08.12.2012 Views

THE CLOUD - Networks Asia

THE CLOUD - Networks Asia

THE CLOUD - Networks Asia

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

TRENDS & ANALYSIS • CASE STUDIES • VIEWPOINTS • TECHNOLOGY TIPS<br />

ASIA’S SOURCE FOR ENTERPRISE NETWORK KNOWLEDGE<br />

social media<br />

in the enterprise<br />

gadgets<br />

tablet wars<br />

Volume 8 • Issue 2 • June/July 2011<br />

HK$45 S$8<br />

Taking the plunge into<br />

<strong>THE</strong> <strong>CLOUD</strong><br />

clear choice test<br />

virtualization security tools<br />

» www.networksasia.net: Deeper, broader and better!


MPO/MPOptimate<br />

Pre-terminated Fiber<br />

MRJ21<br />

Pre-terminated<br />

Copper<br />

XG<br />

10 Gb/s cabling<br />

Optical Distribution<br />

Frame (ODF)<br />

AMP ∑ - Link<br />

1 & 10 Gb/s Copper<br />

trunk cabling<br />

HighBand<br />

Modules<br />

Next Generation<br />

Frame (NGF)<br />

Secure<br />

Network<br />

Segregation<br />

Tracerlight<br />

AMPTRAC<br />

IIMS<br />

FiberGuide<br />

Optical Raceway System<br />

AMP Hi-D<br />

Cabling Platform<br />

Data Centers are the nerve centers<br />

of today’s global businesses<br />

With requirements such as 24hour/365 day availability the infrastructure<br />

plays a vital role in supporting this. AMP Netconnect and ADC KRONE<br />

provide especially designed infrastructure solutions for your Data Centre.<br />

All the systems interlink to create an aligned overall infrastructure system.<br />

Key Facts<br />

• Complete platform of Infrastructure systems<br />

• Pre-terminated copper and fi ber systems<br />

• From 1Gb/s to 100Gb/s<br />

• For Ethernet, Fiber Channel, Infi niBand and other applications<br />

• Cable routing and management for copper and fi ber<br />

• Intelligent infrastructure Management Systems<br />

• Open frames, Accessories, etc.<br />

Winner of the Network World <strong>Asia</strong>’s<br />

Readers’ Choice Awards for<br />

Best Structured Cabling Brand<br />

READERS’ CHOICE<br />

READERS’ CHOICE<br />

PRODUCT EXCELLENCE 2010<br />

PRODUCT EXCELLENCE 2010<br />

Contact us for a demonstration today at TEnterprise_<strong>Asia</strong>@te.com!<br />

First 50 qualifi ed data centre operators to respond will win a 7” digital photo frame.<br />

www.te.com<br />

AMP NETCONNECT and TE (Logo) are trademarks of the Tyco Electronics group of companies and its licensors.


CONTENTS<br />

trends&analysis<br />

4 Tablets drive up enterprise IT spending<br />

5 High-speed port market to hit $52 billion in 2015<br />

6 ‘Cloud sourcing’ revolution – risks and costs<br />

6 Indonesia tops mobile Internet use in S E <strong>Asia</strong><br />

8 TE Connectivity upbeat on fiber prospects<br />

techtips<br />

16 Five tips for secure cloud computing<br />

casefiles<br />

24 RightScale helps Zynga keep up with growth<br />

2 6 Salvatore Ferragamo rolls out new IT infrastructure in <strong>Asia</strong><br />

communicasia2011preview<br />

30 Broadband and mobile NGNs to take center stage<br />

gadgets<br />

38 Tablet wars<br />

regulars<br />

upfront<br />

2 The cloudy descent<br />

viewpoint<br />

28 The firewall – grown up or grown old?<br />

biteback<br />

40 Virtualization – a solution for the tablet<br />

security conundrum<br />

coverstory<br />

Taking the plunge<br />

into the cloud<br />

Some say it has descended.<br />

Others say it has<br />

condensed. The recent<br />

Amazon Web Services EC2<br />

outage brought the cloud<br />

back into focus. What are<br />

its real-world pros and<br />

cons?<br />

Page 10-15<br />

update<br />

Social media in the enterprise: how to make friends and<br />

safeguard people Page 18-20 Volume 8 • Issue 2 • June/July 2011<br />

Jonathan Bigelow Managing Director Email: jbigelow@questexasia.com<br />

SE <strong>Asia</strong> Bureau Chief<br />

Victor Ng<br />

vng@questexasia.com<br />

Senior Editor<br />

Khoo Boo Leong<br />

blkhoo@questexasia.com<br />

Online Content Editor<br />

Ken Wong<br />

kenw@questexasia.com<br />

Contributing Editor<br />

Emily Chia<br />

echia@questexasia.com<br />

Contributing Editor<br />

Joseph Rebeiro<br />

jrebeiro@questexasia.com<br />

Editorial Director<br />

Chee Sing Chan<br />

cchan@questexasia.com<br />

Art Director<br />

Eric Lam<br />

elam@questexasia.com<br />

Publisher<br />

May Yee Tan<br />

mytan@questexasia.com<br />

Senior Account Manager<br />

Wayne Wong<br />

wwong@questexasia.com<br />

Assistant Client Services Manager<br />

Reinwel A Decina<br />

rdecina@questexasia.com<br />

Client Services Executive<br />

Christopher Heng<br />

cheng@questexasia.com<br />

HR & Admin Manager<br />

Janice Lam<br />

janiceLam@questexasia.com<br />

Circulation Director<br />

John Lam<br />

jlam@questexasia.com<br />

Assistant Circulation Manager<br />

Allie Mok<br />

amok@questexasia.com<br />

Editorial and publishing office<br />

Questex <strong>Asia</strong> Limited<br />

13/F, 88 Hing Fat Street, Causeway Bay, Hong Kong<br />

Phone: (852) 2559 2772 Fax: (852) 2559 7002<br />

Website: www.networksasia.net<br />

Subscription Hotline: (852) 2589 1313<br />

Subscription Fax: (852) 2559 2015<br />

E-mail: customer_service@networksasia.net<br />

Sales Team:<br />

Shigeru Kobayshi Japan Email: shig-koby@media-jac.co.jp<br />

Zena Coupe Europe/USA Email: Zena@expomedia.biz<br />

Hong Kong Sales Tel: (852) 2559 2772 Singapore Sales Tel: (65) 6297 7908<br />

Questex Media Group LLC<br />

275 Grove Street, Newton, MA 02466, Tel: +1 617 219 8300<br />

PRESIDENT & CHIEF EXECUTIVE OFFICER Kerry C. Gumas<br />

EXECUTIVE V.P. & CHIEF FINANCIAL OFFICER Tom Caridi<br />

EXECUTIVE VICE PRESIDENT Tony D’Avino<br />

EXECUTIVE VICE PRESIDENT Jon Leibowitz<br />

EXECUTIVE VICE PRESIDENT Gideon Dean<br />

Network World <strong>Asia</strong> (ISSN 1814-0459) is circulated to over 12,000 enterprise IT,<br />

computing, Internet professionals, networking companies and other companies<br />

who use networks. It is produced for IT and networking professionals, engineers,<br />

and senior managers responsible for the approval, specification, recommendation<br />

or purchase of network equipment or software.<br />

Network World <strong>Asia</strong> is published by Questex <strong>Asia</strong> Ltd, 13/F, 88 Hing Fat Street,<br />

Causeway Bay, Hong Kong. Subscription Rates: 1 year HK$330 (Hong Kong only)<br />

US$58 (within <strong>Asia</strong>) and US$64 (outside <strong>Asia</strong>). All copies distributed in the PRC<br />

are free of charge. Printed in Hong Kong. Postage paid in Hong Kong. ©2005<br />

Questex Media Group, Inc. All rights reserved. No part of this publication may be<br />

reproduced or transmitted in any form or by any means, electronic or mechanical,<br />

including photocopy, recording, or any information storage or retrieval system, without<br />

permission in writing from the publisher.<br />

POSTMASTER: Send address changes to<br />

Network World <strong>Asia</strong>, 13/F, 88 Hing Fat Street, Causeway Bay, Hong Kong<br />

