
Tree Spine and Leaf
Advantages:
• Better, more consistent app performance
• More agile - eliminates locality issues
• Simpler to manage
• Lower cost
Simplify the network
Coherent architecture
Building blocks
Topology
Access
Spine
Edge
Simplify the network
Coherent architecture
Building blocks
Topology
Access
Spine
Edge
Coherent Network:
Shared, distributed control plane
Common management plane
MC-LAGEthernet FabricIP Fabric w/ Open ClosCoherence beyond the edge
Coherent architectures
Legacy and Virtualized data centers
Private cloud data centers
Public cloud data centers
Virtual Network Fabric Overlay
IP Fabric
All L3
Multi-Tier w/ MC-LAG
L2/L3
Ethernet Fabric
L2/L3
MetaFabric – Three Steps
Secure the NetworkNetwork
security
Simplify the Network
Network infrastructure
Data CenterDCIData Center
Automate Operations
Orchestration
Network automation and analytics
Network virtualization
MH
Secure – a new model for the cloud
Castle Model
Hotel Model
• Micro-perimeterization
• Multiple enforcement points
• Supported by the cloud
Security Enforcement
Router (MX)
[stateless ACL L2-3]
5
Physical Firewall Appliance (SRX)
[Stateful L2-L7 firewall]
1
DC Spine Switch (QFX1000)
[Stateful ACL and/or L4-7 firewall]
3
DC Leaf Switch (QFX5100)
[Stateful ACL and/or L4-7 firewall]
4
VT-x
Hypervisor
VAVASDN
Virtualized Host with virtual
firewall
(dFW, Contrail vRouter, vSRX)
[Stateful ACL and/or L4-7 firewall]
2
SD
SPACE
ND VD
APIs & libraries exposed to operators,
orchestration, & automation platforms
To Device-specific APIs
Contrail
Central
Policy
Engine
Threat
Intelligence
Threat
Intelligence
MetaFabric – Three Steps
Automate Operations
Orchestration
Network automation and analytics
Network virtualization
MH
Secure the NetworkNetwork
security
Simplify the Network
Network infrastructure
Data CenterDCIData Center
Automate operations
Old Model:
Manage network
devices
New Model:
Automate the
workflow of
delivering the
application
Automate Work Flows
Build & Provision
Operate & Monitor
Orchestrate
Benefits:
Repeatability
More reliable
More agile
Lower operating cost
The Automation Stack
Junos
Data Plane (PFE)Chassis
XML-RPC
PythonEZ Framework RubyEZ Library
Ansible
Python
Scripts
ChefPuppet
Ruby
Scripts
Netconf Junoscript
SNMP
RO
CLI
Junos Platform Automation Stack
Chef
Junos
Data Plane (PFE)Chassis
XML-RPC
Netconf
PythonEZ Framework RubyEZ Library
PuppetAnsible
Python
Scripts
Ruby
Scripts
Junoscript
SNMP
RO
CLI
Junos Platform Automation Stack
Two Approaches
Network Coherence
BottomsUp
Network Director
Security Director
Target top 20% of tasks – 80% of the effort
Two Approaches
Network Coherence
Build your own
TopsDown
Network Virtualization
Network Director
Security Director
Network Virtualization
Network Virtualization
Can we do for the network
what we did for the server?
Network Virtualization
VLANs
A1 B1 A2 B2
Network Virtualization
Promise of Overlays
A1 B1 A2 B2
Network Virtualization
Service Chaining
A1 B1A2 B2
Virtual Network A Virtual Network B
FW IDP LB NAT
MetaFabric – Three Steps
Automate Operations
Orchestration
Network automation and analytics
Network virtualization
MH
Secure the NetworkNetwork
security
Simplify the Network
Network infrastructure
Data CenterDCIData Center
Thank you

More Related Content

PPTX
Bil Harmer - Myths of Cloud Security Debunked!
centralohioissa
 
PDF
Ken Czekaj & Robert Wright - Leveraging APM NPM Solutions to Compliment Cyber...
centralohioissa
 
PPTX
Timothy Wright & Stephen Halwes - Finding the Needle in the Hardware – Identi...
centralohioissa
 
PPTX
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
centralohioissa
 
PPTX
Jack Nichelson - Information Security Metrics - Practical Security Metrics
centralohioissa
 
PPTX
Jason Kent - AppSec Without Additional Tools
centralohioissa
 
PDF
Hardware Security on Vehicles
Priyanka Aash
 
PDF
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
centralohioissa
 
Bil Harmer - Myths of Cloud Security Debunked!
centralohioissa
 
Ken Czekaj & Robert Wright - Leveraging APM NPM Solutions to Compliment Cyber...
centralohioissa
 
