Sie sind auf Seite 1von 23

Softlayer Overview

© 2015 IBM Corporation


Agenda

A) Softlayer unique advantages

B) Softlayer – from simple to crazy architectures

2 © 2015 IBM Corporation


Agenda

A) Softlayer unique advantages

3 © 2015 IBM Corporation


Working Definition

Cloud (n) On-demand Compute with Consumptive billing


• On-demand
Rapidly provisioned services
• Compute
Servers, network, storage, firewalls, ancillary services
• Consumptive billing
Turns traditional fixed IT costs into variable – monthly or hourly

Initial model—virtualized multi-tenancy computing—does not meet


requirements for 100% of applications and use cases
For broadest applicability, user-selectable levels of performance, security
and isolation are required

4 © 2015 IBM Corporation


SoftLayer, an IBM company, challenges the norm for cloud
providers that all resources are shared and virtual. SoftLayer
gives our Enterprise clients choices

The initial cloud


SoftLayer® embraces
revolution was based on
the idea that:
assumptions such as:

… virtualization
All resources But cloud is a choice with
are virtualized a flexible set of
computing But you
options
needs have have the
evolved. ultimate
… resources can
All resources be shared, CHOICE
are shared dedicated
or mixed

5 © 2015 IBM Corporation


Competitive Differentiators: What Makes SoftLayer Different?

Performance Flexibility Control


Consistent A range of options - Self service or
compute power bare metal, virtual fully managed with a full
and a high performance server instances and featured Infrastructure
global network private clouds Management System
for self-service IaaS. support a dynamic hybrid and robust APIs
cloud strategy. to support a dynamic
cloud strategy.

6 © 2015 IBM Corporation


IBM IaaS – SoftLayer
Which cloud deployment model is a good fit for you?

Public Virtualized
Private Virtualized
Dedicated Bare Metal
SoftLayer an IBM Company Global high-performance network
Single-pane management

Cloud agility – Robust network with Scalable common hardware


Complete Control Pay-as-you-go
Build YO Cloud secure access building blocks

SoftLayer
SoftLayer SoftLayer
A B

Dedicated private cloud services Shared public cloud services


Dedicated (bare metal) cloud (virtualized) (virtualized)

 Dedicated servers (bare metal and virtual), virtual servers  Common x86 hardware architecture for all SoftLayer
(private or public shared multi-tenant ) cloud models – ease of scalability and adoption of
 Complete control of your cloud environment (2000’s APIs): other models
applications and management – BYO or select from SL’s  Flex Images™ image management – capture an
image catalog image (physical or virtual) provision or migrate
 Global, highly secure, agile IPv4 & IPv6 networks end-to-end between technologies
(Triple network architecture), local and global load balancing  Cloud Governance – full control over a hybrid
that is pay-as-you-go environment through a streamlined workflow
7 © 2015 IBM Corporation
Global DC and Network Footprint
Performance

Over 26 Carrier grade


global private
locations with network with
geographic over 2,000
disperse gbps of
network PoPs connectivity

 Ipv4/Ipv6 dual stack


 Global DNS
 Global DDOS mitigation
 Unmetered DC to DC bandwidth
8 © 2015 IBM Corporation
How SoftLayer is different from other CSPs

Superior Network Automation & Control Flexibility & Choice Other benefits
• High Speed • Industry leading • Multi-tenant Virtual • 24x7x365 support
redundant Global API Server • 500 GB free
Network • Full Transparency • Single-tenant Bandwidth
• Unmetered global and Control Virtual Server • Hourly / Monthly
private Network data integrity, • Bare Metal Server
single-tenant • Managed Service
• 100% uptime SLA • Any OS /
for both private and devices
Hypervisor
public network • Serial-# of HW
used viewable

Security & Auditing

• Triple Network • VLANs • Auditability


Architecture • Firewalls • Any action retraceable to
• VPN • Anti-Virus single user
• IPS / IDS • Two-factor auth.

9 © 2015 IBM Corporation


Integrated Security reduces risk across Hybrid Cloud

IBM manages and monitors 15 billion security events every day for nearly 1,700 clients around the world and holds more
than 5000 patents and patent applications.
Secure global private network allows inter-server free data transfer without public interface.
The 1st cloud platform to offer bare metal powered by Intel TXT that provides security down to the microchip level.

IaaS PaaS SaaS

Built on Security Ready IT Infrastructure


Manage Identities Monitor and Audit Scan and Protect Establish
and Protect Applications the Network Intelligence
User Access and Data from Threats Across the Cloud

10 © 2015 IBM Corporation


SoftLayer Compliance
In place now:

Managed to SOC2 Type II HIPAA Ready Safe Harbor


NIST800-53 Self Assertion

Privacy Standards

FFIEC Ready Self Assessment PCI DSS v3.0 AoC

SOC1, SOC2, SOC3 ISO/IEC 27001


Certification

In progress due in 2015:

11 FedRAMP ITAR Certification FISMA Moderate © 2015 IBM Corporation


Certification (FedRAMP Only)
SoftLayer Network Connectivity

 High-performance public network with transit from multiple Tier-1 carriers


– Network redundancy supports High availability
 Public network access allows Internet-facing applications
– Can be configured with no Internet access for completely private environment
 Secure OOB management via VPN
– Customer control through lockdown of access to private network
 Private network has no transit to Internet/public
– Complete isolation from Internet (unless you explicitly route it through a gateway)
 Private network for intra-application and inter-facility communications, access to
shared services
– Don’t need to rely on Internet to pull down content including patches

12 © 2015 IBM Corporation


SoftLayer Network Security
SoftLayer’s innovative network architecture and commitment to using the most advanced
hardware technologies minimize data center and server exposure. The network integrates three
distinct network architectures into the industry’s first Network-Within-a-Network topology.
Systems are fully accessible to your administrative personnel but safely off-limits to others.