Circulation: 12,000<br />

www.networksasia.net 2011 june/july • network world asia 1


2<br />

upfront<br />

The cloudy descent<br />

The Amazon Web Services (AWS) EC2 outage in April<br />

made the front page of many newspapers, leading to<br />

critics of the cloud saying, “We told you so!”<br />

Over the last two years, the most common arguments I<br />

hear against cloud adoption center around trust and governance<br />

issues, data security, resource availability, and<br />

bandwidth.<br />

While considered the worst in the brief history of cloud<br />

computing, the impact of the EC2 outage underlines the<br />

pervasiveness of the cloud today.<br />

With IT infrastructure trending over the last few years<br />

toward consolidation, simplification and cost reduction,<br />

virtualization has invariably established a foothold in data<br />

centers and IT departments.<br />

And virtualization is the foundation of – and the catalyst<br />

for – cloud adoption.<br />

As businesses experience the benefits of cloud infrastructure<br />

– be it storage as a service, software as a service,<br />

security as a service, and all manner of Web services – we<br />

can see the clear evolution of business computing heading<br />

to the cloud. By now, cloud services have developed to a<br />

point where most, if not all, software vendors have developed<br />

and released their applications as a service.<br />

In <strong>Asia</strong>, I believe that the cloud’s descent is inevitable,<br />

so long as we:<br />

By Victor Ng<br />

• Get more used to service level agreements (SLAs)<br />

• Seriously establish standards in policies and processes<br />

• Proactively secure our virtual and cloud assets (read<br />

Tech Tips on page 16 and Clear Choice Test on pages<br />

33-37)<br />

But the evolution won’t stop there. With managed services<br />

and cloud sourcing combining to permanently alter<br />

the IT adoption and procurement landscape in the near future,<br />

there’s much to look forward to (see page 6).<br />

In this issue, we offer a sneak peek into this year’s Communic<strong>Asia</strong>2011<br />