Timothy Wright & Stephen Halwes - Finding the Needle in the Hardware – Identi...
centralohioissa
 
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
centralohioissa
 
Jack Nichelson - Information Security Metrics - Practical Security Metrics
centralohioissa
 
Jason Kent - AppSec Without Additional Tools
centralohioissa
 
Hardware Security on Vehicles
Priyanka Aash
 
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
centralohioissa
 

What's hot (20)

PPTX
Building an AppSec Team Extended Cut
Mike Spaulding
 
PDF
Robert Hurlbut - Threat Modeling for Secure Software Design
centralohioissa
 
PPTX
Tripwire Energy Working Group: TIV Demo
Tripwire
 
PDF
Accelerating OT - A Case Study
Digital Bond
 
PDF
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
Shah Sheikh
 
PPTX
Vulnerability Testing Services Case Study
Nandita Nityanandam
 
PDF
SD-WAN - comSpark 2019
Advanced Technology Consulting (ATC)
 
PPTX
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?
michaelbasoah
 
PPTX
IBM Q-radar security intelligence roadmap
DATA SECURITY SOLUTIONS
 
PDF
Why Zero Trust Yields Maximum Security
Priyanka Aash
 
PPTX
Stop Hackers with Integrated CASB & IDaaS Security
OneLogin
 
PPTX
Art Hathaway - Artificial Intelligence - Real Threat Prevention
centralohioissa
 
PPTX
Security Analytics for Data Discovery - Closing the SIEM Gap
Eric Johansen, CISSP
 
PDF
Endpoint Security
Ahmed Hashem El Fiky
 
PPT
Information Security
Mohit8780
 
PDF
Vulnerability threat and attack
newbie2019
 
DOCX
Symantec Data Loss Prevention - Technical Proposal (General)
Iftikhar Ali Iqbal
 
PPTX
The Subversive Six: Hidden Risk Points in ICS
Tripwire
 
PDF
Stopping zero day threats
Zscaler
 
PPTX
LoginCat - Zero Trust Integrated Cybersecurity
Rohit Kapoor
 
Building an AppSec Team Extended Cut
Mike Spaulding
 
Robert Hurlbut - Threat Modeling for Secure Software Design
centralohioissa
 
Tripwire Energy Working Group: TIV Demo
Tripwire
 
Accelerating OT - A Case Study
Digital Bond
 
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
Shah Sheikh
 
Vulnerability Testing Services Case Study
Nandita Nityanandam
 
SD-WAN - comSpark 2019
Advanced Technology Consulting (ATC)
 
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?
michaelbasoah
 
IBM Q-radar security intelligence roadmap
DATA SECURITY SOLUTIONS
 
Why Zero Trust Yields Maximum Security
Priyanka Aash
 
Stop Hackers with Integrated CASB & IDaaS Security
OneLogin
 
Art Hathaway - Artificial Intelligence - Real Threat Prevention
centralohioissa
 
Security Analytics for Data Discovery - Closing the SIEM Gap
Eric Johansen, CISSP
 
Endpoint Security
Ahmed Hashem El Fiky
 
Information Security
Mohit8780
 
Vulnerability threat and attack
newbie2019
 
Symantec Data Loss Prevention - Technical Proposal (General)
Iftikhar Ali Iqbal
 
The Subversive Six: Hidden Risk Points in ICS
Tripwire
 
Stopping zero day threats
Zscaler
 
LoginCat - Zero Trust Integrated Cybersecurity
Rohit Kapoor
 
Ad

Similar to Lisa Guess - Embracing the Cloud (20)

PPTX
Virtualization and cloud computing
Deep Gupta
 
PPTX
Brocade Software Networking Presentation at Interface 2016
Scott Sims
 
PPT
Cloud computing
Pallavi Rai
 
PPTX
Risc and velostrata 2 28 2018 lessons_in_cloud_migration
RISC Networks
 
PPT
A Complete Guide Cloud Computing
Sripati Mahapatra
 
PPTX
Introduction to Cloud seminar presentation.pptx
NayanTripathi5
 
PPT
Cloud computing
Srinivasa Rao
 
PDF
z Systems redefining Enterprise IT for digital business - Alain Poquillon
NRB
 
