Infrastructure
Automation
Cloud challenges
The application value chain
                       Application   Application
                        Lifecycle      Health
                      Management
Terms that matter
Infrastructure Lifecycle       Security Lifecycle
Management (ILM)               Management (SLM)
is the process by which        is the process of managing
organizations build, deploy,   an organization's sensitive
and manage the                 data and security measures
infrastructure that            throughout the lifecycle of
underpins cloud                an application, system, or
applications. The tools and    physical security. SLM
workflows the                  technologies should be
organization uses for ILM      built on a zero trust,
should enable effective        identity-based access
infrastructure                 architecture enabling
management from Day 1          teams to continuously
provisioning to Day N          protect credentials and
tracking, maintenance,         other secrets, inspect their
and decommissioning.           digital estate for unsecured
                               secrets, and connect
                               authorized machines,
                               services, and people.
How to do cloud right
The application value chain
  Application                 Infrastructure         Security               Technology
  Lifecycle Management        Lifecycle Management   Lifecycle Management   Business Management
                                                                                           IBM Instana
                                                                             IBM Concert
HashiCorp accelerates IBM’s strategy to help clients reduce cloud
and infrastructure risk, cut costs, and unlock time to value
                        Infrastructure    Security Lifecycle
                   Lifecycle Management     Management
                                                               Cloud services
  AppDev teams
                    Platform teams
HashiCorp’s suite of
products enable          Hybrid cloud                    Standardize image workflows       Hybrid cloud
organizations to         Infrastructure automation       across cloud providers            Application automation
streamline application
                         — Infrastructure as code        — Secure your images              — Workload orchestration
development and          — Compliance & management       — Reduce time to deployment       — Container orchestration
simplify operations      — Self service infrastructure   — Update images across clouds     — Heterogeneous orchestration
across complex, hybrid
cloud environments
                         Hybrid cloud                    Standardize secure                Hybrid cloud
                         Security automation             remote access                     Networking automation
                         —   Identity-based security     — Identity-based access           —   Common service registry
                         —   Secrets management          — Automatically onboard           —   Service discovery
                         —   Encryption as a service       new services                    —   Network middleware automation
                         —   Advanced data protection    — Provide time-bound, least-      —   Zero trust networking with
                                                           privileged access to users.         service mesh
                                                         — compliance with auditable
                                                           records and recorded sessions
HashiCorp is the
leading multi-cloud   4500+   customers
infrastructure        918     ≥$100K ARR customers
automation
                      $583M   total revenue
company
                      2200    global employees
                      900+    ecosystem partners
                      450M    product downloads
  HashiCorp
  product suite                   Infrastructure Lifecycle                       Security Lifecycle
    Terraform and Vault drive
                                  Management                                     Management
    ~90%               ARR
                                  Provisioning and Management
                                  Use infrastructure as code to build, deploy,
                                                                                 Identity and Access
                                                                                 Use identity-based access controls
                                  and manage the infrastructure that             to manage the security of your
    Terraform average starting    underpins cloud applications                   secrets, users, and services
    opportunity is
    $50K
                   1                      Terraform                                      Vault
                                          Infrastructure provisioning                    Secrets management
    Vault average starting                Packer                                         Boundary
    opportunity is                        Image management                               Secure access
    $258K
                        1
                                          Nomad                                          Consul
                                          Workload orchestration                         Service networking
    Once a deal lands,
    over 4 years HashiCorp sees
    4x     expansion
IBM and Business Partner
Internal Use Only
HashiCorp, with IBM and Red Hat, can help you do cloud right
Present and near future cross-portfolio synergies        Red Hat     HashiCorp                       Enterprise-grade use cases
                                                                   Terraform     Turbonomic
             Technology business and                               Packer        Cloudability         — Predict and optimize infrastructure cost
                                                                                 Instana
             asset management                                                                         — Consistently enforce policy
                                                    Ansible        Terraform     Concert
             Application lifecycle                  Automation                                        — Build and manage hybrid cloud applications
                                                    Platform                                            while reducing risk and improving governance
             management
                                                    OpenShift      Vault         Verify
                                                                                                      — Centrally manage data, keys, services, identities
             Security lifecycle                                    Boundary      Guardium
                                                                                                        and policies
                                                                   Consul
             management                                                                               — Protect data with compliance and encryption
                                                    Ansible        Terraform     Hybrid Cloud Mesh    — Improve developer productivity and accelerate
             Infrastructure and network             Automation     Boundary      SevOne
                                                    Platform       Consul        NS1                    software delivery with Infrastructure-as-Code
             lifecycle management                                  Nomad                              — Build and manage hybrid cloud network stacks
                                                                   Terraform     Z
                                                                                                      — Automate infrastructure and manage secrets
             Technology infrastructure                             Vault
                                                                   Nomad                                across self-managed and cloud applications
                                                                                                             AI
Holistic orchestration and automation across
the infrastructure lifecycle
                                                                              Health Check
                                                                           Patch and Update
                                     Infrastructure
           Provision                                                      Business Continuity             Decommission
                                     Orchestration
           Configure                                                       Incident Response                   Retire
                                       Inventory
                                                                       Infrastructure optimization
                                     Configuration
                                                                               Compliance
                              Consistent, end to end application of Security, Compliance and Policy
             Day 0                        Day 1                                Day 2                             Day Now
  Infrastructure provisioning                         Configuration management + Operational management
     Infrastructure-as-Code                               Config-as-Code + Day 2 Operations           Infrastructure Lifecycle
IBM Vault works seamlessly with Red Hat OpenShift,
already trusted by hundreds of customers
                 Secrets management                                                                             Certificate management
             Store and manage secrets lifecycle                                                                 Generate, rotate, and revoke
             and make available to applications                                                                  certifications on demand
                                                                                                                  through cert-manager
             Auth policies
          Codify how applications
                                                         Runtimes       Image build     Serverless                           Key management
      authenticate, which credentials                                                                                   Consistent workflow for lifecycle
                                                         CI/CD          GitOps          Image registry                  management and distribution of
        they are authorized to use,
                                                                                                                                encryption keys
                                                         Auth & SSO     Service mesh    CVE scanning                         across KMS providers
                                                         Cloud APIs     Observability   Enforce policy
                        Authentication                                                                              Data protection
                     Identity-based access                                                                 OpenShift KMS API integration to
                 management with AWS, Azure,                                                                manage etcd encryption keys
                 Google Cloud, GitHub, Okta, etc                                                                      (Planned)
                                              Physical   Virtual      Private cloud     Public cloud     Edge