The value proposition of IBM Cloud solutions Flashcards
Identify the three primary Cloud benefits
- Flexibility - Users can scale services to fit their needs, customize applications, and access cloud services from anywhere with an internet connection.
- Efficiency - Enterprise users can get applications to market quickly, without worrying about underlying infrastructure costs or maintenance.
- Strategic value -Cloud services give enterprises a competitive advantage by providing the most innovative technology available.
Identify the three primary IBM Cloud benefits
- Open Hybrid Cloud: Leverage open-source technologies
- Security Leadership: Employ market-leading protection for data and apps
- Enterprise-Grade: Establish a foundation for enterprise workloads
List the 3 main ROI benefits identified by Forrester for IBM’s cloud approach
- Improved developer productivity.
- Greater operational efficiency
- Reduced costs.
provides an open, secure platform by which users can access security data across different tools, clouds and IT environments.
IBM Cloud Pak for Security
containerized software solution for modernizing existing applications and developing new cloud-native apps that run on Red Hat OpenShift
IBM Cloud Pak for Application
lets you connect to your data, govern it, and trust it by facilitating data, scaling by streamlining legacy data sources.
IBM Cloud Pak for Data
eases monitoring, maintenance and upgrades, helping the enterprise stay ahead of the innovation curve by creating and managing APIs that help clients access data in a fast and secure manner.
IBM Cloud Pak for Integration
running on Red Hat OpenShift, provides consistent visibility, governance, and automation from on-premises to the edge.
IBM Cloud Pak for Multicloud Management
this cloud pak lets you quickly scale up or down to meet fluctuating customer demand,
IBM Cloud Pak for Automation
These client outcomes represent which journey steps in an IBM Garage?
• Alignment on your vision and desired business outcome.
• Confirm executive sponsor, product owner.
• Selection of candidate app workloads that can deliver the business outcome through modernization
Business Framing
These client outcomes represent which journey steps in an IBM Garage?
• Explore technical areas of interest and NFRs: for example, applications, security, integration, and edge.
• Recommend technical next steps and/or further discovery as needed to build proposal.
Technical Discovery
These client outcomes represent which journey steps in an IBM Garage?
• Business and IT alignment on user experience and roadmap to meet your business outcome.
• Identify risks and assumptions in your modernization approach, such as data security.
• Identify series of Minimum viable products (MVPs). Agree on next MVP business experiment.
Design Thinking
These client outcomes represent which journey steps in an IBM Garage?
• Define a secure minimum viable architecture that mitigates risk. Architect and create an implementation roadmap for a hybrid, multi-cloud platform and DevOps adoption.
• Architect and create an implementation roadmap for a hybrid, multi-cloud platform and DevOps adoption.
Architecture
These client outcomes represent which journey steps in an IBM Garage?
• Modernize, deploy, and test the application on the cloud environment.
• Test hypothesis via learning–driven production release against the stated business outcome.
Minimum Viable Product Build
These client outcomes represent which journey steps in an IBM Garage?
• Iterate across multiple MVPs, refine solution until you achieved the stated business outcome.
• Become self–sufficient in achieving business results with the IBM Garage Method.
• Scale production environment and applications.
Build Out
How does Enterprise Design Thinking enable application modernization?
It helps identify desired outcomes and minimum viable product.
List the four R of application modernization approaches
Rehost / Lift and Shift
Refactor or re-architect
Replatform
Retire/replace
What is the process of migrating an exact copy of an application or workload (and its data store and OS) from IT one environment to another—usually from on-premises to public or private cloud
Lift and shift / Rehost
restructuring a monolithic application into a set of microservices or modernizing the datastore from SQL to NoSQL is an example of _____
Refactor or re-architect - refers to making fairly significant changes to the application so that it can scale or perform better in a cloud environment. Example:
upgrading an application to work with a cloud-native managed database, changing the operating systems or middleware it will work with, or containerizing the application is an example of ___
Replatform - an application involves making minor changes to it so that it can better benefit from cloud architecture.
When does it make the most sense to decommission an application (Retire/replace)
When the value is limited, because its capabilities are duplicated elsewhere in your environment, or because it’s more cost-effective to replace it with a new offering—often a Software-as-a-Service (SaaS) platform—than it is to migrate the application.
____is a sales strategy that is hyper-focused on the customer, their needs, preferences, and emotions.
Consultative selling
What are the 5 Steps to Effective Consultative Selling
Step 1: Understand a Client’s Business and Needs
Step 2: Explore Options
Step 3: Develop a Solution for the Client
Step 4: Implement the Solution
Step 5: Confirm the Client’s Satisfaction
Describe the following 3 elements of IBMs Financial Services Cloud. (Security Leadership, Compliance Leadership, Keep-your-own-key )
IBM has deep financial services industry expertise with regulatory domain knowledge informed by IBM Promontory.
The IBM Cloud Security and Compliance Center dashboard and platform enables you to define compliance profiles and monitor and enforce the security and compliance posture across your workloads.
Only the IBM Cloud Hyper Protect Crypto Services offering features keep-your-own-key (KYOK) encryption capabilities, backed by the highest level of security certification — FIPS 140-2 Level 4 — commercially available.
Describe IBM Cloud for VMware Regulated Workloads
IBM Cloud for VMware Regulated Workloads is part of the IBM Cloud for Financial Services solution set and utilizes its policy framework, which deploys a shared-responsibility model for implementing controls.
Name 4 capabilities that the IBM Cloud for VMware Regulated Workload provides for clients
- More-effectively implement and govern security controls in the cloud.
- Ensure auditing of all cloud administration.
- Help protect business critical data assets.
- Prioritize meeting IT compliance for various national or industrial entities.
Which component in IBM financial services ready public cloud solutions provides a fully managed, dedicated key management and cloud hardware security module (HSM) service (i.e., single-tenant key management service with key-vaulting provided by dedicated, customer-controlled, FIPS 140-2 Level 4 certified HSMs).
IBM Cloud Hyper Protect Crypto Services
Which component in IBM financial services ready public cloud solutions provides A key management service built on top of a shared (multi-tenant) cloud hardware security module (HSM).
Key protect
Which component in IBM financial services ready public cloud solutions provides encryption and geofences data at the hardware level
HyTrust
Which component in IBM financial services ready public cloud solutions delivers reliable back up and predictable disaster recovery for virtual and physical workloads
Veeam
Which component in IBM financial services ready public cloud solutions provides proactive workload protection from risks due to cyber threats and regulatory compliance issues
Caveonix Riskforesight
_____ refers to an array of policies, technological procedures, services, and solutions designed to support safe functionality when building, deploying, and managing cloud-based applications and associated data.
cloud security
List common cloud security threats
data breaches, malware injections, regulatory compliance, and DDoS attacks.
This compliance program requires financial organizations to continuously perform risk assessments, adjust control mechanisms as indicated, and implement a layered approach to security.
FFIEC
This compliance program established data security and privacy requirements for the storing and processing of protected health information
HIPAA
This compliance program created and maintains the Common Security Framework, a certifiable framework to help healthcare organizations and their providers demonstrate their security and compliance in a consistent, streamlined manner.
HITRUST
These standards incorporate best practices to protect cardholder data, and they often require validation from a third-party Qualified Service Assessor (QSA).
PCI