PPTX
Introduction to Cloud Computing
Unmesh Ballal
 
PPTX
Financial impact of Cloud Computing
krisbliesner
 
PDF
Unit 1.2 move to cloud computing
eShikshak
 
PDF
ECI - The Elastic Network - winds of change
ECI – THE ELASTIC NETWORK™
 
PDF
Plenary_three_Cloud_computing_-_is_social_housing_ready_for_it_-_Phil_Copperw...
Phil Copperwheat
 
PDF
Orange Business Live 2013 cloud breakout
Orange Business Services
 
PPTX
Digital Transformation in 2018: DX 4 3-2-1
James Kelly
 
PPTX
Introduction to Cloud Computing
Bharat Kalia
 
PPTX
Enabling the Software Defined Data Center for Hybrid IT
NetApp
 
PDF
What is Your Edge From the Cloud to the Edge, Extending Your Reach
SUSE
 
PDF
New Delhi Cloud Summit 05 26-11
Dileep Bhandarkar
 
PPT
Basic cloud
Er Aadarsh Srivastava
 
Virtualization and cloud computing
Deep Gupta
 
Brocade Software Networking Presentation at Interface 2016
Scott Sims
 
Cloud computing
Pallavi Rai
 
Risc and velostrata 2 28 2018 lessons_in_cloud_migration
RISC Networks
 
A Complete Guide Cloud Computing
Sripati Mahapatra
 
Introduction to Cloud seminar presentation.pptx
NayanTripathi5
 
Cloud computing
Srinivasa Rao
 
z Systems redefining Enterprise IT for digital business - Alain Poquillon
NRB
 
Introduction to Cloud Computing
Unmesh Ballal
 
Financial impact of Cloud Computing
krisbliesner
 
Unit 1.2 move to cloud computing
eShikshak
 
ECI - The Elastic Network - winds of change
ECI – THE ELASTIC NETWORK™
 
Plenary_three_Cloud_computing_-_is_social_housing_ready_for_it_-_Phil_Copperw...
Phil Copperwheat
 
Orange Business Live 2013 cloud breakout
Orange Business Services
 
Digital Transformation in 2018: DX 4 3-2-1
James Kelly
 
Introduction to Cloud Computing
Bharat Kalia
 
Enabling the Software Defined Data Center for Hybrid IT
NetApp
 
What is Your Edge From the Cloud to the Edge, Extending Your Reach
SUSE
 
New Delhi Cloud Summit 05 26-11
Dileep Bhandarkar
 
Ad

More from centralohioissa (20)

PPTX
Mike Spaulding - Building an Application Security Program
centralohioissa
 
PPTX
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
centralohioissa
 
PPTX
Bob West - Educating the Board of Directors
centralohioissa
 
PDF
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
centralohioissa
 
PPTX
Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems
centralohioissa
 
PPTX
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
centralohioissa
 
PPTX
Jeffrey Sweet - Third Party Risk Governance - Why? and How?
centralohioissa
 
PPTX
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
centralohioissa
 
PPTX
Tre Smith - From Decision to Implementation: Who's On First?
centralohioissa
 
PDF
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the War
centralohioissa
 
PPTX
Sean Whalen - How to Hack a Hospital
centralohioissa
 
PPTX
Harry Regan - Disaster Recovery and Business Continuity - "It's never so bad ...
centralohioissa
 
PDF
Rafeeq Rehman - Breaking the Phishing Attack Chain
centralohioissa
 
PPTX
Michael Woolard - Gamify Awareness Training: Failure to engage is failure to ...
centralohioissa
 
PDF
Ruben Melendez - Economically Justifying IT Security Initiatives
centralohioissa
 
PPTX
Ed McCabe - Putting the Intelligence back in Threat Intelligence
centralohioissa
 
PDF
Ofer Maor - Security Automation in the SDLC - Real World Cases
centralohioissa
 
PPTX
Jim Libersky: Cyber Security - Super Bowl 50
centralohioissa
 
PPTX
Jim Wojno: Incident Response - No Pain, No Gain!
centralohioissa
 
PPTX
Jason Samide - State of Security & 2016 Predictions
centralohioissa
 
Mike Spaulding - Building an Application Security Program
centralohioissa
 
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
centralohioissa
 
Bob West - Educating the Board of Directors
centralohioissa
 
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
centralohioissa
 
Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems
centralohioissa
 
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
centralohioissa
 
Jeffrey Sweet - Third Party Risk Governance - Why? and How?
centralohioissa
 
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
centralohioissa
 
Tre Smith - From Decision to Implementation: Who's On First?
centralohioissa
 
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the War
centralohioissa
 
Sean Whalen - How to Hack a Hospital
centralohioissa
 
Harry Regan - Disaster Recovery and Business Continuity - "It's never so bad ...
centralohioissa
 
