During her keynote session at Interop New York 2008, Hattar pulled the sheet off of virtualization's mysteries -- whether you consider it a "one to many" or a "many to one" technology -- defining it as breaking the bonds of physical boundaries between applications, servers and hardware.
"Virtualization holds the promise to transform the way that we work, the way that we learn, the way that we live and the way that we play," she said, later adding that "it allows you to dynamically partition resources off to use on the fly when you need them."
And with the economy shifting, more corporations are themselves breaking free from physical environments.
Using the Internet's explosion from the "small 'i' Internet" to the "big 'i' Internet," Hattar said, "we're just on the cusp of transitioning from little 'v' virtualization to big 'v' virtualization."
Virtualization, Hattar said, starts with the network to connect people to information. Cisco itself, found that before virtualization, it used only about 20 percent of its server arrays. After virtualization, it now uses 68 percent, she said. Additionally, going virtual delayed building out a new data center to the tune of $40 million per year in savings.
The holdup for virtualization, Hattar said, lies in IT's siloed nature, where architecture and operations personnel aren't unified. For virtualization to work, she said, both camps need to come together.
And once many companies get a handle on virtualization, the next logical step is cloud computing, typically in the form of SaaS. She cautioned the audience to begin investigating building their own clouds to guarantee better security and control.
Still, virtualization, as it leads to cloud computing, has its share of minefields, namely insufficient planning, weaker security and its lack of industry standards.
Hattar cautioned that security should be top of mind when creating a virtualization plan, joking that "Hypervisor needs hypersecurity."
"Security cannot be an afterthought," she said. "It really has to be planned. It has to be planned from the start."
Cisco itself, during its transition to a virtual environment, encountered root kit infections, malware that was able to adapt to virtual environments and Hypervisor attacks.
To combat security threats, companies should start small when it comes to virtualization and cloud computing. They need to think holistically and use the network as the glue. Additionally, IT organizations need to change their perception and stop seeing servers and storage as boxes and devices and begin seeing them as liquid.
Ultimately, she said, virtualization and cloud computing can lead to better provisioning, boosted productivity and differentiation, reduce environmental impact and strengthen business continuity, all while saving money and getting more out of network infrastructure.
While Hattar noted that both virtualization and cloud computing are still considered cutting edge technologies, the future for both is exciting.
"At Cisco we believe with the network as the platform there are no limits," she said.
related stories
Video
trending stories
sponsored resources

Cysurance
Cyber Insurance 360

Tenable
Cyber Risk 360

Dell Technologies
Dell Technologies Cloud Learning Center

EPOS
EPOS

Fujifilm
Fujifilm

Application Integration 360

Mimecast
Mimecast

Hitachi Vantara
Hitachi Vantara

Dell Technologies
Dell Technologies Storage Learning Center

Carbonite
Cloud Storage 360

Webroot
Webroot Learning Center

BlackBerry
BlackBerry Learning Center

NPD
Industry Trends 360

Symantec
Symantec Business Security Learning Center

Channel Chief Showcase

Acer
Remote Workforce 360

Sherweb
Sherweb

APC by Schneider Electric
Digital Services for Edge Learning Center

StorageCraft
Disaster Recovery Learning Center

Vertiv
Edge Computing Learning Center

Wasabi
Wasabi

Dell Technologies
Dell Technologies Hybrid Cloud Learning Center

Cradlepoint
5g for Business 360

Comm100
Collaboration & Communications 360

Veeam
Veeam

Smart 3rd Party
3rd Party Maintenance 360

Sophos
Sophos Cybersecurity Learning Center

Trend Micro
Trend Micro Learning Center

VMware

HubStor
Cloud Backup 360

eSentire
Managed Detection and Response 360

Comcast Business
Comcast Business Learning Center