■ Public Network handles public traffic to hosted websites or online resources


Network-Within-a- ■ Private Network allows for true out-of-band management through a distinct
stand-alone third carrier over SSL, PPTP, or IPSEC VPN gateways
Network Topology ■ Data Center to Data Center Network provides free, secure connectivity
between servers housed in separate SoftLayer facilities

Through partnerships with leading hardware and software vendors,


Network IDS/IPS SoftLayer offers a complete array of intrusion protection and assessment
Protection options at both the network and host level

2-factor 2-factor authentication for Customer Portal and SoftLayer VPN access
adds greater network security for hosts on the SoftLayer network
Authentication

13 © 2015 IBM Corporation


SoftLayer Server Security
SoftLayer provides comprehensive tools to help you design and deploy sever level security at
the workload level
SoftLayer offers a comprehensive range of software and hardware security solutions, and strategic partnerships
with industry-leading companies, to help you maximize uptime, protect private information and mitigate
business risk.

■ Multi-tenant and dedicated hardware firewall solutions


available to meet different customer requirements.
Hardware Firewalls ■ Provisioned on demand without service interruptions, and fully
managed through the customer portal—you have complete
control of your systems' protection settings.

Anti-Virus and Anti- McAfee LinuxShield and Windows VirusScan Anti-Virus included
with all servers and cloud compute instances. McAfee Total
Spyware Protection Protection available as upgrade.

SoftLayer partners with Nessus to provide vulnerability scans for


Nessus Vulnerability any device on the SoftLayer Network at no additional charge.
Vulnerability scans can be completed on demand using the
Scanning SoftLayer Customer Portal.

14 © 2015 IBM Corporation


SoftLayer Data Center Security
Physical and operational security is the foundation of SoftLayer security - no other measures
matter without it. That’s why every SoftLayer data center is fully audited based on SOC 2 Type II
reporting on controls to meet industry-recognized requirements for security.

■ Data centers located only in facilities with controlled access and 24-
hour security
■ No server room doors are public-facing
■ Server rooms are staffed 24/7
Data Center and ■ Un-marked entry and exit doors
■ Digital security video surveillance
Server Room ■ Biometric & Key Card security systems for access to all data
centers
Measures ■ Server room access strictly limited to SoftLayer employees and
escorted contractors or visitors
■ Barcode-only identification on hardware; no customer markings of
any type on the servers themselves

■ Engineers and technicians trained on industry standard policies and


procedures which are audited yearly
Operational ■ Geographic redundancy for all core systems for disaster recovery
and business continuity
Measures ■ All data removed from re-provisioned machines with drive wipe
software approved by the Department of Defense
■ Current SOC 2 Type II report

15 © 2015 IBM Corporation


SoftLayer Advantage - Security

Security Differentiator:
Dedicated physical and virtual servers
Provide complete isolation of
customer workload and data

Security Differentiator: Incredibly easy to lock down


at network level to control access
to servers and workloads

Security Differentiator: High degree of automation


means low degree of manual support, manual error

16 © 2015 IBM Corporation


SoftLayer Standard Support

17 © 2015 IBM Corporation


Agenda

B) Softlayer – from simple to crazy architectures

18 © 2015 IBM Corporation


Building Block

19 © 2015 IBM Corporation


Virtual

20 © 2015 IBM Corporation


Baremetal

21 © 2015 IBM Corporation


SoftLayer:
Case Reference – E-Commerce & Web Application
Web Application Service Required resources
Architectural Points
01 - DNS, Netscaler VPX, Standard Hardware Firewall,
•Support web application architecture for internet services. 02 – Local Load Balancer, Fortigate Firewall, Vyatta Gateway
•Provide network security and HA architecture. Appliance, NAS, iSCSI, Object Storage

1 DNS DNS

Data Center Data Center


Local Load
5 Balancer

IPS/Firewall

Public VLAN Public VLAN


6
2 WAF / /Load Balancer

WAF / Load Balancer WAF / Load Balancer


3

Web/Was
Server Web Web
Server Server

Private VLAN Private VLAN

4 7
Private VLAN Private VLAN
8
9
Database Database
Server Server

NAS, iSCSI
Storage
Object
Basic Security and High Availability Storage
1. DNS provides authoritative name server services. User can define and update DNS Zone
5. Local Load Balancer provides Load balancer functions. User can choose High Availability
file.
option when he requests Local Load Balancer.
2. Netscaler VPX provides Load Balancer functions. Netscaler VPX Platinum edition provides
6. Fortigate Firewall provides in-bound/out-bound filtering and IPS function. User can choose
Web Application Firewall functions.
High Availability option.
3. Standard Hardware Firewall protects one server’s in-bound traffic. User also can use
7. Vyatta Gateway Appliance provides in-bound/out-bound filtering. High Availability option
Windows system’s built-in firewall function or Linux’s iptables function to protect each server.
is provided.
4. Private VLANs are connected with private network. VMs in same user account can use
8. NAS storage is provided via private network.
private network for communication.
9. Object Storage is provided via public network and private network.

Das könnte Ihnen auch gefallen