THE CLOUD - Networks Asia
THE CLOUD - Networks Asia
THE CLOUD - Networks Asia
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
TRENDS & ANALYSIS • CASE STUDIES • VIEWPOINTS • TECHNOLOGY TIPS<br />
ASIA’S SOURCE FOR ENTERPRISE NETWORK KNOWLEDGE<br />
social media<br />
in the enterprise<br />
gadgets<br />
tablet wars<br />
Volume 8 • Issue 2 • June/July 2011<br />
HK$45 S$8<br />
Taking the plunge into<br />
<strong>THE</strong> <strong>CLOUD</strong><br />
clear choice test<br />
virtualization security tools<br />
» www.networksasia.net: Deeper, broader and better!
MPO/MPOptimate<br />
Pre-terminated Fiber<br />
MRJ21<br />
Pre-terminated<br />
Copper<br />
XG<br />
10 Gb/s cabling<br />
Optical Distribution<br />
Frame (ODF)<br />
AMP ∑ - Link<br />
1 & 10 Gb/s Copper<br />
trunk cabling<br />
HighBand<br />
Modules<br />
Next Generation<br />
Frame (NGF)<br />
Secure<br />
Network<br />
Segregation<br />
Tracerlight<br />
AMPTRAC<br />
IIMS<br />
FiberGuide<br />
Optical Raceway System<br />
AMP Hi-D<br />
Cabling Platform<br />
Data Centers are the nerve centers<br />
of today’s global businesses<br />
With requirements such as 24hour/365 day availability the infrastructure<br />
plays a vital role in supporting this. AMP Netconnect and ADC KRONE<br />
provide especially designed infrastructure solutions for your Data Centre.<br />
All the systems interlink to create an aligned overall infrastructure system.<br />
Key Facts<br />
• Complete platform of Infrastructure systems<br />
• Pre-terminated copper and fi ber systems<br />
• From 1Gb/s to 100Gb/s<br />
• For Ethernet, Fiber Channel, Infi niBand and other applications<br />
• Cable routing and management for copper and fi ber<br />
• Intelligent infrastructure Management Systems<br />
• Open frames, Accessories, etc.<br />
Winner of the Network World <strong>Asia</strong>’s<br />
Readers’ Choice Awards for<br />
Best Structured Cabling Brand<br />
READERS’ CHOICE<br />
READERS’ CHOICE<br />
PRODUCT EXCELLENCE 2010<br />
PRODUCT EXCELLENCE 2010<br />
Contact us for a demonstration today at TEnterprise_<strong>Asia</strong>@te.com!<br />
First 50 qualifi ed data centre operators to respond will win a 7” digital photo frame.<br />
www.te.com<br />
AMP NETCONNECT and TE (Logo) are trademarks of the Tyco Electronics group of companies and its licensors.
CONTENTS<br />
trends&analysis<br />
4 Tablets drive up enterprise IT spending<br />
5 High-speed port market to hit $52 billion in 2015<br />
6 ‘Cloud sourcing’ revolution – risks and costs<br />
6 Indonesia tops mobile Internet use in S E <strong>Asia</strong><br />
8 TE Connectivity upbeat on fiber prospects<br />
techtips<br />
16 Five tips for secure cloud computing<br />
casefiles<br />
24 RightScale helps Zynga keep up with growth<br />
2 6 Salvatore Ferragamo rolls out new IT infrastructure in <strong>Asia</strong><br />
communicasia2011preview<br />
30 Broadband and mobile NGNs to take center stage<br />
gadgets<br />
38 Tablet wars<br />
regulars<br />
upfront<br />
2 The cloudy descent<br />
viewpoint<br />
28 The firewall – grown up or grown old?<br />
biteback<br />
40 Virtualization – a solution for the tablet<br />
security conundrum<br />
coverstory<br />
Taking the plunge<br />
into the cloud<br />
Some say it has descended.<br />
Others say it has<br />
condensed. The recent<br />
Amazon Web Services EC2<br />
outage brought the cloud<br />
back into focus. What are<br />
its real-world pros and<br />
cons?<br />
Page 10-15<br />
update<br />
Social media in the enterprise: how to make friends and<br />
safeguard people Page 18-20 Volume 8 • Issue 2 • June/July 2011<br />
Jonathan Bigelow Managing Director Email: jbigelow@questexasia.com<br />
SE <strong>Asia</strong> Bureau Chief<br />
Victor Ng<br />
vng@questexasia.com<br />
Senior Editor<br />
Khoo Boo Leong<br />
blkhoo@questexasia.com<br />
Online Content Editor<br />
Ken Wong<br />
kenw@questexasia.com<br />
Contributing Editor<br />
Emily Chia<br />
echia@questexasia.com<br />
Contributing Editor<br />
Joseph Rebeiro<br />
jrebeiro@questexasia.com<br />
Editorial Director<br />
Chee Sing Chan<br />
cchan@questexasia.com<br />
Art Director<br />
Eric Lam<br />
elam@questexasia.com<br />
Publisher<br />
May Yee Tan<br />
mytan@questexasia.com<br />
Senior Account Manager<br />
Wayne Wong<br />
wwong@questexasia.com<br />
Assistant Client Services Manager<br />
Reinwel A Decina<br />
rdecina@questexasia.com<br />
Client Services Executive<br />
Christopher Heng<br />
cheng@questexasia.com<br />
HR & Admin Manager<br />
Janice Lam<br />
janiceLam@questexasia.com<br />
Circulation Director<br />
John Lam<br />
jlam@questexasia.com<br />
Assistant Circulation Manager<br />
Allie Mok<br />
amok@questexasia.com<br />
Editorial and publishing office<br />
Questex <strong>Asia</strong> Limited<br />
13/F, 88 Hing Fat Street, Causeway Bay, Hong Kong<br />
Phone: (852) 2559 2772 Fax: (852) 2559 7002<br />
Website: www.networksasia.net<br />
Subscription Hotline: (852) 2589 1313<br />
Subscription Fax: (852) 2559 2015<br />
E-mail: customer_service@networksasia.net<br />
Sales Team:<br />
Shigeru Kobayshi Japan Email: shig-koby@media-jac.co.jp<br />
Zena Coupe Europe/USA Email: Zena@expomedia.biz<br />
Hong Kong Sales Tel: (852) 2559 2772 Singapore Sales Tel: (65) 6297 7908<br />
Questex Media Group LLC<br />
275 Grove Street, Newton, MA 02466, Tel: +1 617 219 8300<br />
PRESIDENT & CHIEF EXECUTIVE OFFICER Kerry C. Gumas<br />
EXECUTIVE V.P. & CHIEF FINANCIAL OFFICER Tom Caridi<br />
EXECUTIVE VICE PRESIDENT Tony D’Avino<br />
EXECUTIVE VICE PRESIDENT Jon Leibowitz<br />
EXECUTIVE VICE PRESIDENT Gideon Dean<br />
Network World <strong>Asia</strong> (ISSN 1814-0459) is circulated to over 12,000 enterprise IT,<br />
computing, Internet professionals, networking companies and other companies<br />
who use networks. It is produced for IT and networking professionals, engineers,<br />
and senior managers responsible for the approval, specification, recommendation<br />
or purchase of network equipment or software.<br />
Network World <strong>Asia</strong> is published by Questex <strong>Asia</strong> Ltd, 13/F, 88 Hing Fat Street,<br />
Causeway Bay, Hong Kong. Subscription Rates: 1 year HK$330 (Hong Kong only)<br />
US$58 (within <strong>Asia</strong>) and US$64 (outside <strong>Asia</strong>). All copies distributed in the PRC<br />
are free of charge. Printed in Hong Kong. Postage paid in Hong Kong. ©2005<br />
Questex Media Group, Inc. All rights reserved. No part of this publication may be<br />
reproduced or transmitted in any form or by any means, electronic or mechanical,<br />
including photocopy, recording, or any information storage or retrieval system, without<br />
permission in writing from the publisher.<br />
POSTMASTER: Send address changes to<br />
Network World <strong>Asia</strong>, 13/F, 88 Hing Fat Street, Causeway Bay, Hong Kong<br />
Circulation: 12,000<br />
www.networksasia.net 2011 june/july • network world asia 1
2<br />
upfront<br />
The cloudy descent<br />
The Amazon Web Services (AWS) EC2 outage in April<br />
made the front page of many newspapers, leading to<br />
critics of the cloud saying, “We told you so!”<br />
Over the last two years, the most common arguments I<br />
hear against cloud adoption center around trust and governance<br />
issues, data security, resource availability, and<br />
bandwidth.<br />
While considered the worst in the brief history of cloud<br />
computing, the impact of the EC2 outage underlines the<br />
pervasiveness of the cloud today.<br />
With IT infrastructure trending over the last few years<br />
toward consolidation, simplification and cost reduction,<br />
virtualization has invariably established a foothold in data<br />
centers and IT departments.<br />
And virtualization is the foundation of – and the catalyst<br />
for – cloud adoption.<br />
As businesses experience the benefits of cloud infrastructure<br />
– be it storage as a service, software as a service,<br />
security as a service, and all manner of Web services – we<br />
can see the clear evolution of business computing heading<br />
to the cloud. By now, cloud services have developed to a<br />
point where most, if not all, software vendors have developed<br />
and released their applications as a service.<br />
In <strong>Asia</strong>, I believe that the cloud’s descent is inevitable,<br />
so long as we:<br />
By Victor Ng<br />
• Get more used to service level agreements (SLAs)<br />
• Seriously establish standards in policies and processes<br />
• Proactively secure our virtual and cloud assets (read<br />
Tech Tips on page 16 and Clear Choice Test on pages<br />
33-37)<br />
But the evolution won’t stop there. With managed services<br />
and cloud sourcing combining to permanently alter<br />
the IT adoption and procurement landscape in the near future,<br />
there’s much to look forward to (see page 6).<br />
In this issue, we offer a sneak peek into this year’s Communic<strong>Asia</strong>2011<br />
