Welcome!

FinTech Journal Authors: Yeshim Deniz, Liz McMillan, Pat Romanski, Elizabeth White, Zakia Bouachraoui

Blog Feed Post

Building Secure Cloud SaaS Applications – VMware special, part 3

vmware2This post  is sponsored by the VMware Online Forum 2013.

This part three of our VMware series will build on the second article that introduces Rackforce, one the Cloud providers implementing VMware technologies.

Enterprise SaaS Enablement

With this platform in place we can look in more detail at how organizations might approach the apps strategy that they run in these environments, under a headline banner of ‘Enterprise SaaS Enablement’, referring to transforming traditional software apps to run in a Software-as-a-Service mode.

Typically this is when it is for a commercial venture, to literally sell the software as a service, but increasingly it will also become a new practice within enterprise architecture, a means of improving how corporate IT delivers apps to users.

This is because the enterprise adoption of Cloud computing can mean both outsourcing to third party suppliers like Amazon, but also via their Private Cloud strategy internal adoption of the architectures of Cloud computing as well.

This means SaaS and PaaS, as well as the infrastructure/virtualization aspects of IaaS that are common to most Private Cloud scenarios. These layers are less common, where they impact more upon how software programmers work through new shared service architectures at the app layer.

From virtual appliances through full SaaS-enablement toolsets there are a range of ways enterprises can improve their software practices, with the core idea being benefiting from the best practices SaaS vendors have developed through running very large-scale, high availability web applications.

VMware has a comprehensive PaaS strategy built on their Cloud Foundry platform, and culminating in the launch of a dedicated joint venture with EMC called Pivotal. (learn more at the VMware Online Forum 2013.)

This two-pronged approach is key to unlocking the full transformational power of Cloud Computing, where the organization leverages both i) scale: using Cloud providers like Amazon to tap into a new low-cost capability for IaaS, and also ii) utilizing principles like SaaS enablement to re-architect applications to better make use of this resource.

Cloud Security and service catalogue standardization

One simple way to adopt this powerful business improvement is via the ongoing development of the enterprise service catalogue, introduced in the previous articles.

Not only does this provide for the core IT automations that are one of the benefits of Cloud, but this automated deployment is achieved through templates of repeatable IT configurations. Building up this inventory can be driven by a process of setting enterprise-wide standards for Private Cloud SaaS. Which authentication modules to use, and so on.

This kind of standardization effort can better consolidate and manage the IT estate, and also can manage the use of third-party vendors as part of this process, so that these standards can address key areas like Cloud Security.

vmware-vapp3VMware has an extensive partner portfolio who add value to the core suite – For example Canadian supplier AFORE offers a range of tools for Cloud Security Management, specifically intended to address securing sensitive cloud data in a multi-tenant environment when customers share application and server infrastructure, and how can security deployment be simplified so applications, virtualized workloads and hardware don’t need to be modified – often this is onerous if not impossible in cloud environments.

AFORE’s CloudLink® Secure VSA encrypts mission-critical data in motion and at rest across public, private and hybrid clouds by providing a secure software-defined storage layer between virtual machines and cloud storage infrastructure.

  • Agentless, storage infrastructure agnostic security solution – no need to modify applications or workloads

  • Full control by enterprises over security policy and key management of encrypted data in the cloud

  • Enable multi-tenant security by creating per tenant virtual storage and encrypted with tenant controlled encryption keys.

  • Unsurpassed deployment flexibility including multi-tenant virtualized private, hybrid and public cloud environments and the ability to span heterogeneous storage servers with one CloudLink management console

  • Easy adaptability for ANY IaaS clouds (VMware, CA, Amazon, Microsoft, OpenStack, CloudStack, etc) and support self-service and elastic nature of these cloud services.

  • AFORE’s CypherX secures sensitive data in hosted VDI and application stacks from cyber attackers, malicious insiders and cloud administrators. It seamlessly and efficiently places apps in secure virtual containers, encrypting and managing access to all data.

    • App Lockdown creates a secure virtual container for applications, protecting network, storage and inter-process communications with application-level granularity

    • CypherZones extend data security between groups of protected applications, allowing a complete application stack or workgroup environment to be protected.

