To the Cloud? – Developing a Cloud Migration Strategy

To the Cloud? – Developing a Cloud Migration Strategy

Developing a Cloud Migration Strategy

Following the Microsoft Worldwide Partner Conference last year, it became pretty clear that cloud computing had risen to dominance. This was going to be the next big thing, and following Microsoft’s lead, the concept of “cloud” rose to the top of everyone’s mind.

So it was no surprise Microsoft soon after launched a huge ad campaign that included national television spots and placements in high profile mags such as Wired.

With the prominence of cloud established, the question has now become, when you hear that cute little couple in the airport say “to the cloud”, how does one actually get there?

I attended a Gartner seminar that explained the importance of developing a Cloud Migration Strategy.  Gartner predicts that by 2012, most organizations will have virtualized a large part of their IT environment and by 2015, most will have migrated to the cloud.  There’s much hype about cloud computing at the moment but it is safe to assume that most organizations do not have a Cloud Adoption Strategy so I’ve put together a list of things to consider when taking that leap of faith. In fact, having a structured plan in mind will make it scarcely a “leap” at all.

1. Preparation

This is where you identify key stakeholders to build a core cloud team, identify business objectives and set goals on how to achieve them.  In order to get buy- in from the entire organization it is important that input is gathered from all affected business units within your organization.  Then your core cloud team needs to determine and agree upon the business objectives associated with migrating to the cloud.  Items such as saving capital vs. IT agility, single vendor vs. multi-vendor strategy, and risk tolerance all should be considered.

2. Business and Application Assessment

At this point you should ask yourself, “Which applications can we move to the cloud?”  Within any organization, there are a number of strategic and non-strategic IT services and applications and your core team needs to decide which ones are ready for the cloud and which ones still need to be managed in-house.  For example, there are organizations that are using Gmail as their primary email server but does that make sense for you?  Data protection and security is of utmost importance, especially for organizations that maintain extremely sensitive information e.g. health care, public sector.  Hosting this type of data may not be feasible in the cloud, at least not yet.

3. Vendor Selection

There are myriad cloud vendors out there and, of course at this stage, your organization needs to decide which vendor best fits your cloud strategy requirements.  Gartner suggests a three step process, an approach which you should, in my opinion, be following for any vendor.

Step One:
Request for Information – what’s the viability of the vendor?  Do they have a proven track record?  How transparent are they?

Step Two:
Gather Responses and Review – you will want to scrutinize each vendor’s responses hard and mark off the list those who do not meet your standards or requirements.

Step Three:
Send RFQ and Select the Vendor – be sure to limit your potential vendor list to 2-3 maximum and ensure that the migration plan they map out for you makes total sense for your organization.

4. Risk and Liability Mitigation

Although some risk cannot be avoided, the best way to mitigate it is through upfront planning.  You must consider contingency planning, exit strategies and securing liability insurance.

5. Steady State

Once you’ve deployed your strategy and migrated portions of your IT environment to the cloud, this is where the maintenance work begins.  Employ sound cloud governance procedures and inject cloud management into everyday operational activities.  At this stage it is important that your cloud adoption strategy is measured and meeting the business objectives that you’ve set early on.

Of course, this only scratches the surface on how to migrate to the cloud, but at least it provides a starting point for organizations that are curious about adoption.  There are pitfalls that you should avoid such as skipping steps.  Core teams may be tempted to go straight to vendor selection but doing so will cause you to build an ad hoc strategy that could easily lead to unnecessary risks, cost increases, and unintended business impacts.

So when you hear those words “to the cloud”, now you’ll have a better understanding of what that means and how to get started on your way.

By Ariel del Rosario/Acrodex

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud Cloud computing is more than just another storage tier. Imagine if you’re able to scale up 10x just to handle seasonal volumes or rely on a true disaster-recovery solution without upfront capital. Although the pay-as-you-go pricing model of cloud computing makes it a noticeable expense, it’s the only solution for many…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

Four Recurring Revenue Imperatives

Four Recurring Revenue Imperatives

Revenue Imperatives “Follow the money” is always a good piece of advice, but in today’s recurring revenue-driven market, “follow the customer” may be more powerful. Two recurring revenue imperatives highlight the importance of responding to, and cherishing customer interactions. Technology and competitive advantage influence the final two. If you’re part of the movement towards recurring…

Lavabit, Edward Snowden and the Legal Battle For Privacy

Lavabit, Edward Snowden and the Legal Battle For Privacy

The Legal Battle For Privacy In early June 2013, Edward Snowden made headlines around the world when he leaked information about the National Security Agency (NSA) collecting the phone records of tens of millions of Americans. It was a dramatic story. Snowden flew to Hong Kong and then Russia to avoid deportation to the US,…

Three Tips To Simplify Governance, Risk and Compliance

Three Tips To Simplify Governance, Risk and Compliance

Governance, Risk and Compliance Businesses are under pressure to deliver against a backdrop of evolving regulations and security threats. In the face of such challenges they strive to perform better, be leaner, cut costs and be more efficient. Effective governance, risk and compliance (GRC) can help preserve the business’ corporate integrity and protect the brand,…

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

Why Businesses Need Hybrid Solutions Running a cloud server is no longer the novel trend it once was. Now, the cloud is a necessary data tier that allows employees to access vital company data and maintain productivity from anywhere in the world. But it isn’t a perfect system — security and performance issues can quickly…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…

The Fully Aware, Hybrid-Cloud Approach

The Fully Aware, Hybrid-Cloud Approach

Hybrid-Cloud Approach For over 20 years, organizations have been attempting to secure their networks and protect their data. However, have any of their efforts really improved security? Today we hear journalists and industry experts talk about the erosion of the perimeter. Some say it’s squishy, others say it’s spongy, and yet another claims it crunchy.…

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Infrastructure-as-a-Service Security It’s no secret many organizations rely on popular cloud providers like Amazon and Microsoft for access to computing infrastructure. The many perks of cloud services, such as the ability to quickly scale resources without the upfront cost of buying physical servers, have helped build a multibillion-dollar cloud industry that continues to grow each…