How Companies Are Adopting and Adapting to Cloud Computing: KPMG

How Companies Are Adopting and Adapting to Cloud Computing

There have been several studies attesting to the growth of cloud computing, and some of them have been covered in earlier articles (See: Where Is Cloud Computing Going? Up, Up And Away! and How BIG Is the Cloud Computing Market?). Now, KPMG has come out with study that shows not only how fast cloud computing is growing, but also what is compelling this change.According to the study conducted among 806 executives, many from the C-suite, 81% responded that their organizations had already moved at least some business activities to the cloud and 17% of them expect 2012 investment “to skyrocket, with some companies planning to spend more than a fifth of their IT budget on cloud next year”. 10% of the respondents said that their organizations were already running their entire core IT services on the cloud, while 13% responded that the process was underway.

The study also revealed the reasons companies were taking to the cloud. 80% cited process improvement as the reason; 79% of users and 76% of providers believed that the shift leads to technical benefits, and 76% said the use of cloud computing would have strategic benefits, possibly including transforming their business models to gain a competitive advantage.

The respondents stressed that a move to the cloud will have to deliver tangible cost reductions for organization-wide buy-in, with different proportions gunning for different percentages of required savings on IT spending. 45% said they would have to be between 1-10% of current levels, 34% proposed a range of 11-25%, while 10% had high expectations of 25%-plus reductions.

For some ways in which companies can save money by adopting cloud computing, see:

1. How Cloud Computing Can Save You Money

2. Saving Money on Rent by Going on the Cloud

3. Saving Money on Energy by Going on the Cloud

KPMG summarized the beneficial effects of cloud computing, as seen by companies, as follows: “Cloud is transformative in that it is creating new business opportunities as companies harness its power to efficiently facilitate new revenue, services and businesses. It is breaking down barriers in the supply chain, creating more effective and timely interaction between clients and suppliers. It is delivering speed, agility and cost reduction to IT and other functional areas within the enterprise. The transformative impact of cloud can readily be seen across the enterprise in areas from HR, CRM, and IT infrastructure.”

Steve Hasty, head of Global IT Advisory, Risk Consulting at KPMG, commented, “Cloud adoption is quickly shifting from a competitive advantage to an operational necessity, enabling innovation that can create new business models and opportunities. As this rapid adoption curve continues to gain momentum amid a struggling economy, it is important for corporate leadership, directors and boards to be informed and engaged in strategic discussions about Cloud’s impact on their long-term growth opportunities and competitiveness.”

Official Press Release at http://www.kpmg.com/global/en/issuesandinsights/articlespublications/press-releases/pages/cloud-is-now.aspx

Sorry, comments are closed for this post.

OpenStack Interoperability – Dawn Of A New Era?

OpenStack Interoperability – Dawn Of A New Era?

The Interoperability Challenge! OpenStack has always had interoperability as one of its unique selling points. Simply put – you can use OpenStack on-premise and what you develop will also work with other OpenStack environments. Open APIs and open source is the common denominator. However until now, it has been an elusive feature or really dream…

7 Common Cloud Security Missteps

7 Common Cloud Security Missteps

Cloud Security Missteps Cloud computing remains shrouded in mystery for the average American. The most common sentiment is, “It’s not secure.” Few realize how many cloud applications they access every day: Facebook, Gmail, Uber, Evernote, Venmo, and the list goes on and on… People flock to cloud services for convenient solutions to everyday tasks. They…

Personal Space And The Internet of Things (IoT)

Personal Space And The Internet of Things (IoT)

The Internet of Things (IoT) There is a long time concept of the personal area network or PAN. For all intent and purposes this is the maximum distance a Bluetooth device can move away from the host and still be functional. As I read the many wonderful pieces on the explosion of IoT and wearable…

Immune Systems: Information Security And Risk In 2016

Immune Systems: Information Security And Risk In 2016

Information Security And Risk C-suite executives have woken up to the threat posed by data theft, denial-of-service attacks and vulnerable systems. In 2015, for example, a series of high-profile cases illustrated the degree to which such attacks can damage a company’s reputation, brand and, ultimately, profits. Where businesses once undervalued cybersecurity, considering it the domain of CIOs and…

Is Your Corporate Data Appearing On Personal Clouds?

Is Your Corporate Data Appearing On Personal Clouds?

Corporate Data Appearing On Personal Clouds Enterprise cloud adoption has led to cloud consumerization, but how safe is any personal cloud? Remember when you’d join a company and they’d issue a desktop computer and corporate-issued cell phone? And remember all the company’s data was stored in a server on-site at the company? It’s fair to…

Managed Services Providers (MSPs) – Urged To Embrace The Cloud

Managed Services Providers (MSPs) – Urged To Embrace The Cloud

Managed Services Providers (MSPs)  If you’ve been observant of the MSP industry over the last two years, you’ve no doubt noticed that it has had significant difficulty expanding its service capabilities and growing its revenue stream around cloud computing. At least that was the analysis of recent market research studies assessing the status of cloud…

The Concept Of Securing IoT To Secure Your Building

The Concept Of Securing IoT To Secure Your Building

Securing IoT Ah, security. It is the dulcet tone of a symphony that we play over and over in the IT world. IoT (Internet of Things) and the myriad of connected devices allow us some intriguing security options. For example, in a mesh array of sensors, you could effectively force users to correctly identify themselves…

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Advertising