event (pages 30-32). Join us as we take the<br />

plunge into the descending cloud (pages 10-15) and provide<br />

an update on the security issues associated with social<br />

media (pages 18-23).<br />

See how big names like soon-to-IPO Zynga and worldrenowned<br />

leather fashion leader Ferragamo leverage on IT<br />

(pages 24-26).<br />

Then check out six of the hottest<br />

tablets you’ll be itching to get your<br />

hands on (page 38) and find out how<br />

to make them secure for your organization<br />

(pages 28 and 39). NWA<br />

Victor Ng vng@questexasia.com<br />

network world asia • june/july 2011 www.networksasia.net<br />

D


The data that drives our world is evolving. Innovations in<br />

virtualisation, cloud computing, automation and sustainable<br />

IT aren’t just transforming your data centre — they’re opening<br />

up a new universe of possibilities for your business.<br />

Because when there’s no centre,<br />

everything is within reach.<br />

ATA HAS NO CENTRE<br />

StarHub is keeping pace with rapid data growth thanks to a<br />

10-year partnership with Hitachi Data Systems. A virtualised<br />

infrastructure mitigates costs and allows StarHub to deliver<br />

high-availability services to our customers – no matter how<br />

much data they create. Learn how at:<br />

hds.com/nocentre<br />

© Hitachi Data Systems Corporation 2011. All Rights Reserved.<br />

www.networksasia.net 2011 june/july • network world asia 3


4<br />

trends&analysis<br />

Gartner: Apple iPad to lead tablet<br />

market in driving up IT spending<br />

Gartner has forecast worldwide<br />

IT spending to total $3.6 trillion<br />

in 2011 – a 5.6% increase<br />

from $3.4 trillion in 2010. The research<br />

firm has slightly raised its outlook<br />

for 2011 from its previous forecast<br />

of 5.1% growth.<br />

Gartner has added media tablets,<br />

such as the iPad, to its computing<br />

hardware spending estimates beginning<br />

the first quarter of 2011, which<br />

has increased its computing hardware<br />

growth outlook from 7.5% to 9.5% for<br />

2011.<br />

Worldwide media tablet spending<br />

is projected to reach $29.4 billion in<br />

2011, up from $9.6 billion in 2010.<br />

Global spending on media tablets is<br />

forecast to increase at an annual average<br />

rate of 52% through 2015.<br />

Despite mounting competition from<br />

other operating systems (OSs), Apple’s<br />

iOS will continue to own the majority<br />

of the worldwide media tablet through<br />

2015, according to Gartner, Inc. Due<br />

to the success of Apple’s iPad, iOS will<br />

account for 69% of media tablet OSs in<br />

2011, and represent 47% of the media<br />

tablet market in 2015.<br />

Gartner analysts say the Apple iPad<br />

did to the tablet PC market what the<br />

iPhone did to the smartphone market:<br />

re-invented it. A media tablet is not<br />

just a different form factor to perform<br />

the same tasks that can be done on a<br />

PC. Tablets deliver a richer experience<br />

around content consumption, thanks<br />

to the ecosystem they<br />

support. The richer the<br />

ecosystem, the stronger<br />

the pull for consumers.<br />

“Seeing the response<br />

from both consumers<br />

and enterprises to the<br />

iPad, many vendors are<br />

trying to compete by<br />

first delivering on hardware<br />

and then trying to<br />

leverage the platform<br />

ecosystem,” said Caro-<br />

lina Milanesi, research vice president<br />

at Gartner. “Many, however, are making<br />

the same mistake that was made in<br />

the first response wave to the iPhone:<br />

they are prioritizing hardware features<br />

over applications, services and<br />

overall user experience. Tablets will<br />

be much more dependent on the latter<br />

than smartphones have been, and the<br />

sooner vendors realize that, the better<br />

chance they have to compete head-tohead<br />

with Apple.”<br />

Google’s Android OS is forecast to<br />

increase its worldwide share of the<br />

media tablet market from 20% in 2011<br />

to 39% in 2015. Analysts say Google’s<br />

decision not to open up the Honeycomb<br />

– its first OS version dedicated<br />

to tablets – to third parties will prevent<br />

fragmentation, but it will also slow the<br />

price decline and ultimately cap market<br />

share.<br />

“Volume will be driven by support<br />

from many players, the ecosystem of<br />

Worldwide IT Spending Forecast (Billions of US Dollars)<br />

2010<br />

Spending<br />

2010<br />

Growth (%)<br />

2011<br />

Spending<br />

Computing Hardware 374 12.3 409 9.5<br />

Enterprise Software 237 6.7 255 7.6<br />

IT Services 785 2.9 824 5.0<br />

Telecom 2,011 5.5 2,110 4.9<br />

All IT 3,406 5.7 3,598 5.6<br />

Source: Gartner (March 2011)<br />

<strong>Asia</strong> Pacific: End-User Spending on IT<br />

by Technology Segment (Millions of US<br />

dollars)<br />

Segment 2010 2011<br />

Computing Hardware 86,266 95,512<br />

Software 22,194 25,032<br />

IT Services 63,208 70,607<br />

Telecom 415,905 456,084<br />

<strong>Asia</strong> Pacific Total 587,573 647,234<br />

Source: Gartner (March 2011)<br />

2011<br />

Growth (%)<br />

applications for tablets getting more<br />

competitive and some platform flexibility<br />

allowing lower price points,”<br />

said Roberta Cozza, principal analyst<br />

at Gartner. “The new licensing model<br />

Google has introduced with Honeycomb<br />

enables Google to drive more<br />

control, allowing only optimal tablet<br />

implementations that don’t compromise<br />

quality of experience. This might<br />

mean that prices will drop at a slower<br />

pace than what we have seen in the<br />

smartphone market.”<br />

With the migration of Blackberry<br />

devices to QNX – the OS used on the<br />

Blackberry PlayBook – in 2012, RIM<br />

will be able to offer users a consistent<br />

experience across its whole product<br />

portfolio and create a single developer<br />

community. While QNX is a strong<br />

platform that delivers on performance,<br />

graphics and multitasking features,<br />

Gartner analysts said success in the<br />

media tablet market will be driven by<br />

richness of ecosystem.<br />

“It will take time and significant effort<br />

for RIM to attract developers and<br />

deliver a compelling ecosystem of applications<br />

and services around QNX<br />

to position it as a viable alternative to<br />

Apple or Android. This will limit RIM’s<br />

market share growth over the forecast<br />

period,” Ms. Milanesi said. “It will be<br />

mainly organizations that will be interested<br />

in RIM’s tablets because they either<br />

already have RIM’s infrastructure<br />

network world asia • june/july 2011 www.networksasia.net


deployed or have stringent security requirements.”<br />

MeeGo and WebOS, which currently<br />

have a weak presence in the smartphone<br />

market, will have a limited appeal<br />

unless they can grow that business.<br />

“Smartphone users will want to buy<br />

a tablet that runs the same operating<br />

system as their smartphone. This is<br />

so that they can share applications<br />

across devices as well as for the sense<br />

of familiarity the user interfaces will<br />

bring,” Milanesi said. “Vendors developing<br />

on Android should be prepared<br />

to see more cross-brand ownership as<br />

some users might put OS over brand<br />

when it comes to the purchasing decision.<br />

Improvements on usability and<br />

brand recognition are the strongest<br />

differentiators they can focus on.”<br />

NWA<br />

High speed port (1G, 10G, 40G, 100G) market to hit $52 billion in 2015<br />

INFONETICS RESEARCH’S latest Networking Ports market<br />

size and forecast report – which tracks 1 Gigabit, 10 Giga-<br />

bit, 40 Gigabit, and 100 Gigabit optical and Ethernet ports<br />

on enterprise and service provider equipment – highlights<br />

these findings:<br />

• The number of 1G, 10G, 40G, and 100G network ports<br />

shipped on service provider and enterprise equipment<br />

in 2010 jumped 43% over the previous year, to 184<br />

million, and manufacturers’ revenue grew 26%, to over<br />

$33 billion<br />

• Equipment manufacturers’ revenue from 1G, 10G,<br />

40G, and 100G networking ports is forecast to grow to<br />

almost $52 billion in 2015, as enterprises and service<br />

providers continue to build out their network infrastructure<br />

to respond to growing levels of traffic<br />

• In 2010, high-speed ports (10G, 40G, 100G) represented<br />

only 3% of all ports sold by manufacturers, but<br />

made up 43% of the revenue<br />

• Higher-speed port technology is not only important for<br />

carrying the world’s network traffic, but a critical source<br />

of revenue for equipment manufacturers<br />

“There is a lot of excitement these days around 100G and<br />

100GE, and whether or how soon 100G prices will cause 40G<br />

sales to decline,” notes Michael Howard, principal analyst for<br />

carrier and data center networks, and co-founder of Infonetics<br />

Research. “The truth is that we are at the start of a very long<br />

period where 100G and 100GE will be the major port player<br />

from 2015 through 2030, with bare beginnings of just several<br />

hundreds of 100GE ports on service provider routers shipped to<br />

Worldwide Sales of Media Tablets to End Users by OS<br />

(Thousands of Units)<br />

OS 2010 2011 2012 2015<br />

iOS 14,766 47,964 68,670 138,497<br />

Market Share (%) 83.9 68.7 63.5 47.1<br />

Android 2,502 13,898 26,382 113,457<br />

Market Share (%) 14.2 19.9 24.4 38.6<br />

MeeGo 107 788 1,271 3,057<br />

Market Share (%) 0.6 1.1 1.2 1.0<br />

WebOS 0 2,796 4,245 8,886<br />

Market Share (%) 0.0 4.0 3.9 3.0<br />

QNX 0 3,901 7,134 29,496<br />

Market Share (%) 0.0 5.6 6.6 10.0<br />

Other Operating<br />

Systems<br />

234 432 510 700<br />

Market Share (%) 1.3 0.6 0.5 0.2<br />

Total Market 17,610 69,780 108,211 294,093<br />

Source: Gartner (April 2011)<br />

date, and a few inter-city 100G WDM routes deployed.<br />

Howard adds that street pricing already looks very competitive,<br />

and with a lot of 100G technology development in motion<br />

– more focused than 40G – “we expect 100G pricing to get to 2X<br />

40G pricing in the 2013 timeframe, which should be the turning<br />

point for 100G versus 40G in the service provider market.”<br />

Matthias Machowinski, directing analyst for enterprise networks<br />

and video at Infonetics Research and co-author of the report,<br />

adds: “The market for 1G-and-higher enterprise ports took<br />

a bit of a breather in 2009 during the recession, but came back<br />

in full force in 2010. The enterprise 40G Ethernet port segment<br />

will be one of the most interesting to watch going forward, with<br />

the first shipments expected in 2011, followed by rapid growth<br />

driven by data center deployments.”<br />

www.networksasia.net 2011 june/july • network world asia 5


6<br />

trends&analysis<br />

Risk and unexpected costs in<br />

the ‘cloud sourcing’ revolution<br />

The $820 billion IT services market<br />

is changing quickly and dramatically,<br />

as cloud computing<br />

and offshoring become mainstream,<br />

and CIOs should take steps to manage<br />

inherent risks and unexpected costs<br />

during the cloud services revolution,<br />

according to Gartner.<br />

During the next few years, market<br />

dynamics will determine whether<br />

cloud-enabled outsourcing will be the<br />

demise of traditional outsourcing, if it<br />

will lead to the convergence of services<br />

and products currently marketed “as a<br />

service”, or if it will result in next-generation<br />

outsourcing.<br />

Cloud-driven business and IT services<br />

include all types of solution that are developed,<br />

bundled and packaged as outsourcing<br />

service offerings for which the<br />

business or IT service provider uses one<br />

or more cloud computing technologies.<br />

These services can be delivered directly<br />

by a cloud provider or via a service<br />

aggregator for the delivery of preengineered<br />

and configurable business<br />

solutions in a timely and cost-effective<br />

manner.<br />

“Cloud service sourcing is immature<br />

and fraught with potential hazards.<br />

The hype around cloud computing services<br />

has increased interest, as well as<br />

caution, for CIOs trying to determine<br />

where, when and if cloud services can<br />

provide valuable outcomes for their<br />

businesses,” says Frank Ridder, research<br />

vice president at Gartner. “Organizations<br />

need to develop realistic cloud<br />

sourcing strategies and contracts that<br />

can reduce risk.”<br />

Indonesia tops mobile Internet use in South-east <strong>Asia</strong><br />

AN OVERWHELMING 63% of<br />

Indonesian Internet users have<br />

adopted mobile Internet in April<br />

2011 – placing Indonesia at the<br />

top in South-east <strong>Asia</strong> (SEA) for<br />

mobile Internet use. Compared to<br />

March 2011, mobile Internet use<br />

among Indonesians increased by<br />

over 158% in April 2011.<br />

Effective Measure’s regional director<br />

for SEA, Russell Conrad, credits this<br />

growth to the increasing popularity<br />

of smartphones: “Along with the<br />

boom of Smartphones throughout the<br />

region, a growing number of consumers,<br />

including over five million Indonesian<br />

Internet users, are adopting<br />

mobile Internet to access infotainment,<br />

conduct business and engage<br />

in e-commerce while on the go.<br />

The following details the browsing<br />

patterns of Indonesian mobile<br />

Internet users in April 2011:<br />

• Mobile Internet users stayed on a<br />

webpage at an average of 1.07 minutes,<br />

13 seconds less than PC users<br />

• Each session on mobile Internet lasted<br />

for at an average of 19 minutes,<br />

4.30 minutes more than a PC session<br />

• Mobile internet users viewed an<br />

average of 17 pages per session, 7<br />

pages more than PC users<br />

“The Indonesian market is currently<br />

very exciting. The increased<br />

activity seen on mobile Internet provides<br />

an opportunity for businesses<br />

to target the Indonesian market and<br />

establish mobile-friendly interfaces<br />

to strengthen an online presence,”<br />

says Conrad. NWA<br />

Traditional IT services often find organizations<br />

locked in, fighting with rigid<br />

delivery or hesitation to change when<br />

engaged in traditional IT services deals.<br />

Innovation seldom materializes and solutions<br />

fail to scale, and service providers<br />

often struggle with their profits.<br />

In the new cloud services scenario,<br />

however, flexibility, agility and innovation<br />

are design principles and, over<br />

time, service providers will succeed in<br />

delivering on these principles. The market<br />

also expects scalability, cost-efficiency<br />

and pay-per-use pricing models<br />

from cloud services solutions.<br />

Although cloud services already provide<br />

these, service providers manage<br />

their risks through terms and conditions<br />

that are still immature. However,<br />

Gartner believes that solutions and<br />

their commercial terms are maturing<br />

quickly.<br />

To avoid the potential pitfalls and<br />

hidden costs of cloud sourcing, Ridder<br />

advises organizations to ensure they<br />

understand the short- and long-term<br />

implications of cloud services, on the<br />

demand and supply side, as well as on<br />

the sourcing life cycle itself. The services<br />

sourcing life cycle includes four crucial<br />

elements: sourcing strategy, vendor<br />

selection, contracting, and management<br />

and governance.<br />

“The life cycle is a critical area to plan<br />

and manage, regardless of whether<br />

organizations source their IT services<br />

through internal or external resources.<br />

Our forecasts indicate that organizations<br />

spend 53% of their IT services budget<br />

on external services, and that spending<br />

is growing 3.9% per year, while new<br />

categories of services are experiencing<br />

double-digit growth,” said Ridder. “Organizations<br />

can use Gartner’s extensive<br />

analysis of changes in delivery, pricing,<br />

investment and cost to more effectively<br />

develop their cloud sourcing strategies,<br />

negotiate their cloud services contracts<br />

and manage the performance of their<br />

providers.” NWA<br />

network world asia • june/july 2011 www.networksasia.net


www.networksasia.net 2011 june/july • network world asia 7


8<br />

trends&analysis<br />

TE Connectivity upbeat on fiber prospects<br />

Anticipating an exponential increase in broadband connectivity, the Enterprise <strong>Networks</strong><br />