event (pages 30-32). Join us as we take the<br />
plunge into the descending cloud (pages 10-15) and provide<br />
an update on the security issues associated with social<br />
media (pages 18-23).<br />
See how big names like soon-to-IPO Zynga and worldrenowned<br />
leather fashion leader Ferragamo leverage on IT<br />
(pages 24-26).<br />
Then check out six of the hottest<br />
tablets you’ll be itching to get your<br />
hands on (page 38) and find out how<br />
to make them secure for your organization<br />
(pages 28 and 39). NWA<br />
Victor Ng vng@questexasia.com<br />
network world asia • june/july 2011 www.networksasia.net<br />
D
The data that drives our world is evolving. Innovations in<br />
virtualisation, cloud computing, automation and sustainable<br />
IT aren’t just transforming your data centre — they’re opening<br />
up a new universe of possibilities for your business.<br />
Because when there’s no centre,<br />
everything is within reach.<br />
ATA HAS NO CENTRE<br />
StarHub is keeping pace with rapid data growth thanks to a<br />
10-year partnership with Hitachi Data Systems. A virtualised<br />
infrastructure mitigates costs and allows StarHub to deliver<br />
high-availability services to our customers – no matter how<br />
much data they create. Learn how at:<br />
hds.com/nocentre<br />
© Hitachi Data Systems Corporation 2011. All Rights Reserved.<br />
www.networksasia.net 2011 june/july • network world asia 3
4<br />
trends&analysis<br />
Gartner: Apple iPad to lead tablet<br />
market in driving up IT spending<br />
Gartner has forecast worldwide<br />
IT spending to total $3.6 trillion<br />
in 2011 – a 5.6% increase<br />
from $3.4 trillion in 2010. The research<br />
firm has slightly raised its outlook<br />
for 2011 from its previous forecast<br />
of 5.1% growth.<br />
Gartner has added media tablets,<br />
such as the iPad, to its computing<br />
hardware spending estimates beginning<br />
the first quarter of 2011, which<br />
has increased its computing hardware<br />
growth outlook from 7.5% to 9.5% for<br />
2011.<br />
Worldwide media tablet spending<br />
is projected to reach $29.4 billion in<br />
2011, up from $9.6 billion in 2010.<br />
Global spending on media tablets is<br />
forecast to increase at an annual average<br />
rate of 52% through 2015.<br />
Despite mounting competition from<br />
other operating systems (OSs), Apple’s<br />
iOS will continue to own the majority<br />
of the worldwide media tablet through<br />
2015, according to Gartner, Inc. Due<br />
to the success of Apple’s iPad, iOS will<br />
account for 69% of media tablet OSs in<br />
2011, and represent 47% of the media<br />
tablet market in 2015.<br />
Gartner analysts say the Apple iPad<br />
did to the tablet PC market what the<br />
iPhone did to the smartphone market:<br />
re-invented it. A media tablet is not<br />
just a different form factor to perform<br />
the same tasks that can be done on a<br />
PC. Tablets deliver a richer experience<br />
around content consumption, thanks<br />
to the ecosystem they<br />
support. The richer the<br />
ecosystem, the stronger<br />
the pull for consumers.<br />
“Seeing the response<br />
from both consumers<br />
and enterprises to the<br />
iPad, many vendors are<br />
trying to compete by<br />
first delivering on hardware<br />
and then trying to<br />
leverage the platform<br />
ecosystem,” said Caro-<br />
lina Milanesi, research vice president<br />
at Gartner. “Many, however, are making<br />
the same mistake that was made in<br />
the first response wave to the iPhone:<br />
they are prioritizing hardware features<br />
over applications, services and<br />
overall user experience. Tablets will<br />
be much more dependent on the latter<br />
than smartphones have been, and the<br />
sooner vendors realize that, the better<br />
chance they have to compete head-tohead<br />
with Apple.”<br />
Google’s Android OS is forecast to<br />
increase its worldwide share of the<br />
media tablet market from 20% in 2011<br />
to 39% in 2015. Analysts say Google’s<br />
decision not to open up the Honeycomb<br />
– its first OS version dedicated<br />
to tablets – to third parties will prevent<br />
fragmentation, but it will also slow the<br />
price decline and ultimately cap market<br />
share.<br />
“Volume will be driven by support<br />
from many players, the ecosystem of<br />
Worldwide IT Spending Forecast (Billions of US Dollars)<br />
2010<br />
Spending<br />
2010<br />
Growth (%)<br />
2011<br />
Spending<br />
Computing Hardware 374 12.3 409 9.5<br />
Enterprise Software 237 6.7 255 7.6<br />
IT Services 785 2.9 824 5.0<br />
Telecom 2,011 5.5 2,110 4.9<br />
All IT 3,406 5.7 3,598 5.6<br />
Source: Gartner (March 2011)<br />
<strong>Asia</strong> Pacific: End-User Spending on IT<br />
by Technology Segment (Millions of US<br />
dollars)<br />
Segment 2010 2011<br />
Computing Hardware 86,266 95,512<br />
Software 22,194 25,032<br />
IT Services 63,208 70,607<br />
Telecom 415,905 456,084<br />
<strong>Asia</strong> Pacific Total 587,573 647,234<br />
Source: Gartner (March 2011)<br />
2011<br />
Growth (%)<br />
applications for tablets getting more<br />
competitive and some platform flexibility<br />
allowing lower price points,”<br />
said Roberta Cozza, principal analyst<br />
at Gartner. “The new licensing model<br />
Google has introduced with Honeycomb<br />
enables Google to drive more<br />
control, allowing only optimal tablet<br />
implementations that don’t compromise<br />
quality of experience. This might<br />
mean that prices will drop at a slower<br />
pace than what we have seen in the<br />
smartphone market.”<br />
With the migration of Blackberry<br />
devices to QNX – the OS used on the<br />
Blackberry PlayBook – in 2012, RIM<br />
will be able to offer users a consistent<br />
experience across its whole product<br />
portfolio and create a single developer<br />
community. While QNX is a strong<br />
platform that delivers on performance,<br />
graphics and multitasking features,<br />
Gartner analysts said success in the<br />
media tablet market will be driven by<br />
richness of ecosystem.<br />
“It will take time and significant effort<br />
for RIM to attract developers and<br />
deliver a compelling ecosystem of applications<br />
and services around QNX<br />
to position it as a viable alternative to<br />
Apple or Android. This will limit RIM’s<br />
market share growth over the forecast<br />
period,” Ms. Milanesi said. “It will be<br />
mainly organizations that will be interested<br />
in RIM’s tablets because they either<br />
already have RIM’s infrastructure<br />
network world asia • june/july 2011 www.networksasia.net
deployed or have stringent security requirements.”<br />
MeeGo and WebOS, which currently<br />
have a weak presence in the smartphone<br />
market, will have a limited appeal<br />
unless they can grow that business.<br />
“Smartphone users will want to buy<br />
a tablet that runs the same operating<br />
system as their smartphone. This is<br />
so that they can share applications<br />
across devices as well as for the sense<br />
of familiarity the user interfaces will<br />
bring,” Milanesi said. “Vendors developing<br />
on Android should be prepared<br />
to see more cross-brand ownership as<br />
some users might put OS over brand<br />
when it comes to the purchasing decision.<br />
Improvements on usability and<br />
brand recognition are the strongest<br />
differentiators they can focus on.”<br />
NWA<br />
High speed port (1G, 10G, 40G, 100G) market to hit $52 billion in 2015<br />
INFONETICS RESEARCH’S latest Networking Ports market<br />
size and forecast report – which tracks 1 Gigabit, 10 Giga-<br />
bit, 40 Gigabit, and 100 Gigabit optical and Ethernet ports<br />
on enterprise and service provider equipment – highlights<br />
these findings:<br />
• The number of 1G, 10G, 40G, and 100G network ports<br />
shipped on service provider and enterprise equipment<br />
in 2010 jumped 43% over the previous year, to 184<br />
million, and manufacturers’ revenue grew 26%, to over<br />
$33 billion<br />
• Equipment manufacturers’ revenue from 1G, 10G,<br />
40G, and 100G networking ports is forecast to grow to<br />
almost $52 billion in 2015, as enterprises and service<br />
providers continue to build out their network infrastructure<br />
to respond to growing levels of traffic<br />
• In 2010, high-speed ports (10G, 40G, 100G) represented<br />
only 3% of all ports sold by manufacturers, but<br />
made up 43% of the revenue<br />
• Higher-speed port technology is not only important for<br />
carrying the world’s network traffic, but a critical source<br />
of revenue for equipment manufacturers<br />
“There is a lot of excitement these days around 100G and<br />
100GE, and whether or how soon 100G prices will cause 40G<br />
sales to decline,” notes Michael Howard, principal analyst for<br />
carrier and data center networks, and co-founder of Infonetics<br />