    • Centralized control of security policy and encryption key management across many virtual machines

    • Complete end-user transparency

    • Traceability via tamper-proof audit logs that detail who/what accessed protected data, when and from where

Conclusion – Securely enabling Enterprise Agility

The key to any strategy intended to unlock better ‘enterprise agility’ is to empower employees and partners more and more.

A twin strategy of PaaS standardization and improved Cloud Security will enable IT development teams to work faster and do so by leveraging a wider range of productivity boosting Cloud services, all in a manner compliant with the organizations information security policies.

vmware2This post  is sponsored by the VMware Online Forum 2013.

The post Building Secure Cloud SaaS Applications – VMware special, part 3 appeared first on Cloud Computing Best Practices.

Read the original blog entry...

More Stories By Cloud Best Practices Network

The Cloud Best Practices Network is an expert community of leading Cloud pioneers. Follow our best practice blogs at http://CloudBestPractices.net

IoT & Smart Cities Stories
The deluge of IoT sensor data collected from connected devices and the powerful AI required to make that data actionable are giving rise to a hybrid ecosystem in which cloud, on-prem and edge processes become interweaved. Attendees will learn how emerging composable infrastructure solutions deliver the adaptive architecture needed to manage this new data reality. Machine learning algorithms can better anticipate data storms and automate resources to support surges, including fully scalable GPU-c...
Machine learning has taken residence at our cities' cores and now we can finally have "smart cities." Cities are a collection of buildings made to provide the structure and safety necessary for people to function, create and survive. Buildings are a pool of ever-changing performance data from large automated systems such as heating and cooling to the people that live and work within them. Through machine learning, buildings can optimize performance, reduce costs, and improve occupant comfort by ...
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for permission to conduct invasive surveillance of their customers. Organizations that are not transparent about how their systems gather data telemetry without offering shared data ownership risk product rejection, regu...
René Bostic is the Technical VP of the IBM Cloud Unit in North America. Enjoying her career with IBM during the modern millennial technological era, she is an expert in cloud computing, DevOps and emerging cloud technologies such as Blockchain. Her strengths and core competencies include a proven record of accomplishments in consensus building at all levels to assess, plan, and implement enterprise and cloud computing solutions. René is a member of the Society of Women Engineers (SWE) and a m...
Poor data quality and analytics drive down business value. In fact, Gartner estimated that the average financial impact of poor data quality on organizations is $9.7 million per year. But bad data is much more than a cost center. By eroding trust in information, analytics and the business decisions based on these, it is a serious impediment to digital transformation.
Digital Transformation: Preparing Cloud & IoT Security for the Age of Artificial Intelligence. As automation and artificial intelligence (AI) power solution development and delivery, many businesses need to build backend cloud capabilities. Well-poised organizations, marketing smart devices with AI and BlockChain capabilities prepare to refine compliance and regulatory capabilities in 2018. Volumes of health, financial, technical and privacy data, along with tightening compliance requirements by...
Predicting the future has never been more challenging - not because of the lack of data but because of the flood of ungoverned and risk laden information. Microsoft states that 2.5 exabytes of data are created every day. Expectations and reliance on data are being pushed to the limits, as demands around hybrid options continue to grow.
Digital Transformation and Disruption, Amazon Style - What You Can Learn. Chris Kocher is a co-founder of Grey Heron, a management and strategic marketing consulting firm. He has 25+ years in both strategic and hands-on operating experience helping executives and investors build revenues and shareholder value. He has consulted with over 130 companies on innovating with new business models, product strategies and monetization. Chris has held management positions at HP and Symantec in addition to ...
Enterprises have taken advantage of IoT to achieve important revenue and cost advantages. What is less apparent is how incumbent enterprises operating at scale have, following success with IoT, built analytic, operations management and software development capabilities - ranging from autonomous vehicles to manageable robotics installations. They have embraced these capabilities as if they were Silicon Valley startups.
As IoT continues to increase momentum, so does the associated risk. Secure Device Lifecycle Management (DLM) is ranked as one of the most important technology areas of IoT. Driving this trend is the realization that secure support for IoT devices provides companies the ability to deliver high-quality, reliable, secure offerings faster, create new revenue streams, and reduce support costs, all while building a competitive advantage in their markets. In this session, we will use customer use cases...