{"id":12136,"date":"2015-01-05T17:15:00","date_gmt":"2015-01-05T17:15:00","guid":{"rendered":"http:\/\/cloudcomputing.sys-con.com\/node\/3242848"},"modified":"2015-01-05T17:15:00","modified_gmt":"2015-01-05T17:15:00","slug":"a-disruptive-approach-to-hybrid-clouds-by-zenterasystems-devopssummit-devops","status":"publish","type":"post","link":"https:\/\/icloud.pe\/blog\/a-disruptive-approach-to-hybrid-clouds-by-zenterasystems-devopssummit-devops\/","title":{"rendered":"A Disruptive Approach to Hybrid Clouds By @ZenteraSystems | @DevOpsSummit [#DevOps]"},"content":{"rendered":"<p>When an enterprise builds a hybrid IaaS cloud connecting its data center to one or more public clouds, security is often a major topic along with the other challenges involved. Security is closely intertwined with the networking choices made for the hybrid cloud.<br \/>\nTraditional networking approaches for building a hybrid cloud try to kludge together the enterprise infrastructure with the public cloud. Consequently this approach requires risky, deep &#8220;surgery&#8221; including changes to firewalls, subnets and other modifications to the corporate security infrastructure. Connecting a public cloud to the enterprise requires infrastructure changes to limit how deep into the enterprise it can see. For those who have dealt with it, it&#8217;s time consuming and risky, requiring a complete InfoSec review of the new structure. More important, even if an enterprise does it once successfully, it has to be repeated for each new project and cloud service provider.<\/p>\n<p><a href=\"http:\/\/cloudcomputing.sys-con.com\/node\/3242848\" >read more<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>When an enterprise builds a hybrid IaaS cloud connecting its data center to one or more public clouds, security is often a major topic along with the other challenges involved. Security is closely intertwined with the networking choices made for the hy&#8230;<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-12136","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/12136","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/comments?post=12136"}],"version-history":[{"count":0,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/12136\/revisions"}],"wp:attachment":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/media?parent=12136"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/categories?post=12136"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/tags?post=12136"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}