Maintain Control and Governance with Private Cloud Computing
Faster provisioning is great but not if it means compromising security or unauthorized access to resources. Many surveys on cloud computing cite security as the most significant concern hindering the adoption of cloud computing. A host-based distributed architecture enables virtual networks to be protected at the host level, leading to lower overall costs and higher quality of service.
Automated provisioning also requires control to ensure compliance with appropriate access policies. One approach is to control the consumption of resources by users before the resources are provisioned either through request/approval workflow or quotes/limits on what can be provisioned. An alternative approach is to freely allow end users to consume resources from the infrastructure but observe this consumption to generate usage reports. Those usage reports can then have cost models applied to them to generate cost reports that display the cost of the consumption.
Obtain Agility with Policy-Driven Automation
Resource management policies can improve utilization of shared infrastructure by allowing resources to be overcommitted beyond baseline reservations. Multi-cluster linked clone technology will enable identical virtual machine configurations to be provisioned rapidly and without a full duplication of the original template. Resource pooling and virtual distributed network configuration will reduce the amount of hardware needed to deliver services, and will enable intelligent policy management mechanisms like distributed resource scheduling. Software controls can enforce isolation that minimizes the risk of a user-driven or system-driven fault.
With this unique policy-driven automation in place, one will be able to essentially deliver zero-touch infrastructure, where IT is transformed into a service provider defining and delivering services rather than operationally responding to custom requests.