Research. “The truth is that we are at the start of a very long<br />
period where 100G and 100GE will be the major port player<br />
from 2015 through 2030, with bare beginnings of just several<br />
hundreds of 100GE ports on service provider routers shipped to<br />
Worldwide Sales of Media Tablets to End Users by OS<br />
(Thousands of Units)<br />
OS 2010 2011 2012 2015<br />
iOS 14,766 47,964 68,670 138,497<br />
Market Share (%) 83.9 68.7 63.5 47.1<br />
Android 2,502 13,898 26,382 113,457<br />
Market Share (%) 14.2 19.9 24.4 38.6<br />
MeeGo 107 788 1,271 3,057<br />
Market Share (%) 0.6 1.1 1.2 1.0<br />
WebOS 0 2,796 4,245 8,886<br />
Market Share (%) 0.0 4.0 3.9 3.0<br />
QNX 0 3,901 7,134 29,496<br />
Market Share (%) 0.0 5.6 6.6 10.0<br />
Other Operating<br />
Systems<br />
234 432 510 700<br />
Market Share (%) 1.3 0.6 0.5 0.2<br />
Total Market 17,610 69,780 108,211 294,093<br />
Source: Gartner (April 2011)<br />
date, and a few inter-city 100G WDM routes deployed.<br />
Howard adds that street pricing already looks very competitive,<br />
and with a lot of 100G technology development in motion<br />
– more focused than 40G – “we expect 100G pricing to get to 2X<br />
40G pricing in the 2013 timeframe, which should be the turning<br />
point for 100G versus 40G in the service provider market.”<br />
Matthias Machowinski, directing analyst for enterprise networks<br />
and video at Infonetics Research and co-author of the report,<br />
adds: “The market for 1G-and-higher enterprise ports took<br />
a bit of a breather in 2009 during the recession, but came back<br />
in full force in 2010. The enterprise 40G Ethernet port segment<br />
will be one of the most interesting to watch going forward, with<br />
the first shipments expected in 2011, followed by rapid growth<br />
driven by data center deployments.”<br />
www.networksasia.net 2011 june/july • network world asia 5
6<br />
trends&analysis<br />
Risk and unexpected costs in<br />
the ‘cloud sourcing’ revolution<br />
The $820 billion IT services market<br />
is changing quickly and dramatically,<br />
as cloud computing<br />
and offshoring become mainstream,<br />
and CIOs should take steps to manage<br />
inherent risks and unexpected costs<br />
during the cloud services revolution,<br />
according to Gartner.<br />
During the next few years, market<br />
dynamics will determine whether<br />
cloud-enabled outsourcing will be the<br />
demise of traditional outsourcing, if it<br />
will lead to the convergence of services<br />
and products currently marketed “as a<br />
service”, or if it will result in next-generation<br />
outsourcing.<br />
Cloud-driven business and IT services<br />
include all types of solution that are developed,<br />
bundled and packaged as outsourcing<br />
service offerings for which the<br />
business or IT service provider uses one<br />
or more cloud computing technologies.<br />
These services can be delivered directly<br />
by a cloud provider or via a service<br />
aggregator for the delivery of preengineered<br />
and configurable business<br />
solutions in a timely and cost-effective<br />
manner.<br />
“Cloud service sourcing is immature<br />
and fraught with potential hazards.<br />
The hype around cloud computing services<br />
has increased interest, as well as<br />
caution, for CIOs trying to determine<br />
where, when and if cloud services can<br />
provide valuable outcomes for their<br />
businesses,” says Frank Ridder, research<br />
vice president at Gartner. “Organizations<br />
need to develop realistic cloud<br />
sourcing strategies and contracts that<br />
can reduce risk.”<br />
Indonesia tops mobile Internet use in South-east <strong>Asia</strong><br />
AN OVERWHELMING 63% of<br />
Indonesian Internet users have<br />
adopted mobile Internet in April<br />
2011 – placing Indonesia at the<br />
top in South-east <strong>Asia</strong> (SEA) for<br />
mobile Internet use. Compared to<br />
March 2011, mobile Internet use<br />
among Indonesians increased by<br />
over 158% in April 2011.<br />
Effective Measure’s regional director<br />
for SEA, Russell Conrad, credits this<br />
growth to the increasing popularity<br />
of smartphones: “Along with the<br />
boom of Smartphones throughout the<br />
region, a growing number of consumers,<br />
including over five million Indonesian<br />
Internet users, are adopting<br />
mobile Internet to access infotainment,<br />
conduct business and engage<br />
in e-commerce while on the go.<br />
The following details the browsing<br />
patterns of Indonesian mobile<br />
Internet users in April 2011:<br />
• Mobile Internet users stayed on a<br />
webpage at an average of 1.07 minutes,<br />
13 seconds less than PC users<br />
• Each session on mobile Internet lasted<br />
for at an average of 19 minutes,<br />
4.30 minutes more than a PC session<br />
• Mobile internet users viewed an<br />
average of 17 pages per session, 7<br />
pages more than PC users<br />
“The Indonesian market is currently<br />
very exciting. The increased<br />
activity seen on mobile Internet provides<br />
an opportunity for businesses<br />
to target the Indonesian market and<br />
establish mobile-friendly interfaces<br />
to strengthen an online presence,”<br />
says Conrad. NWA<br />
Traditional IT services often find organizations<br />
locked in, fighting with rigid<br />
delivery or hesitation to change when<br />
engaged in traditional IT services deals.<br />
Innovation seldom materializes and solutions<br />
fail to scale, and service providers<br />
often struggle with their profits.<br />
In the new cloud services scenario,<br />
however, flexibility, agility and innovation<br />
are design principles and, over<br />
time, service providers will succeed in<br />
delivering on these principles. The market<br />
also expects scalability, cost-efficiency<br />
and pay-per-use pricing models<br />
from cloud services solutions.<br />
Although cloud services already provide<br />
these, service providers manage<br />
their risks through terms and conditions<br />
that are still immature. However,<br />
Gartner believes that solutions and<br />
their commercial terms are maturing<br />
quickly.<br />
To avoid the potential pitfalls and<br />
hidden costs of cloud sourcing, Ridder<br />
advises organizations to ensure they<br />
understand the short- and long-term<br />
implications of cloud services, on the<br />
demand and supply side, as well as on<br />
the sourcing life cycle itself. The services<br />
sourcing life cycle includes four crucial<br />
elements: sourcing strategy, vendor<br />
selection, contracting, and management<br />
and governance.<br />
“The life cycle is a critical area to plan<br />
and manage, regardless of whether<br />
organizations source their IT services<br />
through internal or external resources.<br />
Our forecasts indicate that organizations<br />
spend 53% of their IT services budget<br />
on external services, and that spending<br />
is growing 3.9% per year, while new<br />
categories of services are experiencing<br />
double-digit growth,” said Ridder. “Organizations<br />
can use Gartner’s extensive<br />
analysis of changes in delivery, pricing,<br />
investment and cost to more effectively<br />
develop their cloud sourcing strategies,<br />
negotiate their cloud services contracts<br />
and manage the performance of their<br />
providers.” NWA<br />
network world asia • june/july 2011 www.networksasia.net
www.networksasia.net 2011 june/july • network world asia 7
8<br />
trends&analysis<br />
TE Connectivity upbeat on fiber prospects<br />
Anticipating an exponential increase in broadband connectivity, the Enterprise <strong>Networks</strong><br />
Group of TE Connectivity Ltd – formerly known as Tyco Electronics Ltd – is now gearing its<br />
products to reduce the cost of cabling installation while serving greater cabling densities and<br />
speed requirements, especially at the exchange and data centers. Khoo Boo Leong reports<br />
Fiber is key to the future. “Fiber<br />
is definitely coming – fiber to<br />
the home, fiber to the antenna,<br />
and fiber to the node,” says Alan<br />
Clarke, president of Network Solutions<br />
at TE Connectivity.<br />
“When you get to LTE and 4G, it’s<br />
got to be fiber to the antenna,” says<br />
Clarke. “There’s not a lot of capacity<br />
on copper twisted pair. People will be<br />
building out fiber networks, and it’s<br />
just as cheap to run fiber as it is to run<br />
copper.”<br />
While horizontal wiring or plenum<br />
cabling will probably not require fiber,<br />
fiber is proliferating in riser cabling<br />
and in data centers, and “we see special<br />
requests for fiber in enterprise networks,<br />
in the military, certain parts of<br />
government, and campus networks. So<br />
it will come,” Clarke adds.<br />
High-density connectivity<br />
Even as fiber standards evolve, TE<br />
has developed the MPOptimate system<br />