Rafeeq Rehman - Breaking the Phishing Attack Chain
centralohioissa
 
Michael Woolard - Gamify Awareness Training: Failure to engage is failure to ...
centralohioissa
 
Ruben Melendez - Economically Justifying IT Security Initiatives
centralohioissa
 
Ed McCabe - Putting the Intelligence back in Threat Intelligence
centralohioissa
 
Ofer Maor - Security Automation in the SDLC - Real World Cases
centralohioissa
 
Jim Libersky: Cyber Security - Super Bowl 50
centralohioissa
 
Jim Wojno: Incident Response - No Pain, No Gain!
centralohioissa
 
Jason Samide - State of Security & 2016 Predictions
centralohioissa
 

Recently uploaded (20)

PDF
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
PDF
How ETL Control Logic Keeps Your Pipelines Safe and Reliable.pdf
Stryv Solutions Pvt. Ltd.
 
PDF
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
PDF
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
PDF
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
PPTX
Agile Chennai 18-19 July 2025 Ideathon | AI Powered Microfinance Literacy Gui...
AgileNetwork
 
PDF
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
PDF
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
PDF
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
PPTX
The Future of AI & Machine Learning.pptx
pritsen4700
 
PDF
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
PDF
Responsible AI and AI Ethics - By Sylvester Ebhonu
Sylvester Ebhonu
 
PPTX
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
PDF
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
PPTX
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
PPTX
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
PPTX
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
PDF
Doc9.....................................
SofiaCollazos
 
PDF
AI-Cloud-Business-Management-Platforms-The-Key-to-Efficiency-Growth.pdf
Artjoker Software Development Company
 
PDF
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
How ETL Control Logic Keeps Your Pipelines Safe and Reliable.pdf
Stryv Solutions Pvt. Ltd.
 
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
Agile Chennai 18-19 July 2025 Ideathon | AI Powered Microfinance Literacy Gui...
AgileNetwork
 
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
The Future of AI & Machine Learning.pptx
pritsen4700
 
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
Responsible AI and AI Ethics - By Sylvester Ebhonu
Sylvester Ebhonu
 
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
Doc9.....................................
SofiaCollazos
 
AI-Cloud-Business-Management-Platforms-The-Key-to-Efficiency-Growth.pdf
Artjoker Software Development Company
 