Group of TE Connectivity Ltd – formerly known as Tyco Electronics Ltd – is now gearing its<br />

products to reduce the cost of cabling installation while serving greater cabling densities and<br />

speed requirements, especially at the exchange and data centers. Khoo Boo Leong reports<br />

Fiber is key to the future. “Fiber<br />

is definitely coming – fiber to<br />

the home, fiber to the antenna,<br />

and fiber to the node,” says Alan<br />

Clarke, president of Network Solutions<br />

at TE Connectivity.<br />

“When you get to LTE and 4G, it’s<br />

got to be fiber to the antenna,” says<br />

Clarke. “There’s not a lot of capacity<br />

on copper twisted pair. People will be<br />

building out fiber networks, and it’s<br />

just as cheap to run fiber as it is to run<br />

copper.”<br />

While horizontal wiring or plenum<br />

cabling will probably not require fiber,<br />

fiber is proliferating in riser cabling<br />

and in data centers, and “we see special<br />

requests for fiber in enterprise networks,<br />

in the military, certain parts of<br />

government, and campus networks. So<br />

it will come,” Clarke adds.<br />

High-density connectivity<br />

Even as fiber standards evolve, TE<br />

has developed the MPOptimate system<br />

– a factory pre-terminated and tested<br />

TE Connectivity’s Thomas Poh (left) and Alan Clarke.<br />

solution – that boasts a high-density<br />

multi-fiber push-on (MPO) connector.<br />

“Products [like the MPOptimate]<br />

allow you to get more connectors in<br />

a run with better performance,” says<br />

Clarke. “We’re also developing highdensity<br />

fiber optic racks and special fiber<br />

optic cables with small diameters.<br />

Those will get incorporated into specifications<br />

but there aren’t any standards<br />

there yet.”<br />

Fitting more fiber terminations into<br />

a rack – and developing simplified and<br />

reduced fiber diameters, including fiber<br />

pigtails with 1.2mm diameter as opposed<br />

to a 2.2mm or 3mm diameter –<br />

reduces congestion in the system, frees<br />

up more channels for air to flow around<br />

the racks and improves cooling.<br />

“If you get good airflow in a reduced<br />

space, then you can reduce the cost of<br />

operating a data center,” says Clarke.<br />

Ease of installation<br />

Making fiber as easy to install as<br />

copper will lead to its growth. One way<br />

is to factory pre-install fiber connectivity,<br />

eliminating the need for installation<br />

in the field.<br />

“Much of the costs now is not in the<br />

material but in the installation,” says<br />

Clarke. “Pre-termination in the factory<br />

not only increases the speed and reliability<br />

of installation but also the overall<br />

installation cost.”<br />

“The use of pre-terminated fiber<br />

solutions speeds up installation by almost<br />

70%, compared to the traditional<br />

way, and the process increases mobility,”<br />

says Thomas Poh, director of marketing<br />

management for TE Connectivity’s<br />

Enterprise <strong>Networks</strong> Group in<br />

<strong>Asia</strong>. “You can add, move and change,<br />

or swing the fiber from one rack to<br />

another easily because it is plug-andplay,<br />

modular and scalable.”<br />

Managing the physical layer<br />

As the merits of fiber extend beyond<br />

cabling density to speed, data center<br />

managers are now paying more attention<br />

to cabling decisions.<br />

“[As speeds go up], if you lay the<br />

wrong infrastructure, it may not support<br />

your future hardware,” Poh says.<br />

“The hardware may be changed every<br />

five years but the infrastructure may<br />

be used up to 15 years.<br />

“[In addition], data centers operating<br />

24/7 that are planning for 40G and<br />

100G connectivity need a reliable supplier<br />

that knows the technology and<br />

has the resources to invest in product<br />

development.”<br />

Ultimately, the data center demands<br />

security, size, and simple access or<br />

identification. “In security, we have<br />

the managed infrastructure; in size,<br />

we’re looking for density of installation;<br />

and in identification, it comes<br />

back to simple cable management,”<br />

Clarke says.<br />

Meanwhile, TE Connectivity’s recent<br />

$400 million contract win to supply<br />

the 100%-fiber Australian National<br />

Broadband Network (NBN) underlines<br />

the trend towards fiber cabling. NWA<br />

network world asia • june/july 2011 www.networksasia.net


Smart Network. Smart Business.<br />

Bigger, Badder and Now with Blades!<br />

The new Alteon 10000 offers up to 80Gpbs ATCA compliance,<br />

incredible performance, and hot-swappable blades<br />

The Alteon 10000 Application Switch is a carrier-grade ATCA-compliant ADC platform that<br />

delivers on demand, extendable throughput of up to 80Gbps of application delivery<br />

capacity for breakthrough performance at any throughput point. It provides advanced<br />

application acceleration capabilities and OnDemand scalability for carriers, mobile<br />

operators, Internet Service Providers and large enterprises data centers that require a<br />

high-end ADC solution. For more information on Alteon 10000, please visit<br />

www.radware.com or contact your nearest reseller.<br />

© 2011 Radware, Ltd. All Rights Reserved. Radware and all other Radware product and service names are registered trademarks of Radware in the<br />

