To the Cloud? – Developing a Cloud Migration Strategy

To the Cloud? – Developing a Cloud Migration Strategy

Developing a Cloud Migration Strategy

Following the Microsoft Worldwide Partner Conference last year, it became pretty clear that cloud computing had risen to dominance. This was going to be the next big thing, and following Microsoft’s lead, the concept of “cloud” rose to the top of everyone’s mind.

So it was no surprise Microsoft soon after launched a huge ad campaign that included national television spots and placements in high profile mags such as Wired.

With the prominence of cloud established, the question has now become, when you hear that cute little couple in the airport say “to the cloud”, how does one actually get there?

I attended a Gartner seminar that explained the importance of developing a Cloud Migration Strategy.  Gartner predicts that by 2012, most organizations will have virtualized a large part of their IT environment and by 2015, most will have migrated to the cloud.  There’s much hype about cloud computing at the moment but it is safe to assume that most organizations do not have a Cloud Adoption Strategy so I’ve put together a list of things to consider when taking that leap of faith. In fact, having a structured plan in mind will make it scarcely a “leap” at all.

1. Preparation

This is where you identify key stakeholders to build a core cloud team, identify business objectives and set goals on how to achieve them.  In order to get buy- in from the entire organization it is important that input is gathered from all affected business units within your organization.  Then your core cloud team needs to determine and agree upon the business objectives associated with migrating to the cloud.  Items such as saving capital vs. IT agility, single vendor vs. multi-vendor strategy, and risk tolerance all should be considered.

2. Business and Application Assessment

At this point you should ask yourself, “Which applications can we move to the cloud?”  Within any organization, there are a number of strategic and non-strategic IT services and applications and your core team needs to decide which ones are ready for the cloud and which ones still need to be managed in-house.  For example, there are organizations that are using Gmail as their primary email server but does that make sense for you?  Data protection and security is of utmost importance, especially for organizations that maintain extremely sensitive information e.g. health care, public sector.  Hosting this type of data may not be feasible in the cloud, at least not yet.

3. Vendor Selection

There are myriad cloud vendors out there and, of course at this stage, your organization needs to decide which vendor best fits your cloud strategy requirements.  Gartner suggests a three step process, an approach which you should, in my opinion, be following for any vendor.

Step One:
Request for Information – what’s the viability of the vendor?  Do they have a proven track record?  How transparent are they?

Step Two:
Gather Responses and Review – you will want to scrutinize each vendor’s responses hard and mark off the list those who do not meet your standards or requirements.

Step Three:
Send RFQ and Select the Vendor – be sure to limit your potential vendor list to 2-3 maximum and ensure that the migration plan they map out for you makes total sense for your organization.

4. Risk and Liability Mitigation

Although some risk cannot be avoided, the best way to mitigate it is through upfront planning.  You must consider contingency planning, exit strategies and securing liability insurance.

5. Steady State

Once you’ve deployed your strategy and migrated portions of your IT environment to the cloud, this is where the maintenance work begins.  Employ sound cloud governance procedures and inject cloud management into everyday operational activities.  At this stage it is important that your cloud adoption strategy is measured and meeting the business objectives that you’ve set early on.

Of course, this only scratches the surface on how to migrate to the cloud, but at least it provides a starting point for organizations that are curious about adoption.  There are pitfalls that you should avoid such as skipping steps.  Core teams may be tempted to go straight to vendor selection but doing so will cause you to build an ad hoc strategy that could easily lead to unnecessary risks, cost increases, and unintended business impacts.

So when you hear those words “to the cloud”, now you’ll have a better understanding of what that means and how to get started on your way.

By Ariel del Rosario/Acrodex

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comic
Using Cloud Technology In The Education Industry

Using Cloud Technology In The Education Industry

Education Tech and the Cloud Arguably one of society’s most important functions, teaching can still seem antiquated at times. Many schools still function similarly to how they did five or 10 years ago, which is surprising considering the amount of technical innovation we’ve seen in the past decade. Education is an industry ripe for innovation…

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

Embracing The Cloud We love the stories of big complacent industry leaders having their positions sledge hammered by nimble cloud-based competitors. Saleforce.com chews up Oracle’s CRM business. Airbnb has a bigger market cap than Marriott. Amazon crushes Walmart (and pretty much every other retailer). We say: “How could they have not seen this coming?” But, more…

What Futuristic Tech Will You See In Your Lifetime?

What Futuristic Tech Will You See In Your Lifetime?

