IT organizations are continually looking for creative ways to simplify their operations, reduce their costs, and still keep pace with growing user demand. Many who are using virtualization and cloud solutions to achieve the above are turning to integrated systems. According to a 2014 survey by Zenoss, 45.9 percent of respondents are already using them and 44.3 percent are actively considering them. But what exactly are integrated systems? What’s motivating enterprises to use them, how are they using them, and what are the perceived advantages? What should enterprises consider before deploying them? These are some of the questions we’ll answer in this white paper. We’ll also explore how F5 can help you deliver your applications successfully, whatever underlying infrastructure you choose.
Today’s integrated systems combine compute and storage components into pre-engineered, tested, and validated solutions. Converged and hyper-converged infrastructures both fall into this category. The primary difference between the two is that hyper-converged infrastructures add virtualization (hypervisor), and broader management support to the basic compute and storage package. Prominent vendors in the converged infrastructure market are VCE and NetApp while emerging vendors include VMware, EMC, and Microsoft. Nutanix and SimpliVity are leading hyper-converged infrastructure vendors.
Many business and technical challenges are motivating organizations to adopt integrated systems. Among the most commonly cited is the need for rapid deployment. Integrated systems dispense with the busywork of provisioning servers, hypervisor, and storage, and enable organizations to essentially drop into the data center a plug-and-play solution that’s up and running within hours—even minutes. This is in contrast to the weeks or months it takes to deploy legacy infrastructure. Forty-three percent of adopters surveyed by 451 Research cited ease and speed of deployment as the top benefit of converged infrastructure.
Integrated systems also help organizations improve operational efficiency and reduce IT complexity. They’re easy to acquire, offer a level of convenience that legacy infrastructure cannot, and provide a single vendor to turn to for support services. Because they are pre-engineered, tested, and validated, they also provide a level of reliability that can be more difficult to achieve and maintain for workloads running on traditional IT infrastructure. And when it comes to scalability, integrated systems enable organizations to increase capacity on demand without downtime—and without requiring complex, long-range planning and large capital investments.
Within the category of integrated systems, converged infrastructure is generally less expensive to deploy than legacy infrastructure since it combines the largest CapEx components into a single solution. Hyper-converged infrastructure offers an even lower point of entry due to significantly lower storage costs. It also offers OpEx savings since IT generalists rather than expert staff can easily manage and maintain the systems.
Integrated systems are used for a variety of workloads, the most common ones being:
Whether your organization chooses converged or hyper-converged infrastructures, your ultimate objective is to deliver enterprise workloads, which could include servers (email, database, and others), test and development platforms, or enterprise applications (CRM, ERP, industry-specific, and web-based). For all the convenience, rapid deployment, and turnkey benefits that integrated systems provide, one fact remains: you still must manage your applications. And the simple truth is that all applications, regardless of the underlying infrastructure, require services.
Application delivery services range from availability and performance services (that ensure applications are always accessible and performing as users expect) to security services (that protect the applications themselves as well as your network, users, data, and devices). Without these and other services, applications are just software programs—like new construction homes that don’t come with major appliances, window screens, in-ground sprinkler and security systems, or fenced yards. Just as homeowners must choose the right products and services for their individual needs, so must enterprises choose the right services for their applications.
F5 makes those choices easier for you by providing a comprehensive range of application delivery services that span security, access and identity management, performance, availability, and mobility (see Figure 1). Based on a single, unified platform, F5 TMOS®, these services are sold as F5 BIG-IP® modules. They run across a services “fabric” that can include F5’s chassis/blade-based systems (F5 VIPRION® platform), BIG-IP systems, and virtual edition software.
Let’s take a closer look at how F5 can help you address three key considerations—availability and performance; security; and flexibility—when deploying application workloads on integrated systems.
Mobile workers, customers, and business partners have high expectations of the applications they use daily. That means organizations must be able to deliver applications quickly and reliably, wherever they’re deployed and on any device. This has become increasingly difficult for some organizations as traditional and web-based applications—and the IT infrastructure itself—have grown infinitely more complex.
Application performance and high availability are non-negotiable for F5; they are foundational to all BIG-IP application delivery services. BIG-IP® Local Traffic Manager™ (LTM) provides multiple features that address intelligent traffic management and protocol support; network and application optimization, secure and encrypted communications; on-demand scalability; programmability; and application visibility, health monitoring, and analytics. All of these capabilities help you ensure your applications are always available to users and are performing at their best.
Security begins with protecting your data centers, which are increasingly under threat from sophisticated, targeted attacks. BIG-IP® Advanced Firewall Manager™ (AFM) helps you mitigate the most aggressive, high-volume distributed denial of service (DDoS) attacks on premises—before they enter your network. Deeper into the network, BIG-IP®Application Security Manager™ (ASM) protects your web-based applications and data from OWASP top 10 threats, application-specific vulnerabilities, and zero-day attacks. It also helps you comply with industry standards such as HIPAA and PCI DSS.
Controlling access to applications, however, is just as important as protecting your infrastructure. With BIG-IP® Access Policy Manager® (APM), you can inspect user devices to ensure they comply with corporate standards, and then create policies that allow or restrict access to applications based on a user’s identity, location, device, type of network connection, and other criteria. This enables you to enforce identity-based, context-aware, and policy-driven access control—whatever the location, user, or application. BIG-IP APM also gives you single sign-on and federation capabilities across the data center and into the cloud. This gives users easy access to a variety of applications and lets you maintain control of user credentials for software-as-a-service applications.
The IT mandate to “do more with less” has become almost cliché, yet it’s showing no signs of going away. Helping IT simplify operations and drive greater agility is more important than ever. One way F5 helps you achieve this is by giving you “architectural freedom” to pick and choose the BIG-IP solutions that are most relevant to your business needs. The goal is to give you the flexibility to add the right services when and where you need them—across multiple form factors (hardware and software), deployment models (on premises and in private, public, or hybrid clouds), and infrastructures (traditional, converged, hyper-converged). BIG-IP solutions are also offered through many large public cloud providers like Amazon, Microsoft, Cisco, VMware, Verizon, and Rackspace.
The BIG-IP platform also provides the built-in programmability features you need to manage traffic on your terms. With F5 iRules®, you can manipulate incoming and outgoing IP traffic; F5 iCall™ enables you to inspect and maintain your environment and reduce downtime by automating tasks; and F5 iControl® gives you open APIs to integrate third-party applications with BIG-IP systems. Using F5 iApps® wizard-driven templates, you can deploy applications with all their required services in minutes rather than weeks.
No vendor can stand alone in today’s complex and expanding world of IT. F5 is known for its technology alliances and collaboration with leading vendors on integrated, complementary, and joint solutions. In the integrated systems market, F5 has partnerships with both leading and emerging vendors, including Microsoft, NetApp, Nutanix, SimpliVity, VCE, and VMware. For more information about all available solutions, visit f5.com/converged.