citrix opencloud tm open. extensible. turnkey john gormally enterprise relationship manager citrix...

8
Citrix OpenCloud TM Open. Extensible. Turnkey John Gormally Enterprise Relationship Manager Citrix Systems, Inc

Upload: bertram-long

Post on 24-Dec-2015

223 views

Category:

Documents


0 download

TRANSCRIPT

Citrix OpenCloudTM

Open. Extensible. Turnkey

John Gormally Enterprise Relationship Manager Citrix Systems, Inc

Citrix Confidential - Do Not Distribute

Enterprise Apps Consumer Apps Cloud Apps

Multiple IdentitiesMultiple Apps

Islandsof

Identity

Islandsof

Identity

Islandsof

Identity

Islandsof

Identity

Islandsof

Identity

Current SSO Solution• Costly• Incomplete

$$$$ ? ?SS

O

Users

Customer Pain Point

3

Pragmatic Path Forward

Traditional Datacenter

• On premise• High fixed cost• Full control• Known security

Public Cloud

• Off premise• Low utility cost• Self-service• Fully elastic

Cloud-Extended Data

Center

• On/off premise• Low utility cost• Self-service• Fully elastic• Trusted security• Corporate control

Hybrid cloud model to access and manage resources and data that may live on or off premise

Cloud–Oriented WorkloadsOn Premise Workloads

Backup and Recovery

Dev/Test Desktops App Delivery

Back-office Apps

Real-timeTrading Apps

Mainframe-basedLegacy Apps

Collaboration

Follow the Workloads

Workload-Orientation

Customizable

Costs aligned with Cloud Economics

No Lock-in

Extends Across DC Boundaries

Considerations for a Workload-Centric Approach

Data Center Cloud-ExtendedData Center

Requires New Infrastructure

Network Transparency

+Seamless Security

Workloads Extend Across Data Center Boundaries

Cloud Bridge – Forward looking Cloud Security

Cloud Provider Enterprise

AD

C

IPSEC TunnelWANopt

Overlay Virtual TopologyApplication Optimization Tunnel

Application Translation

Base security

Base optimization

Transparency across virtual and physical NWsL4-7 Optimization and Switching

Transparent application translation (VM, AAA, DNS, etc.)

AD

C

Enhancing Existing Security Deployments