U.S. and other countries.<br />

www.networksasia.net 2011 june/july • network world asia 9


10<br />

coverstory<br />

Taking the plunge<br />

into the cloud<br />

The Amazon Web Service EC2 outage earlier this year has a<br />

silver lining – it has cast off the halo that had been wrapped<br />

around cloud-based strategies.<br />

By Khoo Boo Leong and Sandra Gittlen<br />

Several corporate executives<br />

whom NetworkWorld <strong>Asia</strong> spoke<br />

to maintain that cloud services<br />

offer cost advantages that are just unattainable<br />

through on-site data centers,<br />

but say they now realize they didn’t invest<br />

enough in risk mitigation. For instance,<br />

one CEO said he plans to host<br />

his main database with two different<br />

cloud services, just in case one goes<br />

down.<br />

Such disaster recovery planning is<br />

not unlike the traditional enterprise<br />

where companies run multiple connectivity<br />

lines from different service<br />

providers into the data center, in case<br />

one suffers a backhoe cut or some other<br />

failure. Several executives said this<br />

same logic applies to the most critical<br />

applications being hosted in the cloud.<br />

Not-so-risky business<br />

Placed in a larger context, cloud<br />

computing still poses less risk than<br />

outsourcing of finance and accounting<br />

processes to overseas companies.<br />

In a recent Ovum survey of CFOs and<br />

senior financial executives at UK and<br />

US enterprises with a turnover of more<br />

than $500 million, 29% of respondents<br />

said they viewed cloud computing as<br />

posing an unacceptable risk, compared<br />

to 38.5% for offshoring to India and<br />

44.2% for offshoring to South & Central<br />

America. India is the most popular offshoring<br />

destination but it is also ranked<br />

lowest on satisfaction rates.<br />

“Offshoring to low-cost locations<br />

was deemed to be very high-risk, and<br />

the companies we spoke to expressed<br />

a strong desire to keep these functions<br />

with their current employees,” says Peter<br />

Ryan, Ovum lead analyst.<br />

It is no surprise then that the inaugural<br />

data center industry survey of<br />

Uptime Institute found that 74% of its<br />

respondents had deployed or were considering<br />

some form of cloud computing,<br />

primarily private cloud.<br />

“Enterprises that are considering<br />

deployment of a private-public cloud<br />

infrastructure model must ensure that<br />

the security for the existing enterprise<br />

is at, or better than, industry standard,”<br />

says Steve Hassell, president of Emerson<br />

Network Power’s Avocent business.<br />

“If there is any question as to whether<br />

the existing enterprise infrastructure is<br />

secure, then it probably means that improvements<br />

should be made. There are<br />

a host of security consulting firms that<br />

can provide the audits to determine if<br />

gaps exist. The point is that before connecting<br />

to a public cloud vendor, the<br />

enterprise must have its own house in<br />

order.”<br />

Before embarking on any cloud initiative,<br />

enterprises have to know the<br />

problems they are trying to solve. Amid<br />

the hype surrounding the benefits of<br />

the cloud, “engagement in a strategic<br />

direction without a thorough understanding<br />

of the problem to be solved or<br />

the requirements, is folly,” says Hassell.<br />

MNC uptake<br />

Corroborating the Uptime Institute’s<br />

findings are the recently released results<br />

of a survey by Ovum for Cable &<br />

Wireless. The survey of more than 100<br />

global MNCs reveals that adoption of<br />

cloud services is up 61% from a year ago<br />

with 45% of MNCs already using cloud<br />

sourcing for at least some elements of<br />

key IT services.<br />

<strong>Asia</strong>-Pacific MNCs show the greatest<br />

cloud interest, with 63% uptake across<br />

all cloud services categories, including<br />

networking, communications, applications,<br />

corporate IT systems, as well as<br />

data management, security and backup.<br />

Fifty one percent of respondents have<br />

deployed data backup and storage, with<br />

an additional 33% planning to procure<br />

cloud data backup and storage services<br />

in the next 24 months.<br />

Breaking the results down by industry<br />

sectors, 56% of finance and insur-<br />

network world asia • june/july 2011 www.networksasia.net


ance companies have adopted cloud<br />

services for some elements of corporate<br />

IT systems while 63% and 59% of respondents<br />

in the manufacturing sector<br />

are implementing cloud components<br />

for networking and data management,<br />

respectively.<br />

From an applications perspective,<br />

half of the professional services sector<br />

respondents focus on customer relationship<br />

management (CRM), while<br />

half of finance and insurance respondents<br />

place strong emphasis on document<br />

management. Messaging and<br />

CRM are the most important applications<br />

for the manufacturing sector.<br />

“We believe the majority of MNCs<br />

are currently between ‘early’ and ‘adolescent’<br />

adoption phases of cloud-based<br />

services, with broader and deeper<br />

adoption being contemplated,” says<br />

Evan Kirchheimer, practice leader for<br />

enterprise services at Ovum.<br />

“However, greater adoption is dependent<br />

on the resolution of security,<br />

governance and reliability and once<br />

these concerns are addressed through<br />

standardized, tested offers from service<br />

providers, more large enterprises will<br />

feel comfortable positioning cloud as a<br />

preferred procurement option,” Kirchheimer<br />

adds.<br />

Three quarters of MNCs surveyed<br />

rate scalability of capacity and matching<br />

of capacity to fluctuating demand as<br />

the main benefits from the use of cloud<br />

services, with increased speed of provisioning<br />

coming in a close third.<br />

While retail respondents rely on scalability<br />

and matching capacity to demand<br />

as major benefits, finance and<br />

insurance companies see improved<br />

employee productivity as a major attraction.<br />

The manufacturing sector<br />

views cost transparency as far more important<br />

than other verticals.<br />

One relevant finding from the research<br />

is that telecommunication providers<br />

are emerging as trusted partners<br />

and credible suppliers for cloud services.<br />

“Telecommunications providers’<br />

control of the network over which cloud<br />

services are delivered is becoming a<br />

compelling advantage, as it allows them<br />

to offer end-to-end service level agree-<br />

ments,” explains Kirchheimer. “This allays<br />

many of the security concerns enterprises<br />

have expressed over use of the<br />

public internet to access cloud services<br />

and general security, data governance<br />

and loss of control.”<br />

“We are seeing a massive build out of<br />

new data center space all dedicated to<br />

cloud initiatives,” says Avocent’s Hassell.<br />

“This is the largest build out of<br />

new space since the entry of [virtualization]<br />

and the data center consolidation<br />

movement that followed.”<br />

SMB boom<br />

Another positive statistic – one that<br />

will cheer managed service providers<br />

in particular – comes from Microsoft’s<br />

global SMB Cloud Adoption Study<br />

2011. Within the next three years, the<br />

study reported, 39% of SMBs expect to<br />

pay for one or more cloud services, an<br />

increase of 34% from the current 29%.<br />

Even the number of cloud services<br />

SMBs will pay for will nearly double in<br />

most countries within this period.<br />

Among services such as collaboration,<br />

data storage and backup, or<br />

business-class email, Microsoft’s study<br />

finds that SMBs paying for cloud services<br />

will be using 3.3 services, up from<br />

fewer than two services today. The<br />

SMB’s choice of service provider will be<br />

determined by past experience with its<br />

support. Related to that, 82% of SMBs<br />

consider a provider’s local presence a<br />

critical or important factor in cloud service<br />

buying decisions.<br />

“As SMBs continue to transition to<br />

cloud services, hosting service providers,<br />

VARs and SIs will have a major<br />

role to play as advisors and providers<br />

of IT services in hybrid environments,”<br />

said Andy Burton, CEO of Fasthosts<br />

Internet Ltd. “Hosting providers have<br />

expertise in selling cloud services while<br />

VARs and SIs have experience selling<br />

to SMBs. Fasthosts is helping to bridge<br />

this gap by helping VARs and SIs whitelabel<br />

cloud services and deliver them as<br />

if they were their own.”<br />

It is obvious that cloud adoption will<br />

be gradual. The Microsoft study forecasts<br />

that 28% of workloads will still<br />

remain on-premise within three years<br />

while 43% of workloads will become<br />

paid cloud services and 29% will be free<br />

or bundled with other services.<br />

One tip for managed service providers<br />

is that SMBs that are adopting both<br />

SaaS and IaaS services are larger, more<br />

growth-oriented and more interested<br />

in additional services, such as unified<br />

communications and remote desktop<br />

support. Yet another is that affordable<br />

pay-as-you-go pricing cloud services<br />

are attractive for businesses, particularly<br />

SMBs that want to maintain their<br />

size, but want to become more profitable<br />

without high overhead costs.<br />

Amazon Web Services’ EC2 outage<br />

may affect the attractive cost model of<br />

cloud-based services a little. A multiday<br />

outage would most likely have a<br />

more negative impact than a slight rise<br />

in operational expenses. This is where<br />

the CFO has to couple an IT staff plan<br />

with plans for what-if scenarios that fit<br />

the enterprise’s risk tolerance profile.<br />

For some businesses, the multi-day<br />

outage that some Amazon customers<br />

suffered would not be a hardship; for<br />

others, an hour of downtime would be<br />

too much. This has to be considered<br />

even with a well-established service<br />

provider.<br />

The Amazon name would still be synonymous<br />

with uptime and the brand<br />

is established, but cloud services are<br />

new and nothing should be taken for<br />

granted.<br />

Wise SMBs should be cautious.<br />

Bryan Sartin, director of Investigative<br />

Response at Verizon Business, which<br />

recently released its 2011 Data Breach<br />

Investigations Report, says: “In 2010,<br />