Futuristic Tech The world and what people can do is increasingly being driven by technology. It has already shaped the world we live in, but over the next few decades it is set to shape the world in ways that we can barely imagine. There have already been some great leaps in IoT technology recently,…

The Lighter Side Of The Cloud – Hiding Spots

The Lighter Side Of The Cloud – Hiding Spots

By David Fletcher Please feel free to share our comics via social media networks such as Twitter, Facebook, LinkedIn, Instagram, Pinterest. Clear attribution (Twitter example: via@cloudtweaks) to our original comic sources is greatly appreciated.

Recent Articles - Posted by
Fintech Exploiting AI and Blockchain Technology

Fintech Exploiting AI and Blockchain Technology

AI and Blockchain Technology The field of artificial intelligence (AI) had progressed rapidly in the last ten years, though first recognized in the 1950s. From autonomous motor vehicles to digital personal assistants, the technology is making its way into a variety of industries, enabling better task automation, language processing, and data analytics. But more recently,…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

5 Ways To Ensure Your Cloud Solution Is Always Operational

5 Ways To Ensure Your Cloud Solution Is Always Operational

Ensure Your Cloud Is Always Operational We have become so accustomed to being online that we take for granted the technological advances that enable us to have instant access to everything and anything on the internet, wherever we are. In fact, it would likely be a little disconcerting if we really mapped out all that…

Digital Transformation: Not Just For Large Enterprises Anymore

Digital Transformation: Not Just For Large Enterprises Anymore

Digital Transformation Digital transformation is the acceleration of business activities, processes, and operational models to fully embrace the changes and opportunities of digital technologies. The concept is not new; we’ve been talking about it in one way or another for decades: paperless office, BYOD, user experience, consumerization of IT – all of these were stepping…

Are Cloud Solutions Secure Enough Out-of-the-box?

Are Cloud Solutions Secure Enough Out-of-the-box?

Out-of-the-box Cloud Solutions Although people may argue that data is not safe in the Cloud because using cloud infrastructure requires trusting another party to look after mission critical data, cloud services actually are more secure than legacy systems. In fact, a recent study on the state of cloud security in the enterprise market revealed that…

Why Hybrid Cloud Delivers Better Business Agility

Why Hybrid Cloud Delivers Better Business Agility

Why Hybrid Cloud Delivers Better Business Agility A CIO friend of mine once told me that a hybrid cloud model enables him to “own the base, rent the spike” when it comes to unplanned events. Let’s face it – maintaining unused infrastructure for rare or random IT events is expensive and unnecessary in a cloud…

How Data Science And Machine Learning Is Enabling Cloud Threat Protection

How Data Science And Machine Learning Is Enabling Cloud Threat Protection

Data Science and Machine Learning Security breaches have been consistently rising in the past few years. Just In 2015, companies detected 38 percent more security breaches than in the previous year, according to PwC’s Global State of Information Security Survey 2016. Those breaches are a major expense — an average of $3.79 million per company,…

Who’s Who In The Booming World Of Data Science

Who’s Who In The Booming World Of Data Science

The World of Data Science The nature of work and business in today’s super-connected world means that every second of every day, the world produces an astonishing amount of data. Consider some of these statistics; every minute, Facebook users share nearly 2.5 million pieces of content, YouTube users upload over 72 hours of content, Apple…

Cloud Infographic: The Explosive Growth Of The Cloud

Cloud Infographic: The Explosive Growth Of The Cloud

The Explosive Growth Of The Cloud We’ve been covering cloud computing extensively over the past number of years on CloudTweaks and have truly enjoyed watching the adoption and growth of it. Many novices are still trying to wrap their mind around what the cloud it is and what it does, while others such as thought…

Shadow IT To Remain A Focus For Both Cloud Vendors And CIOs

Shadow IT To Remain A Focus For Both Cloud Vendors And CIOs

Shadow IT To Remain A Focus Shadow IT, a phenomenon defined as building internal IT systems without the official organizational approval has been a growing concern for CIOs over the last few years. In 2015, it climbed to the top of the list of the emerging IT threats, with as much as 83% CIOs reporting…

Using Big Data To Analyze Venture Capitalists’ Ability To Recognize Potential

Using Big Data To Analyze Venture Capitalists’ Ability To Recognize Potential

Big Data To Analyze Using Big Data to Analyze Venture Capitalists’ Ability To Recognize Potential For those who are regularly involved with SMEs, venture capital, and company valuations, it is common knowledge that start-ups that exit for more than $1 billion dollars are extremely rare – often termed ‘unicorn’ companies. Despite their rarity, it should…