Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

Deploying Applications within a Hybrid Infrastructure

Charles Chong, regional solution architect of Asia Pacific & Japan at F5 Networks | May 18, 2016
To enterprises, moving to a hybrid cloud environment is a natural evolution of their business. It is no longer a question of whether there is a need to migrate apps or not, but when to deploy them on the hybrid environment.

Consolidating Computing Resources Without Sacrificing Performance and Scale

CIOs and architects are looking for solutions that provide the best ROI despite rapidly changing requirements and business needs. However, traditional solutions for virtualising and consolidating hardware devices don't meet these requirements any more. Multi-tenancy solutions fail to provide sufficient flexibility by not allowing the isolation of instances, and although they often reduce Capex, they actually increase long-term Opex. Virtual appliances provide flexibility, but at the cost of performance and scale. The ability to consolidate without giving up individual resource isolation is critical. The flexibility to utilise virtualisation without forfeiting the performance of dedicated, purpose-built hardware is thus, necessary.  

Achieving Operational Efficiency 

Programmability in the network has long been cited as a means to offer the extensibility and agility necessary to support the increasingly dynamic requirements of modern applications and business stakeholders. No single programmatic approach alone is enough to satisfy these requirements. Agility requires programmability, not only of the system via APIs, but also of the system itself. Also, more importantly, agility also requires the programmability of the data flowing through the system on the data plane. A comprehensive approach to programmability in the network is necessary to enable operations to truly react on demand to operational and business events and opportunities.

Securing Applications and Managing User Access

Organisations are concerned about Web Application Security when they talk about moving and managing apps out of an on-premise environment. One key concern is around the loss of control over the security of apps, now that apps reside "outside" in the cloud. However, it is worth noting that the level of security exposure is the same be it solely on-premise, in the cloud or a hybrid environment. What really matters is how policies around app security and user access are managed.

Securing Applications

With traditional data centre perimeters dissolving, protecting an infrastructure behind layers of firewall is no longer sufficient. Security needs to be re-examined from an application perspective and multi-layered attacks need to be considered to ensure applications are protected and optimised in a hybrid IT environment.

The emergence of a more mobile and digital enterprise does not necessarily mean there will be a disparity in security access and policies. The consolidation of security policies and access control at the application delivery tier enables a uniform approach to security. It also means an increase in the layers of security: device, location, and application. In other words, cloud and mobility have simply extended the traditional enterprise perimeter. Instead of being fixed within an organisation's data centre, it is a flexible, evolving and moving perimeter, going wherever a business needs it to go.

Managing User Access


Previous Page  1  2  3  Next Page 

Sign up for CIO Asia eNewsletters.