– a factory pre-terminated and tested<br />
TE Connectivity’s Thomas Poh (left) and Alan Clarke.<br />
solution – that boasts a high-density<br />
multi-fiber push-on (MPO) connector.<br />
“Products [like the MPOptimate]<br />
allow you to get more connectors in<br />
a run with better performance,” says<br />
Clarke. “We’re also developing highdensity<br />
fiber optic racks and special fiber<br />
optic cables with small diameters.<br />
Those will get incorporated into specifications<br />
but there aren’t any standards<br />
there yet.”<br />
Fitting more fiber terminations into<br />
a rack – and developing simplified and<br />
reduced fiber diameters, including fiber<br />
pigtails with 1.2mm diameter as opposed<br />
to a 2.2mm or 3mm diameter –<br />
reduces congestion in the system, frees<br />
up more channels for air to flow around<br />
the racks and improves cooling.<br />
“If you get good airflow in a reduced<br />
space, then you can reduce the cost of<br />
operating a data center,” says Clarke.<br />
Ease of installation<br />
Making fiber as easy to install as<br />
copper will lead to its growth. One way<br />
is to factory pre-install fiber connectivity,<br />
eliminating the need for installation<br />
in the field.<br />
“Much of the costs now is not in the<br />
material but in the installation,” says<br />
Clarke. “Pre-termination in the factory<br />
not only increases the speed and reliability<br />
of installation but also the overall<br />
installation cost.”<br />
“The use of pre-terminated fiber<br />
solutions speeds up installation by almost<br />
70%, compared to the traditional<br />
way, and the process increases mobility,”<br />
says Thomas Poh, director of marketing<br />
management for TE Connectivity’s<br />
Enterprise <strong>Networks</strong> Group in<br />
<strong>Asia</strong>. “You can add, move and change,<br />
or swing the fiber from one rack to<br />
another easily because it is plug-andplay,<br />
modular and scalable.”<br />
Managing the physical layer<br />
As the merits of fiber extend beyond<br />
cabling density to speed, data center<br />
managers are now paying more attention<br />
to cabling decisions.<br />
“[As speeds go up], if you lay the<br />
wrong infrastructure, it may not support<br />
your future hardware,” Poh says.<br />
“The hardware may be changed every<br />
five years but the infrastructure may<br />
be used up to 15 years.<br />
“[In addition], data centers operating<br />
24/7 that are planning for 40G and<br />
100G connectivity need a reliable supplier<br />
that knows the technology and<br />
has the resources to invest in product<br />
development.”<br />
Ultimately, the data center demands<br />
security, size, and simple access or<br />
identification. “In security, we have<br />
the managed infrastructure; in size,<br />
we’re looking for density of installation;<br />
and in identification, it comes<br />
back to simple cable management,”<br />
Clarke says.<br />
Meanwhile, TE Connectivity’s recent<br />
$400 million contract win to supply<br />
the 100%-fiber Australian National<br />
Broadband Network (NBN) underlines<br />
the trend towards fiber cabling. NWA<br />
network world asia • june/july 2011 www.networksasia.net
Smart Network. Smart Business.<br />
Bigger, Badder and Now with Blades!<br />
The new Alteon 10000 offers up to 80Gpbs ATCA compliance,<br />
incredible performance, and hot-swappable blades<br />
The Alteon 10000 Application Switch is a carrier-grade ATCA-compliant ADC platform that<br />
delivers on demand, extendable throughput of up to 80Gbps of application delivery<br />
capacity for breakthrough performance at any throughput point. It provides advanced<br />
application acceleration capabilities and OnDemand scalability for carriers, mobile<br />
operators, Internet Service Providers and large enterprises data centers that require a<br />
high-end ADC solution. For more information on Alteon 10000, please visit<br />
www.radware.com or contact your nearest reseller.<br />
© 2011 Radware, Ltd. All Rights Reserved. Radware and all other Radware product and service names are registered trademarks of Radware in the<br />
U.S. and other countries.<br />
www.networksasia.net 2011 june/july • network world asia 9
10<br />
coverstory<br />
Taking the plunge<br />
into the cloud<br />
The Amazon Web Service EC2 outage earlier this year has a<br />
silver lining – it has cast off the halo that had been wrapped<br />
around cloud-based strategies.<br />
By Khoo Boo Leong and Sandra Gittlen<br />
Several corporate executives<br />
whom NetworkWorld <strong>Asia</strong> spoke<br />
to maintain that cloud services<br />
offer cost advantages that are just unattainable<br />
through on-site data centers,<br />
but say they now realize they didn’t invest<br />
enough in risk mitigation. For instance,<br />
one CEO said he plans to host<br />
his main database with two different<br />
cloud services, just in case one goes<br />
down.<br />
Such disaster recovery planning is<br />
not unlike the traditional enterprise<br />
where companies run multiple connectivity<br />
lines from different service<br />
providers into the data center, in case<br />
one suffers a backhoe cut or some other<br />
failure. Several executives said this<br />
same logic applies to the most critical<br />
applications being hosted in the cloud.<br />
Not-so-risky business<br />
Placed in a larger context, cloud<br />
computing still poses less risk than<br />
outsourcing of finance and accounting<br />
processes to overseas companies.<br />
In a recent Ovum survey of CFOs and<br />
senior financial executives at UK and<br />
US enterprises with a turnover of more<br />
than $500 million, 29% of respondents<br />
said they viewed cloud computing as<br />
posing an unacceptable risk, compared<br />
to 38.5% for offshoring to India and<br />
44.2% for offshoring to South & Central<br />
America. India is the most popular offshoring<br />
destination but it is also ranked<br />
lowest on satisfaction rates.<br />
“Offshoring to low-cost locations<br />
was deemed to be very high-risk, and<br />
the companies we spoke to expressed<br />
a strong desire to keep these functions<br />
with their current employees,” says Peter<br />
Ryan, Ovum lead analyst.<br />
It is no surprise then that the inaugural<br />
data center industry survey of<br />
Uptime Institute found that 74% of its<br />
respondents had deployed or were considering<br />
some form of cloud computing,<br />
primarily private cloud.<br />
“Enterprises that are considering<br />
deployment of a private-public cloud<br />
infrastructure model must ensure that<br />
the security for the existing enterprise<br />
is at, or better than, industry standard,”<br />
says Steve Hassell, president of Emerson<br />
Network Power’s Avocent business.<br />
“If there is any question as to whether<br />
the existing enterprise infrastructure is<br />
secure, then it probably means that improvements<br />
should be made. There are<br />
a host of security consulting firms that<br />
can provide the audits to determine if<br />
gaps exist. The point is that before connecting<br />
to a public cloud vendor, the<br />
enterprise must have its own house in<br />
order.”<br />
Before embarking on any cloud initiative,<br />
enterprises have to know the<br />
problems they are trying to solve. Amid<br />
the hype surrounding the benefits of<br />
the cloud, “engagement in a strategic<br />
direction without a thorough understanding<br />
of the problem to be solved or<br />
the requirements, is folly,” says Hassell.<br />
MNC uptake<br />
Corroborating the Uptime Institute’s<br />
findings are the recently released results<br />
of a survey by Ovum for Cable &<br />
Wireless. The survey of more than 100<br />
global MNCs reveals that adoption of<br />
cloud services is up 61% from a year ago<br />
with 45% of MNCs already using cloud<br />
sourcing for at least some elements of<br />
key IT services.<br />
<strong>Asia</strong>-Pacific MNCs show the greatest<br />
cloud interest, with 63% uptake across<br />
all cloud services categories, including<br />
networking, communications, applications,<br />
corporate IT systems, as well as<br />
data management, security and backup.<br />
Fifty one percent of respondents have<br />
deployed data backup and storage, with<br />
an additional 33% planning to procure<br />
cloud data backup and storage services<br />
in the next 24 months.<br />
Breaking the results down by industry<br />
sectors, 56% of finance and insur-<br />
network world asia • june/july 2011 www.networksasia.net
ance companies have adopted cloud<br />
services for some elements of corporate<br />
IT systems while 63% and 59% of respondents<br />
in the manufacturing sector<br />
are implementing cloud components<br />
for networking and data management,<br />
respectively.<br />
From an applications perspective,<br />
half of the professional services sector<br />