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 

Lisa Guess - Embracing the Cloud

  • 1. Embracing the Cloud How is the Cloud built and how do you Secure It? Lisa Guess VP Juniper Networks - Systems Engineering
  • 4. Your business challenges How should I embrace the cloud? How do I secure the cloud? How do I innovate without disrupting business? What is my Return on Investment (ROI)?
  • 5. IT Quickly Moving Toward Cloud Source: IDG Enterprise Cloud Computing Study 2014 Percentage of respondents utilizing different types of Cloud computing environments…….. Public Cloud Private Cloud Hybrid Cloud 19% 15% 5% 61% 25% 21% 7% 47% Private Cloud Public Cloud Hybrid Cloud Non-Cloud % OF TOTAL IT ENVIRONMENT IN THE CLOUD Current In 18 months
  • 6. Applications Driving Design Change Network Virtualization ATTRIBUTES • Virtualized with Bare metal • Introduction of Network Overlays REQUIREMENTS • Physical to Virtual (P2V) integration • Overlay visualization & management Everything “As-a-Service” ATTRIBUTES • Scale-out • On-demand REQUIREMENTS • Multi-tenancy • Simple to operate, easy to scale Modern App Flows ATTRIBUTES • Increased Machine to Machine • East-West traffic REQUIREMENTS • Flatter Topology • High performance and consistent
  • 7. Today You Are Here User IT Admin You Need to Be Here User CLICK HERE Orchestration? Security? Protocols?SDN? Support?Intelligence? Path to Success: Identify
  • 8. Today You Are Here • Resources are in silos • Network services are on physical appliances • Tasks are not automated • Orchestration is decentralized • Security is an afterthought VLANS VLANS FINANCE HR MARKETING Firewalls Load-Balancer Physical Servers Local Hard Drives You Need to Be Here VIRTUALIZED HR MARKETINGFINANCE • Resources are pooled • Network services are virtualized and distributed • Moves/adds/changes are fully automated • Orchestration is completely centralized • Security is integrated Path to Success: Set Goals
  • 9. Path to Success: Foundational Impediments Security is difficult Physical is the default Bottlenecks Automation is key Difficult to automate Box-by-box touch points Difficult to mine data Processes are manual Suboptimal topologies Inconsistent performance Disaggregated elements Network is complex
  • 11. Portal: Data Sources: Applications: Employees Customers Partners Suppliers DevicesDatabase Transactions Sensors Inventory Devices Analysis Reporting CRM Database Administration InventoryHRPurchasing Analysis Reporting CRM Mail Order Processing InventoryHRPurchasing Network Devices Rich media New applications Digitized information Machine to MachineEmployees Customers Machines Suppliers Partners “Any to Any” Services Sharing, Flexibility, Velocity Employees CustomersFinance EDIMailERP Mail EDIERP >75%
  • 12. Portal: Data Sources: Applications: Employees Customers Partners Suppliers DevicesDatabase Transactions Sensors Inventory Devices Analysis Reporting CRM Database Administration InventoryHRPurchasing Analysis Reporting CRM Mail Order Processing InventoryHRPurchasing Network Devices Rich media New applications Digitized information Machine to MachineEmployees Customers Machines Suppliers Partners Moving to the Cloud Legacy DC
  • 13. Suppliers DevicesInventory Devices Database Administration Inventory Mail Order Processing Inventory Digitized information Machine to MachineSuppliers Partners Moving to the Cloud Legacy DC Virtualized DC Cloud DC Design for five 9s • Apps not resilient • High end x86 servers • Virtual machines • Shared storage - FC • L2 adjacency Design for 3 9s • Apps resilient • Commodity servers • Virtualization • NAS storage • L3 connectivity
  • 14. Devices Database Inventory Digitized information Moving to the Cloud Legacy DC Virtualized DC Cloud DC Devices Mail Order Processing Inventory Suppliers Partners Devices Mail Inventory Suppliers Order Processing Partners Inventory
  • 15. Devices Inventory Digitized information Moving to the Cloud Legacy DC Virtualized DC Cloud DC Devices Inventory Suppliers Order Processing Partners Inventory Mail Network Big Data - Hadoop
  • 16. Agility – Time to Provision 2 Months Physical Server Time Virtual Server 2 WeeksNetwork 2 WeeksStorage 2 Minutes Orchestration, Automation,
  • 17. Automation “Crushing Grapes” Orchestration “Making Wine” Automation ≠ Orchestration Speeding up “IT” Workflows at scale while eliminating errors Automation helps eliminate repeatable manual tasks through scripts or other software tools Orchestration is an extension of automation that groups automated tasks into coordinated workflows.
  • 18. Path to the Cloud Self Provisioned Clouds Cloud DC 3 Optimization Greater Agility & Availability Virtualized DC 2 Consolidation Lower Cost Legacy DC 1 Server Virtualization Network, Automation Orchestration Public Private
  • 19. MetaFabric VM VM VM Virtual Physical VM VM VM Virtual Physical VM VM VM Virtual Physical VM VM VM Virtual Physical My on-premises data center My hosted service provider My cloud service provider My managed service provider VM VM VM Virtual VM VM VM Virtual Architecture for building a coherent network within & between data centers
  • 20. MetaFabric – Three Steps Automate Operations Orchestration Network automation and analytics Network virtualization MH Secure the NetworkNetwork security Simplify the Network Network infrastructure Data CenterDCIData Center
  • 21. Simplify the network Old Model: Deploy individual network elements New Model: Deploy a coherent network • Data plane driven • Shared distributed control plane • Common management plane
  • 22. Simplify the network Coherent architecture Building blocks Topology Tree Spine and Leaf Advantages: • Better, more consistent app performance • More agile - eliminates locality issues • Simpler to manage • Lower cost
  • 23. Simplify the network Coherent architecture Building blocks Topology Access Spine Edge
  • 24. Simplify the network Coherent architecture Building blocks Topology Access Spine Edge Coherent Network: Shared, distributed control plane Common management plane MC-LAGEthernet FabricIP Fabric w/ Open ClosCoherence beyond the edge
  • 25. Coherent architectures Legacy and Virtualized data centers Private cloud data centers Public cloud data centers Virtual Network Fabric Overlay IP Fabric All L3 Multi-Tier w/ MC-LAG L2/L3 Ethernet Fabric L2/L3
  • 26. MetaFabric – Three Steps Secure the NetworkNetwork security Simplify the Network Network infrastructure Data CenterDCIData Center Automate Operations Orchestration Network automation and analytics Network virtualization MH
  • 27. Secure – a new model for the cloud Castle Model Hotel Model • Micro-perimeterization • Multiple enforcement points • Supported by the cloud
  • 28. Security Enforcement Router (MX) [stateless ACL L2-3] 5 Physical Firewall Appliance (SRX) [Stateful L2-L7 firewall] 1 DC Spine Switch (QFX1000) [Stateful ACL and/or L4-7 firewall] 3 DC Leaf Switch (QFX5100) [Stateful ACL and/or L4-7 firewall] 4 VT-x Hypervisor VAVASDN Virtualized Host with virtual firewall (dFW, Contrail vRouter, vSRX) [Stateful ACL and/or L4-7 firewall] 2 SD SPACE ND VD APIs & libraries exposed to operators, orchestration, & automation platforms To Device-specific APIs Contrail Central Policy Engine Threat Intelligence Threat Intelligence
  • 29. MetaFabric – Three Steps Automate Operations Orchestration Network automation and analytics Network virtualization MH Secure the NetworkNetwork security Simplify the Network Network infrastructure Data CenterDCIData Center
  • 30. Automate operations Old Model: Manage network devices New Model: Automate the workflow of delivering the application
  • 31. Automate Work Flows Build & Provision Operate & Monitor Orchestrate Benefits: Repeatability More reliable More agile Lower operating cost
  • 32. The Automation Stack Junos Data Plane (PFE)Chassis XML-RPC PythonEZ Framework RubyEZ Library Ansible Python Scripts ChefPuppet Ruby Scripts Netconf Junoscript SNMP RO CLI Junos Platform Automation Stack
  • 33. Chef Junos Data Plane (PFE)Chassis XML-RPC Netconf PythonEZ Framework RubyEZ Library PuppetAnsible Python Scripts Ruby Scripts Junoscript SNMP RO CLI Junos Platform Automation Stack Two Approaches Network Coherence BottomsUp Network Director Security Director Target top 20% of tasks – 80% of the effort
  • 34. Two Approaches Network Coherence Build your own TopsDown Network Virtualization Network Director Security Director
  • 35. Network Virtualization Network Virtualization Can we do for the network what we did for the server?
  • 37. Network Virtualization Promise of Overlays A1 B1 A2 B2
  • 38. Network Virtualization Service Chaining A1 B1A2 B2 Virtual Network A Virtual Network B FW IDP LB NAT
  • 39. MetaFabric – Three Steps Automate Operations Orchestration Network automation and analytics Network virtualization MH Secure the NetworkNetwork security Simplify the Network Network infrastructure Data CenterDCIData Center

