SHI Enhances its IaaS Platform with Cloud Cruiser

SHI Enhances its IaaS Platform with Cloud Cruiser

SHI is enhancing its next generation infrastructure- as-a-service (IaaS) platform with Cloud Cruiser's enterprise suite of cloud cost management and chargeback solutions.
Both companies have inked a strategic deal to this end.

SHI International Corp., a $3 billion+ global provider of information technology products and services, has designed its IaaS cloud platform to support secure, high performance and industrial-grade computing requirements.

Cloud Cruiser, which provides cloud cost management solutions, is enabling enterprises to optimize capex and opex costs in hybrid cloud computing environments across SHI's managed private, private and public clouds.

"Integrating Cloud Cruiser's cost management solution with the SHI Cloud Management Platform (CMP) will provide SHI a competitive differentiator over commodity IaaS solutions," said Henry Fastert, chief technologist at SHI. "Our customers can now
identify greater cost efficiencies migrating workloads to the SHI cloud
."

"While the cloud offers the promise of cost savings through virtualized shared resources and elastic provisioning, its distributed and dynamic nature makes it difficult to track, control and optimize costs," says Dave Zabrowski, founder and CEO of Cloud
Cruiser. "Cloud Cruiser's cloud cost management solution was architected specifically for leading cloud providers like SHI to provide their customers with granular end-to-end cost visibility, resource usage chargeback, and proactive budgets, alerts, and consumption forecasting."

This announcement is apparently right timed as spending on public IT cloud services is predicted to grow at more than five times the rate of the IT industry, according to the companies.

This growth is predicted because organizations are continuously moving a wider range of business applications into the cloud. Managing those costs will become a greater importance to companies as they move more workloads to the cloud.

"Just like traditional IT, with cloud computing, enterprises need to gain visibility and understanding of the true costs involved at a sufficiently detailed level," noted Jay Pultz, Vice President & Distinguished Analyst at Gartner. "Such an understanding is obviously paramount to effective management of cloud computing costs."

By Anuradha Shukla

Sorry, comments are closed for this post.

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

Cloud-Based Services vs. On-Premises: It’s About More Than Just Dollars

Cloud-Based Services vs. On-Premises: It’s About More Than Just Dollars

Cloud-Based Services vs. On-Premises The surface costs might give you pause, but the cost of diminishing your differentiators is far greater. Will a shift to the cloud save you money? Potential savings are historically the main business driver cited when companies move to the cloud, but it shouldn’t be viewed as a cost-saving exercise. There…

How To Overcome Data Insecurity In The Cloud

How To Overcome Data Insecurity In The Cloud

Data Insecurity In The Cloud Today’s escalating attacks, vulnerabilities, breaches, and losses have cut deeply across organizations and captured the attention of, regulators, investors and most importantly customers. In many cases such incidents have completely eroded customer trust in a company, its services and its employees. The challenge of ensuring data security is far more…

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Hyperconverged Infrastructure In this article, we’ll explore three challenges that are associated with network deployment in a hyperconverged private cloud environment, and then we’ll consider several methods to overcome those challenges. The Main Challenge: Bring Your Own (Physical) Network Some of the main challenges of deploying a hyperconverged infrastructure software solution in a data center are the diverse physical…

Lavabit, Edward Snowden and the Legal Battle For Privacy

Lavabit, Edward Snowden and the Legal Battle For Privacy

The Legal Battle For Privacy In early June 2013, Edward Snowden made headlines around the world when he leaked information about the National Security Agency (NSA) collecting the phone records of tens of millions of Americans. It was a dramatic story. Snowden flew to Hong Kong and then Russia to avoid deportation to the US,…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

Having Your Cybersecurity And Eating It Too

Having Your Cybersecurity And Eating It Too

The Catch 22 The very same year Marc Andreessen famously said that software was eating the world, the Chief Information Officer of the United States was announcing a major Cloud First goal. That was 2011. Five years later, as both the private and public sectors continue to adopt cloud-based software services, we’re interested in this…

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks Does cloud security risks ever bother you? It would be weird if it didn’t. Cloud computing has a lot of benefits, but also a lot of risks if done in the wrong way. So what are the most important risks? The European Network Information Security Agency did extensive research on that, and…