70% of the companies victimized by<br />

data breaches were in the 11-to-100<br />

employee range.”<br />

Sartin acknowledges that while cloud<br />

computing has obvious advantages,<br />

“there is no question we do see a lot of<br />

breaches in the cloud.”<br />

Judging the host<br />

But all is not doom and gloom. “Although<br />

we see a lot of breaches in<br />

cloud-managed or externally managed<br />

continued on page 12<br />

www.networksasia.net 2011 june/july • network world asia 11


12<br />

coverstory<br />

continued from page 11<br />

or hosted environments, we see almost<br />

no evidence of breaches on virtualized<br />

platforms,” says Sartin. “That suggests<br />

some kind of advantages with that concept.”<br />

Security-wise, however, not all cloudbased<br />

services are built alike. There are<br />

world-class hosting facilities and then,<br />

there is everybody else. Sartin cited<br />

a case that his colleague investigated<br />

where the big established player in the<br />

hosting space that a company thought<br />

they employed turned out to be a facility<br />

hosted on the back of trailer “and<br />

the only HVACs are fans blowing at the<br />

servers”.<br />

“The admin was standing in the<br />

trailer with no shoes on and there is a<br />

bedroom back there,” Sartin says. “Our<br />

investigator asks this guy, ‘There is no<br />

antivirus in here. What are you doing<br />

about malcode?’ The guy looked at him<br />

like he was a complete idiot and says,<br />

‘Antivirus? I live here. I am the antivirus!’<br />

I’m sure all cloud services are not<br />

like that but it just shows that companies<br />

have to do their homework.”<br />

Some basic questions that enterprises<br />

should ask their cloud service<br />

providers include: Who is in charge of<br />

security when data is out in the cloud?<br />

Where is the data located? Who is the<br />

service provider that’s holding the data<br />

and where are the lines<br />

of responsibilities in the<br />

event of a security investigation?<br />

Does the company<br />

have the ability to<br />

even audit or investigate<br />

a problem on its own systems?<br />

A useful tool for businesses<br />

selecting a cloud<br />

provider is the Uptime<br />

Institute’s data center tier systems for<br />

ranking data center reliability – the<br />

Operational Sustainability Standard<br />

(OSS) and the Tier Classification System<br />

(TCS).<br />

“The TCS ensures a data center facility<br />

is designed and built to deliver<br />

uptime in accordance with its business<br />

requirements [while the] OSS ensures<br />

the site is managed to sustain that level<br />

of availability over the long-term,” said<br />

Julian Kudritzki, vice president of Uptime<br />

Institute, LLC.<br />

The TCS classifies data centers into<br />

four tier levels, I to IV. Tier IV sites are<br />

sites “capable of the highest level of uptime<br />

by providing both maintenance<br />

opportunities and fault response”.<br />

The OSS complements the TCS with a<br />

universal rating system – Gold, Silver,<br />

Bronze – for evaluating, comparing and<br />

promoting a data center’s ongoing operational<br />

capabilities based on its Tier<br />

objective. For instance, a data center<br />

Sartin<br />

could be rated Tier IV<br />

Silver.<br />

“When selecting a<br />

public cloud vendor, it<br />

is important to verify the<br />

vendor’s security capabilities<br />

are as stringent,<br />

or preferably better, than<br />

those within the client<br />

enterprise,” Hassell suggests.<br />

“Security concerns<br />

do not only relate to the logical layer<br />

but the physical Infrastructure and facilities<br />

as well.”<br />

Enterprises must review the vendor’s<br />

references, and certifications to ensure<br />

the vendor has the experience and a<br />

solid service record. It is also important<br />

to ensure the financial health of<br />

the vendor, especially if the enterprise<br />

intends to work with the vendor long<br />

term.<br />

Ultimately, the cloud should enable<br />

the strategic goals of the enterprise.<br />

There are vendors that provide advisory<br />

services to help the enterprise<br />

define cloud requirements but having<br />

a thorough understanding of the requirements<br />

prior to evaluating vendors<br />

or even the cloud advisory service providers,<br />

for that matter, will expedite the<br />

vendor selection process and improve<br />

the quality of the overall outcomes,<br />

Hassell says.<br />

Practical reality<br />

Meanwhile, far from being a byword<br />

for data security disasters, cloud computing<br />

remains a promising enterprise<br />

platform. While enterprises may delay<br />

cloud adoption due to concerns surrounding<br />

data security, privacy and<br />

compliance, practical frameworks exist<br />

to deliver the trust, security and<br />

compliance that enterprises demand<br />

when moving data, applications and<br />

systems to the cloud.<br />

Information security company<br />

SafeNet, for example, offers such a<br />

framework, which includes a unified<br />

authentication infrastructure for both<br />

on-premise and cloud-based services;<br />

data encryption and isolation in multi-<br />

continued on page 14<br />

network world asia • june/july 2011 www.networksasia.net


www.networksasia.net 2011 june/july • network world asia 13


14<br />

coverstory<br />

continued from page 12<br />

tenant environments; critical Ethernet<br />

link encryption for cloud-based or<br />

internally hosted data center connections.<br />

“Cloud computing has not only revolutionized<br />

the way IT is delivered,<br />

but represents a clear business model<br />

where true adoption occurs when enterprises<br />

believe their mission-critical<br />

data is protected and secure,” says<br />

Chris Fedde, President and COO of<br />

SafeNet.<br />

To help enterprises secure their data<br />

on cloud storage volumes and comply<br />

with requirements such as PCI DSS 2.0,<br />

SafeNet offers pre-launch authentication,<br />

storage encryption and key management<br />

for cloud environments.<br />

SafeNet Inc.’s server- and storagebased<br />

encryption, for instance, allows<br />

administrators to encrypt complianceimpacted<br />

data such as cardholder data<br />

running on Amazon EC2 and Amazon<br />

EBS volumes.<br />

“With cloud computing, security is a<br />

shared responsibility between the cloud<br />

provider and customers,” said Russ Dietz,<br />

CTO of SafeNet, which is working<br />

with Amazon Web Services (AWS) in<br />

helping enterprises to manage virtual<br />

services and control pre-launch authentication<br />

and authorization running<br />

in the AWS cloud environments.<br />

Further addressing concerns about<br />

data location, data loss and data security<br />

– barriers to cloud-computing adoption<br />

– SafeNet teamed up with NetApp last<br />

year to expand its encryption, authentication<br />

and standards-based key management<br />

capabilities to include protection<br />

for emerging SaaS, public, private,<br />

and hybrid cloud delivery models.<br />

At the same time, a slew of appliances<br />

and chassis-based multi-threat security<br />

platforms help cloud-hosting providers<br />

and cloud service providers to protect<br />

the confidentiality and integrity of subscribers’<br />

data and deliver cloud-based<br />

network security services. They also ensure<br />

that large enterprises protect the<br />

data within private and hybrid clouds.<br />

Fortinet, a network appliance vendor,<br />

centers its cloud strategy on<br />

carrier-grade security appliances<br />

such as its recently<br />

announced FortiGate-3140B.<br />

The appliance supports VPN,<br />

IPS, application control, antispam<br />

and anti-virus security<br />

measures concurrently.<br />

Featuring ten 10Gb Ethernet<br />

ports, it is powered by three<br />

ASIC processors: A network<br />

processor to handle firewall<br />

functions; a content processor<br />

to handle anti-virus and<br />

web content filtering; and a<br />

security processor to enhance intrusion<br />

prevention.<br />

Two of those ports are directly linked<br />

to the appliance’s security processor<br />

and they handle flow-based inspection<br />

for Web filtering and traffic shaping.<br />

“Proxy-based inspection is more secure<br />

than flow-based, but flow-based<br />

is better in performance,” says George<br />

Chang, the regional director for Southeast<br />

<strong>Asia</strong> and Hong Kong at Fortinet.<br />

“We provide the option to deploy a<br />

proxy-based or a flow-based solution.<br />

For a flow-based solution, we’ve added<br />

[applications such as] anti-virus, IPS<br />

inspection, application control and<br />

IPv6 firewall inspection as well as DLP.”<br />

With these added features, “the security<br />

appliance [must not] be a bottleneck<br />

in terms of information coming in<br />

and information going out. The speed<br />

at which it [inspects data] has to be<br />

fast as well,” says Dennis Aloysius Tan,<br />

Fortinet’s regional channel sales manager.<br />

“We are not only accelerating the security<br />

functions and pushing it down to<br />

our custom-built ASICs but we are also<br />

accelerating IPv6 traffic,” Bernie Png,<br />

Fortinet’s system engineer for Singapore,<br />

Vietnam and Brunei, points out.<br />

“Most vendors can do IPv4 filtering<br />

well but when they hit IPv6 traffic, their<br />

box slows down because they do not<br />

have a custom ASIC to process IPv6’s<br />

128-bit addresses, instead of IPv4’s 32bit<br />

addresses, be it on an appliance or a<br />

server CPU.”<br />

“Establishing network security now<br />

is like securing an airport,” says Chang.<br />

“Within an airport, you have the pub-<br />

Protecting data centers and<br />

enabling cloud services<br />

lic area and the boarding area which is<br />

out-of-bounds to visitors. Similarly, we<br />

don’t just have a firewall purely securing<br />

the corporate network behind it<br />

but it secures different areas, different<br />

groups, and different user profiles or<br />

usage behaviors.”<br />

Indeed, networking giant Cisco is<br />

extending beyond the firewall in helping<br />

branch offices to leverage cloudbased<br />

services without compromising<br />

on performance, security or mobility.<br />

Its Cisco Flex 7500 Series Cloud Controller<br />

targets multi-site wireless deployments.<br />

It can be used to centrally<br />

manage and control up to 500 branch<br />

locations, 2,000 access points and over<br />

20,000 clients from a single data center.<br />