respondents focus on customer relationship<br />
management (CRM), while<br />
half of finance and insurance respondents<br />
place strong emphasis on document<br />
management. Messaging and<br />
CRM are the most important applications<br />
for the manufacturing sector.<br />
“We believe the majority of MNCs<br />
are currently between ‘early’ and ‘adolescent’<br />
adoption phases of cloud-based<br />
services, with broader and deeper<br />
adoption being contemplated,” says<br />
Evan Kirchheimer, practice leader for<br />
enterprise services at Ovum.<br />
“However, greater adoption is dependent<br />
on the resolution of security,<br />
governance and reliability and once<br />
these concerns are addressed through<br />
standardized, tested offers from service<br />
providers, more large enterprises will<br />
feel comfortable positioning cloud as a<br />
preferred procurement option,” Kirchheimer<br />
adds.<br />
Three quarters of MNCs surveyed<br />
rate scalability of capacity and matching<br />
of capacity to fluctuating demand as<br />
the main benefits from the use of cloud<br />
services, with increased speed of provisioning<br />
coming in a close third.<br />
While retail respondents rely on scalability<br />
and matching capacity to demand<br />
as major benefits, finance and<br />
insurance companies see improved<br />
employee productivity as a major attraction.<br />
The manufacturing sector<br />
views cost transparency as far more important<br />
than other verticals.<br />
One relevant finding from the research<br />
is that telecommunication providers<br />
are emerging as trusted partners<br />
and credible suppliers for cloud services.<br />
“Telecommunications providers’<br />
control of the network over which cloud<br />
services are delivered is becoming a<br />
compelling advantage, as it allows them<br />
to offer end-to-end service level agree-<br />
ments,” explains Kirchheimer. “This allays<br />
many of the security concerns enterprises<br />
have expressed over use of the<br />
public internet to access cloud services<br />
and general security, data governance<br />
and loss of control.”<br />
“We are seeing a massive build out of<br />
new data center space all dedicated to<br />
cloud initiatives,” says Avocent’s Hassell.<br />
“This is the largest build out of<br />
new space since the entry of [virtualization]<br />
and the data center consolidation<br />
movement that followed.”<br />
SMB boom<br />
Another positive statistic – one that<br />
will cheer managed service providers<br />
in particular – comes from Microsoft’s<br />
global SMB Cloud Adoption Study<br />
2011. Within the next three years, the<br />
study reported, 39% of SMBs expect to<br />
pay for one or more cloud services, an<br />
increase of 34% from the current 29%.<br />
Even the number of cloud services<br />
SMBs will pay for will nearly double in<br />
most countries within this period.<br />
Among services such as collaboration,<br />
data storage and backup, or<br />
business-class email, Microsoft’s study<br />
finds that SMBs paying for cloud services<br />
will be using 3.3 services, up from<br />
fewer than two services today. The<br />
SMB’s choice of service provider will be<br />
determined by past experience with its<br />
support. Related to that, 82% of SMBs<br />
consider a provider’s local presence a<br />
critical or important factor in cloud service<br />
buying decisions.<br />
“As SMBs continue to transition to<br />
cloud services, hosting service providers,<br />
VARs and SIs will have a major<br />
role to play as advisors and providers<br />
of IT services in hybrid environments,”<br />
said Andy Burton, CEO of Fasthosts<br />
Internet Ltd. “Hosting providers have<br />
expertise in selling cloud services while<br />
VARs and SIs have experience selling<br />
to SMBs. Fasthosts is helping to bridge<br />
this gap by helping VARs and SIs whitelabel<br />
cloud services and deliver them as<br />
if they were their own.”<br />
It is obvious that cloud adoption will<br />
be gradual. The Microsoft study forecasts<br />
that 28% of workloads will still<br />
remain on-premise within three years<br />
while 43% of workloads will become<br />
paid cloud services and 29% will be free<br />
or bundled with other services.<br />
One tip for managed service providers<br />
is that SMBs that are adopting both<br />
SaaS and IaaS services are larger, more<br />
growth-oriented and more interested<br />
in additional services, such as unified<br />
communications and remote desktop<br />
support. Yet another is that affordable<br />
pay-as-you-go pricing cloud services<br />
are attractive for businesses, particularly<br />
SMBs that want to maintain their<br />
size, but want to become more profitable<br />
without high overhead costs.<br />
Amazon Web Services’ EC2 outage<br />
may affect the attractive cost model of<br />
cloud-based services a little. A multiday<br />
outage would most likely have a<br />
more negative impact than a slight rise<br />
in operational expenses. This is where<br />
the CFO has to couple an IT staff plan<br />
with plans for what-if scenarios that fit<br />
the enterprise’s risk tolerance profile.<br />
For some businesses, the multi-day<br />
outage that some Amazon customers<br />
suffered would not be a hardship; for<br />
others, an hour of downtime would be<br />
too much. This has to be considered<br />
even with a well-established service<br />
provider.<br />
The Amazon name would still be synonymous<br />
with uptime and the brand<br />
is established, but cloud services are<br />
new and nothing should be taken for<br />
granted.<br />
Wise SMBs should be cautious.<br />
Bryan Sartin, director of Investigative<br />
Response at Verizon Business, which<br />
recently released its 2011 Data Breach<br />
Investigations Report, says: “In 2010,<br />
70% of the companies victimized by<br />
data breaches were in the 11-to-100<br />
employee range.”<br />
Sartin acknowledges that while cloud<br />
computing has obvious advantages,<br />
“there is no question we do see a lot of<br />
breaches in the cloud.”<br />
Judging the host<br />
But all is not doom and gloom. “Although<br />
we see a lot of breaches in<br />
cloud-managed or externally managed<br />
continued on page 12<br />
www.networksasia.net 2011 june/july • network world asia 11
12<br />
coverstory<br />
continued from page 11<br />
or hosted environments, we see almost<br />
no evidence of breaches on virtualized<br />
platforms,” says Sartin. “That suggests<br />
some kind of advantages with that concept.”<br />
Security-wise, however, not all cloudbased<br />
services are built alike. There are<br />
world-class hosting facilities and then,<br />
there is everybody else. Sartin cited<br />
a case that his colleague investigated<br />
where the big established player in the<br />
hosting space that a company thought<br />
they employed turned out to be a facility<br />
hosted on the back of trailer “and<br />
the only HVACs are fans blowing at the<br />
servers”.<br />
“The admin was standing in the<br />
trailer with no shoes on and there is a<br />
bedroom back there,” Sartin says. “Our<br />
investigator asks this guy, ‘There is no<br />
antivirus in here. What are you doing<br />
about malcode?’ The guy looked at him<br />
like he was a complete idiot and says,<br />
‘Antivirus? I live here. I am the antivirus!’<br />
I’m sure all cloud services are not<br />
like that but it just shows that companies<br />
have to do their homework.”<br />
Some basic questions that enterprises<br />
should ask their cloud service<br />
providers include: Who is in charge of<br />
security when data is out in the cloud?<br />
Where is the data located? Who is the<br />
service provider that’s holding the data<br />
and where are the lines<br />
of responsibilities in the<br />
event of a security investigation?<br />
Does the company<br />
have the ability to<br />
even audit or investigate<br />
a problem on its own systems?<br />
A useful tool for businesses<br />
selecting a cloud<br />
provider is the Uptime<br />
Institute’s data center tier systems for<br />
ranking data center reliability – the<br />
Operational Sustainability Standard<br />
(OSS) and the Tier Classification System<br />
(TCS).<br />
“The TCS ensures a data center facility<br />
is designed and built to deliver<br />
uptime in accordance with its business<br />
requirements [while the] OSS ensures<br />
the site is managed to sustain that level<br />
of availability over the long-term,” said<br />
Julian Kudritzki, vice president of Uptime<br />
Institute, LLC.<br />
The TCS classifies data centers into<br />
four tier levels, I to IV. Tier IV sites are<br />
sites “capable of the highest level of uptime<br />
by providing both maintenance<br />
opportunities and fault response”.<br />
The OSS complements the TCS with a<br />
universal rating system – Gold, Silver,<br />
Bronze – for evaluating, comparing and<br />
promoting a data center’s ongoing operational<br />
