Adding Another Card To Your Cloud Adoption Deck

Adding Another Card To Your Cloud Adoption Deck

For the most part we’ve all heard how the adoption or embracing of the Cloud will help enterprise users to save costs. Those CIOs, CTOs and IT officers who support the Cloud or have been pushing their top brass to accept Cloud adoption have almost always played the cost-savings card in their quest to get support. Use the Cloud and have an elastic Software as a Service that can be reduced as and when users require them. While this has not changed it has become a rather worn out card due to all the times its been played, spun around into something similar from a different angle but still mentioning the same cost-savings, until even the top brass knows what you’re going to pitch next. This may not be the case any longer as a recent study by TNS on behalf of CSC may let you add another card to your Cloud adoption playing deck.

The “CSC Cloud Usage Index” survey conducted by TNS covered 3,645 companies around the world and turned up a surprising number of insights into Cloud adoption. Key amongst these insights was the fact at least 33 percent of the respondents surveyed said that they adopted Cloud services to support easier access for multiple devices in their separate companies. Only 17 percent of users said that they made the move to the Cloud due to cost-savings related reasons. Focusing on companies in the United States 46 percent of small businesses cited access to multiple devices as being their main push in adopting the Cloud while just 10 percent of the same market said that they did so due to cost-saving reasons.

While this points to a better adoption of multiple types of devices in the workplace (asides from the usual business notebook) it does mean that those in charge of pushing Cloud acceptance can now play the card of multiple device access support. At this point of time it would do many of these people much good to familiarize themselves with the multiple consumer-level devices currently invading the workplace. Doing so may be the difference required in getting your Blackberry using CFO to see eye-to-eye with the Android smartphone using VP and your iPhone using CEO.

That being said, not many people actually use their smartphones to do their computing, much less access the Cloud, despite the existence of VPN apps for most of these platforms. The major device catalyst currently staking out its place in the workplace would have to be the touchscreen tablets along with Google powered Chromebooks. Since all of these devices are designed to work well on the Internet it is only natural that they fit will with Cloud computing. However, I personally feel that while it is all good to have a single Cloud solution that everyone can access, having a finger-friendly app designed for each platform would make it all that much sweeter. While this may not be that important to add when making your pitch using the multiple device access card, it is something to consider for future use if it resonates well with your CFO who may suddenly be looking at his or her Blackberry with new anticipation.

It is also important to note that while the cost-savings card is still a valid and very much relevant factor in pushing for Cloud adoption, the “CSC Cloud Usage Index” survey also revealed that most companies saw a much lower percentage in savings compared to those earlier estimated after Cloud adoption. Companies in the survey still got savings with 82 percent of respondents saying that they saw cost-savings after Cloud adoption but only 32 percent of companies in the United States saw savings of less than $20,000. This is not irrelevant by far but it is a bit weak to use as your trump card when making your Cloud adoption pitch.

By Muzaffar Ismail

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

The Future Of Cloud Storage And Sharing…

The Future Of Cloud Storage And Sharing…

Box.net, Amazon Cloud Drive The online (or cloud) storage business has always been a really interesting industry. When we started Box in 2005, it was a somewhat untouchable category of technology, perceived to be a commodity service with low margins and little consumer willingness to pay. All three of these factors remain today, but with…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

Three Reasons Cloud Adoption Can Close The Federal Government’s Tech Gap

Three Reasons Cloud Adoption Can Close The Federal Government’s Tech Gap

Federal Government Cloud Adoption No one has ever accused the U.S. government of being technologically savvy. Aging software, systems and processes, internal politics, restricted budgets and a cultural resistance to change have set the federal sector years behind its private sector counterparts. Data and information security concerns have also been a major contributing factor inhibiting the…

3 Keys To Keeping Your Online Data Accessible

3 Keys To Keeping Your Online Data Accessible

Online Data Data storage is often a real headache for businesses. Additionally, the shift to the cloud in response to storage challenges has caused security teams to struggle to reorient, leaving 49 percent of organizations doubting their experts’ ability to adapt. Even so, decision makers should not put off moving from old legacy systems to…

The Security Gap: What Is Your Core Strength?

The Security Gap: What Is Your Core Strength?

The Security Gap You’re out of your mind if you think blocking access to file sharing services is filling a security gap. You’re out of your mind if you think making people jump through hoops like Citrix and VPNs to get at content is secure. You’re out of your mind if you think putting your…

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups Cloud platforms have become a necessary part of modern business with the benefits far outweighing the risks. However, the risks are real and account for billions of dollars in losses across the globe per year. If you’ve been hacked, you’re not alone. Here are some other companies in the past…

Using Cloud Technology In The Education Industry

Using Cloud Technology In The Education Industry

Education Tech and the Cloud Arguably one of society’s most important functions, teaching can still seem antiquated at times. Many schools still function similarly to how they did five or 10 years ago, which is surprising considering the amount of technical innovation we’ve seen in the past decade. Education is an industry ripe for innovation…

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks Does cloud security risks ever bother you? It would be weird if it didn’t. Cloud computing has a lot of benefits, but also a lot of risks if done in the wrong way. So what are the most important risks? The European Network Information Security Agency did extensive research on that, and…

Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and orchestration. Although it has been mature for decades, the network security market had to transform rapidly with the advent of the BYOD trend and emergence of the cloud, which swept enterprises a few years ago.…