Also, IT managers can configure<br />

wireless policies, management and security<br />

settings remotely.<br />

Complementing the cloud controller<br />

is the Cisco ISR Cloud Web Security<br />

with Cisco ScanSafe solution, which<br />

extends centralized Web protection<br />

and malware detection on Cisco ISR<br />

G2 branch routers to branch offices.<br />

The simple Web security solution requires<br />

no additional hardware and relies<br />

on a cloud service delivery model<br />

with central user account administration.<br />

“We were looking to centralize the<br />

management of wireless connections<br />

in our corporate headquarters, distribution<br />

facility and our retail stores,<br />

which each rely on wireless connectivity<br />

for handheld scanners, phones, and<br />

printers,” said Steve Marshall, director<br />

of IT services at Bass Pro Shops, which<br />

deployed the Cisco Flex 7500 Series<br />

Cloud Controller. “Now, we will be able<br />

network world asia • june/july 2011 www.networksasia.net


to reduce costs by eliminating the need<br />

for a controller at each store to manage<br />

the wireless networks.”<br />

Application delivery and<br />

performance<br />

Apart from security concerns, one of<br />

the biggest inhibitors to the widespread<br />

use of cloud-based services is user<br />

frustration with poor application performance.<br />

Businesses supporting customer-facing<br />

web applications should<br />

“really focus on what’s most important<br />

– the impact of anything they do on the<br />

Web to the end user,” says Jonathan<br />

Ranger, the director of Benchmarks at<br />

Compuware Corp, whose Gomez application<br />

performance management<br />

(APM) platform integrates web performance<br />

management, web load testing<br />

and web performance business analysis<br />

to gauge the business impact of cloud<br />

computing.<br />

Although most cloud providers do offer<br />

an SLA promising 99.9% uptime or<br />

other broad guarantees, few cloud providers<br />

offer performance metrics from<br />

the end-user perspective, and even<br />

fewer offer SLAs based on web performance<br />

– the response time or speed at<br />

which applications or services are delivered<br />

to an end user.<br />

Traditional performance management<br />

solutions only monitor the databases,<br />

servers or network – mainly<br />

“siloed” components in the data center.<br />

But the application delivery chain links<br />

a company’s infrastructure to the ISP,<br />

the Internet, third-party cloud providers,<br />

content delivery networks (CDNs),<br />

local ISPs and wireless carriers through<br />

to the myriad combinations of browsers<br />

and operating systems that run on<br />

users’ desktops.<br />

Problems regularly occur at various<br />

points in the chain, causing end users<br />

to experience slow transactions and response<br />

times; failed transactions and<br />

time outs; dramatically different response<br />

times in different locations; and<br />

pages that don’t work or display properly<br />

in some browsers or devices.<br />

The Compuware Gomez performance<br />

benchmarks measure website<br />

home page and transaction perfor-<br />

Belden DC (26.5.11) Ad Option5B_Layout 1 26/5/11<br />

mance<br />

10:54<br />

across<br />

AM<br />

multiple<br />

Page 1<br />

browsers. The<br />

Belden ® Redefines<br />

Data Centers<br />

Belden knows your data center is much more than<br />

a space that simply houses servers and network<br />

equipment.<br />

Fueled by e-commerce and the IP world we live in today, the<br />

data center has become the most critical asset and investment for<br />

nearly every organization.<br />

It is truly the operations center of your business, housing all the missioncritical<br />

applications, equipment and systems you need to enable every<br />

transaction, communication and task, providing the links to customers, business<br />

partners and vendors around the world and even controlling building environmental,<br />

security and life safety systems.<br />

Belden ® , Your Data Center Partner<br />

Singapore<br />

27 International Business Park<br />

#05-01 iQuest@IBP<br />

Singapore 609924<br />

Tel: +65 6879 9800 Fax: +65 6564 9602<br />

India<br />

16th Floor, Tower B<br />

Unitech Cyberpark Sector 39<br />

Gurgaon Haryana, 122001<br />

Tel: (91) 124 450 9999 Fax: (91) 124 450 9900<br />

China<br />

Unit 1301, No. 19 Building<br />

1515 Gu Mei Road<br />

Caohejing High Tech Park, ZIP 200233<br />

Tel: (8621) 5445 2388 Fax: (8621) 5445 2366 / 77<br />

For more information: datacentre@beldenapac.com<br />

www.beldenapac.com • www.belden.com<br />

benchmarks rank the web and mobile<br />

performance of companies across three<br />

key metrics — response time, availability<br />

and consistency.<br />

Response time refers to the full render<br />

time of a page. “We also track transactional<br />

processes, such as go to a retail<br />

home page, search for an item, put an<br />

item in a shopping cart, go to checkout<br />

all the way to just prior to purchasing,”<br />

Ranger explains. “With availability, the<br />

concept of 99.99% is an inside-the-firewall<br />

concept. When you move outside<br />

the firewall, it is very difficult to produce<br />

four 9’s; the numbers are sometimes<br />

considerably lower than 99.99%<br />

uptime.”<br />

The third component is consistency<br />

of response time over a period of typically<br />

two weeks or one month. Compuware<br />

publishes its benchmarks<br />

monthly, sometimes every two weeks.<br />

Consistency is a key contributing factor<br />

to brand loyalty for a site.<br />

Compuware plans to introduce other<br />

metrics such as efficiency, which links<br />

response times to the byte size of a web<br />

page being downloaded. NWA<br />

Australia<br />

Level 1, 810 Pacific Highway<br />

Gordon,NSW 2072<br />

Tel: +1800 50075 (Toll Free)<br />

Fax: (612) 9499 8756<br />

www.networksasia.net 2011 june/july • network world asia 15


16<br />

techtips<br />

Five tips for secure cloud computing<br />

by Vic Mankotia<br />

Risks of the cloud have recently become an issue with<br />

well-publicized failures in popular public cloud services.<br />

Organizations are thus under more pressure<br />

than ever to evaluate their management solutions, including<br />

those focused on security and how they are deployed as<br />

they get onto the cloud. Here are five general tips for companies<br />

getting on the cloud:<br />

#1: Consider the full business case<br />

Choose carefully as to which of your services should<br />

and should not go onto the cloud. For example, while Infrastructure-as-a-service<br />

(IaaS) cloud computing services<br />

can certainly have a cost advantage for raw computing and<br />

bandwidth charges, it may not be as cost effective for enterprise<br />

services with higher availability and reliability needs,<br />

at least for now. The complexity and cost of building an<br />

equivalent system within public cloud services often nullifies<br />

much of the expected savings while offering a more<br />

opaque operating environment.<br />

#2: Plan for problems<br />

Enterprises should decide which services are vital<br />

to their customers and/or to their own continuity, and<br />

whether these services should go on the cloud, no matter<br />

the savings. In addition, there should be contingency<br />

planning, both for downtime in the traditional infrastructure<br />

or in the cloud. Many companies still assume that resilience<br />

is automatically delivered as part of a public cloud<br />

service, but like anything else, this must also be planned<br />

for. A basic truism remains if the cloud service provider<br />

goes down, it is still the business which will take the blame<br />

from its customers.<br />

#3: Read the fine print<br />

Enterprises need to fully understand what the service<br />

level agreements (SLAs) with their service providers actually<br />

cover. For example, a performance degradation in the<br />

provider’s network can hurt a company’s reputation just<br />

as badly as a complete cloud outage, so service provider<br />

uptime is not the only criterion to consider in cloud performance.<br />

SLAs should detail obligations such as what the<br />

service provider must do when disruptions occur, the penalties<br />

for failing to deliver, maximum recovery periods, and<br />

the procedures (and extra costs) if a company should want<br />

to change cloud providers.<br />

#4: Track your users and their usage<br />

Companies need to find solutions to manage their<br />

user identities and their access to both on-premise and<br />

cloud-based applications. As organizations migrate<br />

more business-critical applications to the cloud, robust<br />

identity and access management that bridges the hybrid<br />

environment is essential to properly and efficiently<br />

control the organization’s IT assets. In addition, the<br />

management of mobile access and authentication which<br />

supports a mobile environment will also become more<br />

important. In the age of multiple access devices, many<br />

of which are not managed by the organization, usage<br />

must still remain secure and reliable.<br />

#5: Know where your data is<br />

Even if a corporation just stores peripheral data in the<br />

cloud, the organization would need to provide enterprisegrade<br />

security processes to protect that data both at rest<br />

and in motion. Storage locations will vary in a cloud environment<br />

depending on the cloud provider, much more<br />

so than with a traditional data center environment which<br />

generally doesn’t change that often. An enterprise-grade<br />

solution that addresses regulatory compliance, content<br />

and context should be used.<br />

In conclusion, an organization interested in using the<br />

public cloud today needs to make IT more secure across<br />

the physical and virtual as well as cloud environments,<br />

have a good understanding of what third-party cloud service<br />

providers can offer, and ensure it has solutions in<br />

place that support<br />

• identity and access management,<br />

• multiple channels of information access,<br />

• multiple data storage locations,<br />

• compliance,<br />

• improved operational efficiency,<br />

• reliability, and<br />

• scalability. NWA<br />

Vic Mankotia is the <strong>Asia</strong> Pacific<br />

vice president for security at CA<br />

Technologies.<br />

network world asia • june/july 2011 www.networksasia.net


Advertorial<br />

Dealing with the social media phenomenon<br />

CIOs ponder whether or not social media should be allowed in the corporate network.<br />