capabilities based on its Tier<br />
objective. For instance, a data center<br />
Sartin<br />
could be rated Tier IV<br />
Silver.<br />
“When selecting a<br />
public cloud vendor, it<br />
is important to verify the<br />
vendor’s security capabilities<br />
are as stringent,<br />
or preferably better, than<br />
those within the client<br />
enterprise,” Hassell suggests.<br />
“Security concerns<br />
do not only relate to the logical layer<br />
but the physical Infrastructure and facilities<br />
as well.”<br />
Enterprises must review the vendor’s<br />
references, and certifications to ensure<br />
the vendor has the experience and a<br />
solid service record. It is also important<br />
to ensure the financial health of<br />
the vendor, especially if the enterprise<br />
intends to work with the vendor long<br />
term.<br />
Ultimately, the cloud should enable<br />
the strategic goals of the enterprise.<br />
There are vendors that provide advisory<br />
services to help the enterprise<br />
define cloud requirements but having<br />
a thorough understanding of the requirements<br />
prior to evaluating vendors<br />
or even the cloud advisory service providers,<br />
for that matter, will expedite the<br />
vendor selection process and improve<br />
the quality of the overall outcomes,<br />
Hassell says.<br />
Practical reality<br />
Meanwhile, far from being a byword<br />
for data security disasters, cloud computing<br />
remains a promising enterprise<br />
platform. While enterprises may delay<br />
cloud adoption due to concerns surrounding<br />
data security, privacy and<br />
compliance, practical frameworks exist<br />
to deliver the trust, security and<br />
compliance that enterprises demand<br />
when moving data, applications and<br />
systems to the cloud.<br />
Information security company<br />
SafeNet, for example, offers such a<br />
framework, which includes a unified<br />
authentication infrastructure for both<br />
on-premise and cloud-based services;<br />
data encryption and isolation in multi-<br />
continued on page 14<br />
network world asia • june/july 2011 www.networksasia.net
www.networksasia.net 2011 june/july • network world asia 13
14<br />
coverstory<br />
continued from page 12<br />
tenant environments; critical Ethernet<br />
link encryption for cloud-based or<br />
internally hosted data center connections.<br />
“Cloud computing has not only revolutionized<br />
the way IT is delivered,<br />
but represents a clear business model<br />
where true adoption occurs when enterprises<br />
believe their mission-critical<br />
data is protected and secure,” says<br />
Chris Fedde, President and COO of<br />
SafeNet.<br />
To help enterprises secure their data<br />
on cloud storage volumes and comply<br />
with requirements such as PCI DSS 2.0,<br />
SafeNet offers pre-launch authentication,<br />
storage encryption and key management<br />
for cloud environments.<br />
SafeNet Inc.’s server- and storagebased<br />
encryption, for instance, allows<br />
administrators to encrypt complianceimpacted<br />
data such as cardholder data<br />
running on Amazon EC2 and Amazon<br />
EBS volumes.<br />
“With cloud computing, security is a<br />
shared responsibility between the cloud<br />
provider and customers,” said Russ Dietz,<br />
CTO of SafeNet, which is working<br />
with Amazon Web Services (AWS) in<br />
helping enterprises to manage virtual<br />
services and control pre-launch authentication<br />
and authorization running<br />
in the AWS cloud environments.<br />
Further addressing concerns about<br />
data location, data loss and data security<br />
– barriers to cloud-computing adoption<br />
– SafeNet teamed up with NetApp last<br />
year to expand its encryption, authentication<br />
and standards-based key management<br />
capabilities to include protection<br />
for emerging SaaS, public, private,<br />
and hybrid cloud delivery models.<br />
At the same time, a slew of appliances<br />
and chassis-based multi-threat security<br />
platforms help cloud-hosting providers<br />
and cloud service providers to protect<br />
the confidentiality and integrity of subscribers’<br />
data and deliver cloud-based<br />
network security services. They also ensure<br />
that large enterprises protect the<br />
data within private and hybrid clouds.<br />
Fortinet, a network appliance vendor,<br />
centers its cloud strategy on<br />
carrier-grade security appliances<br />
such as its recently<br />
announced FortiGate-3140B.<br />
The appliance supports VPN,<br />
IPS, application control, antispam<br />
and anti-virus security<br />
measures concurrently.<br />
Featuring ten 10Gb Ethernet<br />
ports, it is powered by three<br />
ASIC processors: A network<br />
processor to handle firewall<br />
functions; a content processor<br />
to handle anti-virus and<br />
web content filtering; and a<br />
security processor to enhance intrusion<br />
prevention.<br />
Two of those ports are directly linked<br />
to the appliance’s security processor<br />
and they handle flow-based inspection<br />
for Web filtering and traffic shaping.<br />
“Proxy-based inspection is more secure<br />
than flow-based, but flow-based<br />
is better in performance,” says George<br />
Chang, the regional director for Southeast<br />
<strong>Asia</strong> and Hong Kong at Fortinet.<br />
“We provide the option to deploy a<br />
proxy-based or a flow-based solution.<br />
For a flow-based solution, we’ve added<br />
[applications such as] anti-virus, IPS<br />
inspection, application control and<br />
IPv6 firewall inspection as well as DLP.”<br />
With these added features, “the security<br />
appliance [must not] be a bottleneck<br />
in terms of information coming in<br />
and information going out. The speed<br />
at which it [inspects data] has to be<br />
fast as well,” says Dennis Aloysius Tan,<br />
Fortinet’s regional channel sales manager.<br />
“We are not only accelerating the security<br />
functions and pushing it down to<br />
our custom-built ASICs but we are also<br />
accelerating IPv6 traffic,” Bernie Png,<br />
Fortinet’s system engineer for Singapore,<br />
Vietnam and Brunei, points out.<br />
“Most vendors can do IPv4 filtering<br />
well but when they hit IPv6 traffic, their<br />
box slows down because they do not<br />
have a custom ASIC to process IPv6’s<br />
128-bit addresses, instead of IPv4’s 32bit<br />
addresses, be it on an appliance or a<br />
server CPU.”<br />
“Establishing network security now<br />
is like securing an airport,” says Chang.<br />
“Within an airport, you have the pub-<br />
Protecting data centers and<br />
enabling cloud services<br />
lic area and the boarding area which is<br />
out-of-bounds to visitors. Similarly, we<br />
don’t just have a firewall purely securing<br />
the corporate network behind it<br />
but it secures different areas, different<br />
groups, and different user profiles or<br />
usage behaviors.”<br />
Indeed, networking giant Cisco is<br />
extending beyond the firewall in helping<br />
branch offices to leverage cloudbased<br />
services without compromising<br />
on performance, security or mobility.<br />
Its Cisco Flex 7500 Series Cloud Controller<br />
targets multi-site wireless deployments.<br />
It can be used to centrally<br />
manage and control up to 500 branch<br />
locations, 2,000 access points and over<br />
20,000 clients from a single data center.<br />
Also, IT managers can configure<br />
wireless policies, management and security<br />
settings remotely.<br />
Complementing the cloud controller<br />
is the Cisco ISR Cloud Web Security<br />
with Cisco ScanSafe solution, which<br />
extends centralized Web protection<br />
and malware detection on Cisco ISR<br />
G2 branch routers to branch offices.<br />
The simple Web security solution requires<br />
no additional hardware and relies<br />
on a cloud service delivery model<br />
with central user account administration.<br />
“We were looking to centralize the<br />
management of wireless connections<br />
in our corporate headquarters, distribution<br />
facility and our retail stores,<br />
which each rely on wireless connectivity<br />
for handheld scanners, phones, and<br />
printers,” said Steve Marshall, director<br />
of IT services at Bass Pro Shops, which<br />
deployed the Cisco Flex 7500 Series<br />
Cloud Controller. “Now, we will be able<br />
network world asia • june/july 2011 www.networksasia.net
to reduce costs by eliminating the need<br />
for a controller at each store to manage<br />
the wireless networks.”<br />
Application delivery and<br />
performance<br />
Apart from security concerns, one of<br />
the biggest inhibitors to the widespread<br />
use of cloud-based services is user<br />
frustration with poor application performance.<br />
Businesses supporting customer-facing<br />
web applications should<br />
“really focus on what’s most important<br />
– the impact of anything they do on the<br />
