Consolidating Computing Resources Without Sacrificing Performance and Scale
CIOs and architects are looking for solutions that provide the best ROI despite rapidly changing requirements and business needs. However, traditional solutions for virtualising and consolidating hardware devices don't meet these requirements any more. Multi-tenancy solutions fail to provide sufficient flexibility by not allowing the isolation of instances, and although they often reduce Capex, they actually increase long-term Opex. Virtual appliances provide flexibility, but at the cost of performance and scale. The ability to consolidate without giving up individual resource isolation is critical. The flexibility to utilise virtualisation without forfeiting the performance of dedicated, purpose-built hardware is thus, necessary.
Achieving Operational Efficiency
Programmability in the network has long been cited as a means to offer the extensibility and agility necessary to support the increasingly dynamic requirements of modern applications and business stakeholders. No single programmatic approach alone is enough to satisfy these requirements. Agility requires programmability, not only of the system via APIs, but also of the system itself. Also, more importantly, agility also requires the programmability of the data flowing through the system on the data plane. A comprehensive approach to programmability in the network is necessary to enable operations to truly react on demand to operational and business events and opportunities.
Securing Applications and Managing User Access
Organisations are concerned about Web Application Security when they talk about moving and managing apps out of an on-premise environment. One key concern is around the loss of control over the security of apps, now that apps reside "outside" in the cloud. However, it is worth noting that the level of security exposure is the same be it solely on-premise, in the cloud or a hybrid environment. What really matters is how policies around app security and user access are managed.
With traditional data centre perimeters dissolving, protecting an infrastructure behind layers of firewall is no longer sufficient. Security needs to be re-examined from an application perspective and multi-layered attacks need to be considered to ensure applications are protected and optimised in a hybrid IT environment.
The emergence of a more mobile and digital enterprise does not necessarily mean there will be a disparity in security access and policies. The consolidation of security policies and access control at the application delivery tier enables a uniform approach to security. It also means an increase in the layers of security: device, location, and application. In other words, cloud and mobility have simply extended the traditional enterprise perimeter. Instead of being fixed within an organisation's data centre, it is a flexible, evolving and moving perimeter, going wherever a business needs it to go.
Managing User Access
Sign up for CIO Asia eNewsletters.