Editor's Notes

  • #10: TALK TRACK: If the goal is automation and abstraction, there are multiple ways to get to that goal Among our customers we see very different types of cloud builders Some are hard core DIYers and will build entire toolsets from scratch rather than wait for the commercial marketplace to provide what they need. Others are also DIYers, but use the tools that are available from the open source community And others just want something that works—they will typically buy and end-to-end software stack from a large vendor. In that camp we see vmware as a very viable option for many customers. We are working closely with vmware and have 6 different engineering projects happening simultaneously Finally, there are two open areas of openstack and cloudstack. We see this as the next normal. This means that the largest cloud providers who do not want to do it themselves will overtime move into the openstack environment. There are different technology paths to get to SDN Software only approach using existing architectures and overlaying automation Hybrid approach – new physical infrastructure and new architecture (still no SDN controller) full overlay model – using controller The network needs to work for all these types of cloud builders
  • #11: 10
  • #12: 11
  • #13: 12
  • #14: 13
  • #15: 14
  • #16: 15
  • #34: The further up the stack you go, the less complex it is for the end user to automate. However, along with it being less complex it is also less flexible. For instance, writing an application/script that interacts directly over netconf allows the user to do more (with more coding of course) than writing a playbook in Ansible. The underlying modules for Ansible have to support whatever the end user is trying to do. If the module doesn’t exist, there is the ability to build that module using the PyEZ framework and use it ad-infinitum for that particular task.
  • #35: The further up the stack you go, the less complex it is for the end user to automate. However, along with it being less complex it is also less flexible. For instance, writing an application/script that interacts directly over netconf allows the user to do more (with more coding of course) than writing a playbook in Ansible. The underlying modules for Ansible have to support whatever the end user is trying to do. If the module doesn’t exist, there is the ability to build that module using the PyEZ framework and use it ad-infinitum for that particular task.