Web to the end user,” says Jonathan<br />
Ranger, the director of Benchmarks at<br />
Compuware Corp, whose Gomez application<br />
performance management<br />
(APM) platform integrates web performance<br />
management, web load testing<br />
and web performance business analysis<br />
to gauge the business impact of cloud<br />
computing.<br />
Although most cloud providers do offer<br />
an SLA promising 99.9% uptime or<br />
other broad guarantees, few cloud providers<br />
offer performance metrics from<br />
the end-user perspective, and even<br />
fewer offer SLAs based on web performance<br />
– the response time or speed at<br />
which applications or services are delivered<br />
to an end user.<br />
Traditional performance management<br />
solutions only monitor the databases,<br />
servers or network – mainly<br />
“siloed” components in the data center.<br />
But the application delivery chain links<br />
a company’s infrastructure to the ISP,<br />
the Internet, third-party cloud providers,<br />
content delivery networks (CDNs),<br />
local ISPs and wireless carriers through<br />
to the myriad combinations of browsers<br />
and operating systems that run on<br />
users’ desktops.<br />
Problems regularly occur at various<br />
points in the chain, causing end users<br />
to experience slow transactions and response<br />
times; failed transactions and<br />
time outs; dramatically different response<br />
times in different locations; and<br />
pages that don’t work or display properly<br />
in some browsers or devices.<br />
The Compuware Gomez performance<br />
benchmarks measure website<br />
home page and transaction perfor-<br />
Belden DC (26.5.11) Ad Option5B_Layout 1 26/5/11<br />
mance<br />
10:54<br />
across<br />
AM<br />
multiple<br />
Page 1<br />
browsers. The<br />
Belden ® Redefines<br />
Data Centers<br />
Belden knows your data center is much more than<br />
a space that simply houses servers and network<br />
equipment.<br />
Fueled by e-commerce and the IP world we live in today, the<br />
data center has become the most critical asset and investment for<br />
nearly every organization.<br />
It is truly the operations center of your business, housing all the missioncritical<br />
applications, equipment and systems you need to enable every<br />
transaction, communication and task, providing the links to customers, business<br />
partners and vendors around the world and even controlling building environmental,<br />
security and life safety systems.<br />
Belden ® , Your Data Center Partner<br />
Singapore<br />
27 International Business Park<br />
#05-01 iQuest@IBP<br />
Singapore 609924<br />
Tel: +65 6879 9800 Fax: +65 6564 9602<br />
India<br />
16th Floor, Tower B<br />
Unitech Cyberpark Sector 39<br />
Gurgaon Haryana, 122001<br />
Tel: (91) 124 450 9999 Fax: (91) 124 450 9900<br />
China<br />
Unit 1301, No. 19 Building<br />
1515 Gu Mei Road<br />
Caohejing High Tech Park, ZIP 200233<br />
Tel: (8621) 5445 2388 Fax: (8621) 5445 2366 / 77<br />
For more information: datacentre@beldenapac.com<br />
www.beldenapac.com • www.belden.com<br />
benchmarks rank the web and mobile<br />
performance of companies across three<br />
key metrics — response time, availability<br />
and consistency.<br />
Response time refers to the full render<br />
time of a page. “We also track transactional<br />
processes, such as go to a retail<br />
home page, search for an item, put an<br />
item in a shopping cart, go to checkout<br />
all the way to just prior to purchasing,”<br />
Ranger explains. “With availability, the<br />
concept of 99.99% is an inside-the-firewall<br />
concept. When you move outside<br />
the firewall, it is very difficult to produce<br />
four 9’s; the numbers are sometimes<br />
considerably lower than 99.99%<br />
uptime.”<br />
The third component is consistency<br />
of response time over a period of typically<br />
two weeks or one month. Compuware<br />
publishes its benchmarks<br />
monthly, sometimes every two weeks.<br />
Consistency is a key contributing factor<br />
to brand loyalty for a site.<br />
Compuware plans to introduce other<br />
metrics such as efficiency, which links<br />
response times to the byte size of a web<br />
page being downloaded. NWA<br />
Australia<br />
Level 1, 810 Pacific Highway<br />
Gordon,NSW 2072<br />
Tel: +1800 50075 (Toll Free)<br />
Fax: (612) 9499 8756<br />
www.networksasia.net 2011 june/july • network world asia 15
16<br />
techtips<br />
Five tips for secure cloud computing<br />
by Vic Mankotia<br />
Risks of the cloud have recently become an issue with<br />
well-publicized failures in popular public cloud services.<br />
Organizations are thus under more pressure<br />
than ever to evaluate their management solutions, including<br />
those focused on security and how they are deployed as<br />
they get onto the cloud. Here are five general tips for companies<br />
getting on the cloud:<br />
#1: Consider the full business case<br />
Choose carefully as to which of your services should<br />
and should not go onto the cloud. For example, while Infrastructure-as-a-service<br />
(IaaS) cloud computing services<br />
can certainly have a cost advantage for raw computing and<br />
bandwidth charges, it may not be as cost effective for enterprise<br />
services with higher availability and reliability needs,<br />
at least for now. The complexity and cost of building an<br />
equivalent system within public cloud services often nullifies<br />
much of the expected savings while offering a more<br />
opaque operating environment.<br />
#2: Plan for problems<br />
Enterprises should decide which services are vital<br />
to their customers and/or to their own continuity, and<br />
whether these services should go on the cloud, no matter<br />
the savings. In addition, there should be contingency<br />
planning, both for downtime in the traditional infrastructure<br />
or in the cloud. Many companies still assume that resilience<br />
is automatically delivered as part of a public cloud<br />
service, but like anything else, this must also be planned<br />
for. A basic truism remains if the cloud service provider<br />
goes down, it is still the business which will take the blame<br />
from its customers.<br />
#3: Read the fine print<br />
Enterprises need to fully understand what the service<br />
level agreements (SLAs) with their service providers actually<br />
cover. For example, a performance degradation in the<br />
provider’s network can hurt a company’s reputation just<br />
as badly as a complete cloud outage, so service provider<br />
uptime is not the only criterion to consider in cloud performance.<br />
SLAs should detail obligations such as what the<br />
service provider must do when disruptions occur, the penalties<br />
for failing to deliver, maximum recovery periods, and<br />
the procedures (and extra costs) if a company should want<br />
to change cloud providers.<br />
#4: Track your users and their usage<br />
Companies need to find solutions to manage their<br />
user identities and their access to both on-premise and<br />
cloud-based applications. As organizations migrate<br />
more business-critical applications to the cloud, robust<br />
identity and access management that bridges the hybrid<br />
environment is essential to properly and efficiently<br />
control the organization’s IT assets. In addition, the<br />
management of mobile access and authentication which<br />
supports a mobile environment will also become more<br />
important. In the age of multiple access devices, many<br />
of which are not managed by the organization, usage<br />
must still remain secure and reliable.<br />
#5: Know where your data is<br />
Even if a corporation just stores peripheral data in the<br />
cloud, the organization would need to provide enterprisegrade<br />
security processes to protect that data both at rest<br />
and in motion. Storage locations will vary in a cloud environment<br />
depending on the cloud provider, much more<br />
so than with a traditional data center environment which<br />
generally doesn’t change that often. An enterprise-grade<br />
solution that addresses regulatory compliance, content<br />
and context should be used.<br />
In conclusion, an organization interested in using the<br />
public cloud today needs to make IT more secure across<br />
the physical and virtual as well as cloud environments,<br />
have a good understanding of what third-party cloud service<br />
providers can offer, and ensure it has solutions in<br />
place that support<br />
• identity and access management,<br />
• multiple channels of information access,<br />
• multiple data storage locations,<br />
• compliance,<br />
• improved operational efficiency,<br />
• reliability, and<br />
• scalability. NWA<br />
Vic Mankotia is the <strong>Asia</strong> Pacific<br />
vice president for security at CA<br />
Technologies.<br />
network world asia • june/july 2011 www.networksasia.net