The proliferation of social media in our daily<br />

lives is undeniable. Today, more than ever,<br />

every aspect of our lives is being dominated<br />

by Facebook, Twitter, YouTube, Quora, Foursquare<br />

and the likes.<br />

This inescapable reality has also permeated corporate<br />

life as companies struggle to deal with the<br />

phenomenon. This has in turn put a strain on managing<br />

such software applications on today’s typical<br />

enterprise IT infrastructure.<br />

Song Tang-Yih, vice president of <strong>Asia</strong> Pacific<br />

sales for Palo Alto <strong>Networks</strong>, says there are new<br />

challenges every day in the social network realm<br />

with regard to the enterprise landscape.<br />

“At a recent conference I attended, one CIO said<br />

to me, ‘Users today are in control. But at the same<br />

time, another said, ‘Users are [also] out of control!’<br />

This is the dilemma that CIOs face – whether or not<br />

to let social networking into the enterprise network,”<br />

Song told an IT roundtable discussion sponsored by<br />

Palo Alto <strong>Networks</strong> in May 2011 in Kuala Lumpur.<br />

Song noted that social network applications have<br />

both good and bad sides. For instance, Skype may<br />

be perceived as a good tool to improve productivity.<br />

Also, employees today are deeply immersed in<br />

social media and many of them question why they<br />

can’t use Facebook and Twitter inside the corporate<br />

network.<br />

“But not many know that Skype can also be used<br />

to transfer encrypted files outside the corporate network,”<br />

he explained. “These may be confidential<br />

files and the IT department can’t track them as it<br />

detect read what’s being sent.”<br />

Attendees’ reactions at the roundtable over the<br />

use of social media in corporate networks were<br />

mixed, with views ranging from a strict “no” to “some<br />

features being allowed.”<br />

A spokesperson for a regional bank noted that her<br />

organization only allows wall posting on Facebook<br />

as its C-level executives realized the importance of<br />

such features for the purpose of interacting with its<br />

customers.<br />

Another financial-related organization noted that<br />

only its telemarketers were allowed access to an<br />

otherwise blanket “no to Facebook” policy.<br />

Song however pointed out that decisions on IT in<br />

today’s enterprise shouldn’t be binary, noting that<br />

there should be a choice for enterprises to decide.<br />

He explained: “Essentially it’s about having the<br />

architecture and technology that gives a CIO the<br />

visibility he needs to make decisions. A CIO’s typical<br />

concern is how to mitigate against risks that he<br />

can’t see. Without this assessment he can’t protect<br />

his data center. He must have the technology to ask<br />

three questions:<br />

• What are the kinds of applications traversing<br />

the network?<br />

• Who are using these applications?<br />

• What kind of content is actually running within<br />

these applications?<br />

Jonathan Tan, managing director for ASEAN sales<br />

at Palo Alto <strong>Networks</strong>, noted that CIOs need to have<br />

this visibility as users today are much more IT-savvy<br />

than before.<br />

“Simply put, if you [a CIO] don’t know what’s going<br />

on in the network, you can’t be in control,” Tan said,<br />

adding that they must have the ability to be able to<br />

define policies and to regulate it, and be able to do<br />

this as quickly as possible.<br />

In Palo Alto <strong>Networks</strong>’ latest “Application Usage<br />

and Risk Report”, Song noted that applications using<br />

SSL in some way, shape or form represented<br />

40% of the applications found and 36% of the overall<br />

bandwidth used.<br />

Song said the report also noted that this segment<br />

of applications will continue to grow as more applications<br />

follow Twitter, Facebook and Gmail, all of<br />

which have enabled SSL either as a standard setting<br />

or as a user-selectable option.<br />

Data from the report, Song noted, was collected<br />

as part of Palo Alto <strong>Networks</strong>’ customer evaluation<br />

methodology, where a Palo Alto <strong>Networks</strong> next-generation<br />

firewall was deployed to monitor and analyze<br />

the network application traffic.<br />

For more on this report and findings, go to<br />

http://www.paloaltonetworks.com/news/press_releases/2011-0511-aur-report.html<br />

www.networksasia.net 2011 june/july • network world asia 17


18<br />

update<br />

How to make friends and safeguard people<br />

Social networking sites are rapidly<br />

gaining in user base – Facebook<br />

alone has recorded half<br />

a billion active users – and, not surprisingly,<br />

attracting scammers and<br />

cybercriminals. Sophos’ latest Social<br />

Security report highlights the steadily<br />

growing number and diversity of malware,<br />

phishing and spam attacks on<br />

social networks throughout 2010.<br />

Among the report’s findings, 40% of<br />

social networking users quizzed have<br />

been sent malware such as worms via<br />

social networking sites, a 90% increase<br />

from a year ago; 67% say they have<br />

been spammed via social networking<br />

sites, more than double the proportion<br />

less than two years ago; and 43% have<br />

been on the receiving end of phishing<br />

attacks, more than double the figure<br />

since 2009.<br />

“One of the biggest concerns about<br />

pure-play cloud services such as Hotmail,<br />

Gmail, Facebook and Twitter is<br />

that you use a Web browser [to access]<br />

data [in someone else’s control],” says<br />

Paul Ducklin, head of Technology for<br />

<strong>Asia</strong> Pacific at Sophos. “It is an issue of<br />

control that goes along with security.”<br />

The whole goal of social networking<br />

is sharing and, as Ducklin points out,<br />

unregulated sharing is the enemy of<br />

security.<br />

Cisco, via its Cybercrime Return on<br />

Investment (CROI) Matrix, predicted<br />

earlier this year that social networking<br />

scams will not be a significant area<br />

for cybercriminals to invest resources<br />

in. But these scams are declining only<br />

in relation to the rising prevalence of<br />

data-theft Trojans such as Zeus, easyto-deploy<br />

Web exploits, and money<br />

mules.<br />

Human factor<br />

Most cybercrime exploits hinge not<br />

only on technology but also on the<br />

all-too-human tendency to misplace<br />

trust. This year’s Cisco Annual Security<br />

Report lists seven “deadly weaknesses”<br />

that cybercriminals exploit<br />

through social engineering scams<br />

– whether in the form of e-mails, social<br />

networking chats or phone calls.<br />

The seven weaknesses are sex appeal,<br />

greed, vanity, trust, sloth, compassion<br />

and urgency.<br />

Cheri McGuire, vice president of<br />

Global Government Affairs & Cybersecurity<br />

Policy at Symantec Corp, points<br />

out that an attacker armed with a victim’s<br />

employment details and company<br />

email address along with the<br />

victim’s personal profile information,<br />

can create a convincing ruse or spoof<br />

a message to other members of the vic-<br />

On Earth, everyone may be within six<br />

degrees of separation from one another,<br />

but in the social networking world, the<br />

separation feels more like one degree.<br />

By Khoo Boo Leong<br />

tim’s social network, especially his or<br />

her colleagues.<br />

“While increased privacy settings<br />

can reduce the likelihood of a profile<br />

being spoofed, a user can still be exploited<br />

if an attacker successfully compromises<br />

one of the user’s friends,”<br />

says McGuire. “All it takes is a single<br />

negligent user or unpatched computer<br />

in the employee’s list of friends to<br />

give attackers a beachhead into their<br />

organization from which to mount additional<br />

attacks on the enterprise from<br />

within.”<br />

Since social networking sites are<br />

built on implied trust, and on the<br />

premise that people share information<br />

and experiences with each other, the<br />

problem lies with people not knowing<br />

what ‘private’ information is. “Private<br />

information could be a real name, telephone<br />

number, address, country club<br />

membership, school, or even the name<br />

of their doctor,” McGuire says. “If such<br />

information falls into the hands of<br />

fraudsters with malicious intent, they<br />

can use it to access your bank account,<br />

or make fraudulent payments online.”<br />

Unfortunately, occasional lapses like<br />

the hacking incident on Mark Zuckerberg’s<br />

page caused by Facebook’s<br />

continued on page 20<br />

network world asia • june/july 2011 www.networksasia.net

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!