The journey into the cloud – making the right choices

The cloud is now, quite literally, everywhere. IT end-users interact with the cloud on a daily basis, organizations are engaged in cloud services at all times, and the cloud powers much of the way business operates today. The business benefits of cloud computing are now well-established and acknowledged, yet 37% of IT decision makers think staff have bought cloud services outside of the IT department without permission – meaning not everyone has thought the process through as well as they probably should have.

The cloud journey has now become a strategic imperative and no longer just a tactical IT choice – greater flexibility, improved productivity, increased collaboration, remote working and greatly reduced CAPEX can all be found through a smart cloud policy. But as with any strategic business initiative, making the right choices of suppliers, partners and relationships is the route to these dividends. And put simply, the cloud has gone mainstream.

So how do you ensure that you get these choices right and maximize the benefits of cloud computing to your organization while minimizing risk? Well, in all honesty, it genuinely depends on where you are starting from.

The greenfield approach

Companies and organizations which are taking a “greenfield approach” to cloud computing face a different set of challenges. Coming from this angle, the most beneficial way forward can be the lease and configure model. Instead of having to go on out and buy expensive hardware, and then also manage it, organizations are finding value in the managed services route. The main advantage here to “greenfield companies” is that they can simply pay a leasing fee and have their cloud solution specified and configured precisely to meet their needs.

What this means is that start-up companies or start-up divisions can operate independently and go straight into the cloud. They don’t need to set anything up, whether that is databases or ERP tools, and they are freeing themselves from risk and also responsibility. They enjoy all the benefits of the “greenfield approach”, under which they can test out new initiatives and processes, while just paying a fee for their expert partner to service their storage, virtual machines and applications in the cloud. It can very much be argued that companies in this category can make the move to the cloud more easily than their more established counterparts.

brownfield transformation

More mature companies and organizations can face a more complicated time of it however. If they have greater experience, have existing IT assets on their balance sheet and have a range of business processes in place, then they face a trickier journey into the cloud. By being in the “brownfield” category they can’t simply plug into managed cloud services without a transformation journey – they have totransform their existing operations and systems to the new environment.

These companies also have to address the financial equation which centers on those existing assets, while also managing greater levels of fear, uncertainty and risk than their “greenfield” peers. Meaning they are often in the market for a trusted third party who they can partner with and agree on the required Service Level Agreements (SLAs).

changing times for the CIO

Each of these approaches however means a range of challenges for the CIO. In days gone by the CIO needed to have in-depth technical skills and knowledge, and true IT project management expertise – today the CIO needs to be much more commercially and partnership savvy.

Today’s CIO must specialize in partnerships and relationships, SLAs and vendor management – in essence, the CIO has transformed too, from technologists to commercial decision-maker. In addition to far greater commercial know-how in general, today’s CIO needs to be much more marketing aware to leverage the opportunities that social media and mobile cloud apps offer in marketing leverage.

So whether the “greenfield” or “brownfield” approach, the burden when formulating that essential cloud strategy falls on the company CIO and IT department. They no longer have to build, install and operate systems, they need to specify, partner, transition, configure and manage commercial outcomes. The worldwide cloud market is forecast to grow from $40.7 billion in 2011 to $241 billion in 2020, and research regularly places cloud high among CIO priorities.

So a different way of thinking is required, since organizations are no longer just picking products and boxes, they are picking partners and service providers.  The old approach of buying the market leading product vendor to reduce the risk of technical obsolescence no longer applies. CIOs are now charged with helping make corporate IT agile, flexible and relevant to market discontinuities. Cloud computing, as a disruptive technology, was always going to disrupt the CIO’s traditional way of doing things. CIO’s now need to help reduce the risk of business model obsolescence.

The pace of technological change is accelerating and driving business model change. The CIO challenge has moved from technology obsolescence to business model obsolescence if IT cannot support the business model changes.

Gordon

Managing the mobile security paradigm

There have been profound changes in recent years in the way that people work. Mobility, virtualisation and globalisation have extensively altered how business is conducted. These changes mean that updated and upgraded security systems are needed to ensure data security.

There are new collaborative methods to help companies manage their information systems, solutions for virtualising information applications and cutting excessive investments are springing up and fresh hardware is delivering more mobility every day. But with these altered usage patterns come new threats and risks to security.

Professional and personal data confusion

Mobility is becoming an increasingly important aspect of business, and workers using devices such as smartphones or tablets to access the corporate network are quickly becoming ubiquitous.

However, there is a trend towards employees bringing their own device to work and using their personal smartphone or tablet for professional as well as personal purposes. This consumerisation of computing, with its permanent connection to the corporate network, increases the potential danger of data leaks if the device is lost or stolen. There is an increased risk of professional/personal data confusion, potentially resulting in legal penalties for the business and serious risk of virus and malware issues, as many personal devices are not properly protected.

Recent technologies such as cloud computing and social networking are helping to create these new usage patterns and ways of sharing information. These changes require a much higher level of transparency. Considering many organisations are increasingly subject to compliance regulations, it is vital to have strong and secure information systems in place. Companies need to identify and protect confidential information and show due care and diligence in protecting this information, not just for their own privacy but also for their customers.

Threats

Threats to companies are proliferating at an exponential rate. On average, there are 2,000 new threats every day adding to the estimated 45 million viruses already in circulation.

Attacks are more targeted and sophisticated than ever before, representing a substantial threat to businesses, government and sensitive infrastructures such as the military, utilities, hospitals and others. This makes having appropriate security defences in place for mobile devices paramount. With so many threats out there, the chance of a breach is just too high.

For internal protection against these clandestine threats, strong security infrastructure is required to protect organisational communication and information systems and ensure that everyday business is not disrupted. Different solutions to consider include firewalls, filters for incoming and outgoing web and mail data, IT infrastructure segregation for extranets, partner networks and strong intrusion detection systems that can identify unusual activities and suspicious behaviour and stop threats from infiltrating the corporate network.

External end-user protection is also crucial and may initially seem like a straightforward issue, but becomes increasingly complex when you factor in the multiple devices in use by many workers, in many locations. There are many security systems to consider, such as user authentication and authorisation, secure communications between users and corporate networks, security monitoring to provide transparency and validation of the compliance process and day-to-day security reports and monitoring.

A balance between protection and freedom

However, it is critical to maintain a balance between protection and freedom, as too much complexity within security systems can overburden the network, slowing down application response times and making it difficult for employees to access the network when needed.

Too many different solutions can also have the undesirable result of creating loopholes and system vulnerabilities, making it easier for cybercriminals to infiltrate the network and exploit confidential information.

Implementing appropriate security for the new working paradigm may seem like a formidable challenge. However, mobility does not have to be a risk for organisational security – with the right solutions in place, it can create new efficiencies and cost savings while allowing the workforce to work anytime, anywhere.

Original Publication