Advertorial<br />
Dealing with the social media phenomenon<br />
CIOs ponder whether or not social media should be allowed in the corporate network.<br />
The proliferation of social media in our daily<br />
lives is undeniable. Today, more than ever,<br />
every aspect of our lives is being dominated<br />
by Facebook, Twitter, YouTube, Quora, Foursquare<br />
and the likes.<br />
This inescapable reality has also permeated corporate<br />
life as companies struggle to deal with the<br />
phenomenon. This has in turn put a strain on managing<br />
such software applications on today’s typical<br />
enterprise IT infrastructure.<br />
Song Tang-Yih, vice president of <strong>Asia</strong> Pacific<br />
sales for Palo Alto <strong>Networks</strong>, says there are new<br />
challenges every day in the social network realm<br />
with regard to the enterprise landscape.<br />
“At a recent conference I attended, one CIO said<br />
to me, ‘Users today are in control. But at the same<br />
time, another said, ‘Users are [also] out of control!’<br />
This is the dilemma that CIOs face – whether or not<br />
to let social networking into the enterprise network,”<br />
Song told an IT roundtable discussion sponsored by<br />
Palo Alto <strong>Networks</strong> in May 2011 in Kuala Lumpur.<br />
Song noted that social network applications have<br />
both good and bad sides. For instance, Skype may<br />
be perceived as a good tool to improve productivity.<br />
Also, employees today are deeply immersed in<br />
social media and many of them question why they<br />
can’t use Facebook and Twitter inside the corporate<br />
network.<br />
“But not many know that Skype can also be used<br />
to transfer encrypted files outside the corporate network,”<br />
he explained. “These may be confidential<br />
files and the IT department can’t track them as it<br />
detect read what’s being sent.”<br />
Attendees’ reactions at the roundtable over the<br />
use of social media in corporate networks were<br />
mixed, with views ranging from a strict “no” to “some<br />
features being allowed.”<br />
A spokesperson for a regional bank noted that her<br />
organization only allows wall posting on Facebook<br />
as its C-level executives realized the importance of<br />
such features for the purpose of interacting with its<br />
customers.<br />
Another financial-related organization noted that<br />
only its telemarketers were allowed access to an<br />
otherwise blanket “no to Facebook” policy.<br />
Song however pointed out that decisions on IT in<br />
today’s enterprise shouldn’t be binary, noting that<br />
there should be a choice for enterprises to decide.<br />
He explained: “Essentially it’s about having the<br />
architecture and technology that gives a CIO the<br />
visibility he needs to make decisions. A CIO’s typical<br />
concern is how to mitigate against risks that he<br />
can’t see. Without this assessment he can’t protect<br />
his data center. He must have the technology to ask<br />
three questions:<br />
• What are the kinds of applications traversing<br />
the network?<br />
• Who are using these applications?<br />
• What kind of content is actually running within<br />
these applications?<br />
Jonathan Tan, managing director for ASEAN sales<br />
at Palo Alto <strong>Networks</strong>, noted that CIOs need to have<br />
this visibility as users today are much more IT-savvy<br />
than before.<br />
“Simply put, if you [a CIO] don’t know what’s going<br />
on in the network, you can’t be in control,” Tan said,<br />
adding that they must have the ability to be able to<br />
define policies and to regulate it, and be able to do<br />
this as quickly as possible.<br />
In Palo Alto <strong>Networks</strong>’ latest “Application Usage<br />
and Risk Report”, Song noted that applications using<br />
SSL in some way, shape or form represented<br />
40% of the applications found and 36% of the overall<br />
bandwidth used.<br />
Song said the report also noted that this segment<br />
of applications will continue to grow as more applications<br />
follow Twitter, Facebook and Gmail, all of<br />
which have enabled SSL either as a standard setting<br />
or as a user-selectable option.<br />
Data from the report, Song noted, was collected<br />
as part of Palo Alto <strong>Networks</strong>’ customer evaluation<br />
methodology, where a Palo Alto <strong>Networks</strong> next-generation<br />
firewall was deployed to monitor and analyze<br />
the network application traffic.<br />
For more on this report and findings, go to<br />
http://www.paloaltonetworks.com/news/press_releases/2011-0511-aur-report.html<br />
www.networksasia.net 2011 june/july • network world asia 17
18<br />
update<br />
How to make friends and safeguard people<br />
Social networking sites are rapidly<br />
gaining in user base – Facebook<br />
alone has recorded half<br />
a billion active users – and, not surprisingly,<br />
attracting scammers and<br />
cybercriminals. Sophos’ latest Social<br />
Security report highlights the steadily<br />
growing number and diversity of malware,<br />
phishing and spam attacks on<br />
social networks throughout 2010.<br />
Among the report’s findings, 40% of<br />
social networking users quizzed have<br />
been sent malware such as worms via<br />
social networking sites, a 90% increase<br />
from a year ago; 67% say they have<br />
been spammed via social networking<br />
sites, more than double the proportion<br />
less than two years ago; and 43% have<br />
been on the receiving end of phishing<br />
attacks, more than double the figure<br />
since 2009.<br />
“One of the biggest concerns about<br />
pure-play cloud services such as Hotmail,<br />
Gmail, Facebook and Twitter is<br />
that you use a Web browser [to access]<br />
data [in someone else’s control],” says<br />
Paul Ducklin, head of Technology for<br />
<strong>Asia</strong> Pacific at Sophos. “It is an issue of<br />
control that goes along with security.”<br />
The whole goal of social networking<br />
is sharing and, as Ducklin points out,<br />
unregulated sharing is the enemy of<br />
security.<br />
Cisco, via its Cybercrime Return on<br />
Investment (CROI) Matrix, predicted<br />
earlier this year that social networking<br />
scams will not be a significant area<br />
for cybercriminals to invest resources<br />
in. But these scams are declining only<br />
in relation to the rising prevalence of<br />
data-theft Trojans such as Zeus, easyto-deploy<br />
Web exploits, and money<br />
mules.<br />
Human factor<br />
Most cybercrime exploits hinge not<br />
only on technology but also on the<br />
all-too-human tendency to misplace<br />
trust. This year’s Cisco Annual Security<br />
Report lists seven “deadly weaknesses”<br />
that cybercriminals exploit<br />
through social engineering scams<br />
– whether in the form of e-mails, social<br />
networking chats or phone calls.<br />
The seven weaknesses are sex appeal,<br />
greed, vanity, trust, sloth, compassion<br />
and urgency.<br />
Cheri McGuire, vice president of<br />
Global Government Affairs & Cybersecurity<br />
Policy at Symantec Corp, points<br />
out that an attacker armed with a victim’s<br />
employment details and company<br />
email address along with the<br />
victim’s personal profile information,<br />
can create a convincing ruse or spoof<br />
a message to other members of the vic-<br />
On Earth, everyone may be within six<br />
degrees of separation from one another,<br />
but in the social networking world, the<br />
separation feels more like one degree.<br />
By Khoo Boo Leong<br />
tim’s social network, especially his or<br />
her colleagues.<br />
“While increased privacy settings<br />
can reduce the likelihood of a profile<br />
being spoofed, a user can still be exploited<br />
if an attacker successfully compromises<br />
one of the user’s friends,”<br />
says McGuire. “All it takes is a single<br />
negligent user or unpatched computer<br />
in the employee’s list of friends to<br />
give attackers a beachhead into their<br />
organization from which to mount additional<br />
attacks on the enterprise from<br />
within.”<br />
Since social networking sites are<br />
built on implied trust, and on the<br />
premise that people share information<br />
and experiences with each other, the<br />
problem lies with people not knowing<br />
what ‘private’ information is. “Private<br />
information could be a real name, telephone<br />
number, address, country club<br />
membership, school, or even the name<br />
of their doctor,” McGuire says. “If such<br />
information falls into the hands of<br />
fraudsters with malicious intent, they<br />
can use it to access your bank account,<br />
or make fraudulent payments online.”<br />
Unfortunately, occasional lapses like<br />
the hacking incident on Mark Zuckerberg’s<br />
page caused by Facebook’s<br />
continued on page 20<br />
network world asia • june/july 2011 www.networksasia.net