Adding Another Card To Your Cloud Adoption Deck

Adding Another Card To Your Cloud Adoption Deck

For the most part we’ve all heard how the adoption or embracing of the Cloud will help enterprise users to save costs. Those CIOs, CTOs and IT officers who support the Cloud or have been pushing their top brass to accept Cloud adoption have almost always played the cost-savings card in their quest to get support. Use the Cloud and have an elastic Software as a Service that can be reduced as and when users require them. While this has not changed it has become a rather worn out card due to all the times its been played, spun around into something similar from a different angle but still mentioning the same cost-savings, until even the top brass knows what you’re going to pitch next. This may not be the case any longer as a recent study by TNS on behalf of CSC may let you add another card to your Cloud adoption playing deck.

The “CSC Cloud Usage Index” survey conducted by TNS covered 3,645 companies around the world and turned up a surprising number of insights into Cloud adoption. Key amongst these insights was the fact at least 33 percent of the respondents surveyed said that they adopted Cloud services to support easier access for multiple devices in their separate companies. Only 17 percent of users said that they made the move to the Cloud due to cost-savings related reasons. Focusing on companies in the United States 46 percent of small businesses cited access to multiple devices as being their main push in adopting the Cloud while just 10 percent of the same market said that they did so due to cost-saving reasons.

While this points to a better adoption of multiple types of devices in the workplace (asides from the usual business notebook) it does mean that those in charge of pushing Cloud acceptance can now play the card of multiple device access support. At this point of time it would do many of these people much good to familiarize themselves with the multiple consumer-level devices currently invading the workplace. Doing so may be the difference required in getting your Blackberry using CFO to see eye-to-eye with the Android smartphone using VP and your iPhone using CEO.

That being said, not many people actually use their smartphones to do their computing, much less access the Cloud, despite the existence of VPN apps for most of these platforms. The major device catalyst currently staking out its place in the workplace would have to be the touchscreen tablets along with Google powered Chromebooks. Since all of these devices are designed to work well on the Internet it is only natural that they fit will with Cloud computing. However, I personally feel that while it is all good to have a single Cloud solution that everyone can access, having a finger-friendly app designed for each platform would make it all that much sweeter. While this may not be that important to add when making your pitch using the multiple device access card, it is something to consider for future use if it resonates well with your CFO who may suddenly be looking at his or her Blackberry with new anticipation.

It is also important to note that while the cost-savings card is still a valid and very much relevant factor in pushing for Cloud adoption, the “CSC Cloud Usage Index” survey also revealed that most companies saw a much lower percentage in savings compared to those earlier estimated after Cloud adoption. Companies in the survey still got savings with 82 percent of respondents saying that they saw cost-savings after Cloud adoption but only 32 percent of companies in the United States saw savings of less than $20,000. This is not irrelevant by far but it is a bit weak to use as your trump card when making your Cloud adoption pitch.

By Muzaffar Ismail

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comic
InformationWeek Reveals Top 125 Vendors Taking the Technology Industry by Storm

InformationWeek Reveals Top 125 Vendors Taking the Technology Industry by Storm

InformationWeek Reveals Top 125 Vendors Five-part series details companies to watch across five essential technology sectors SAN FRANCISCO, Sept. 27, 2016 /PRNewswire/ — InformationWeek released its list of “125 Vendors to Watch” in 2017. Selected by InformationWeek’s expert editorial team, the companies listed fall into one of five key themes: infrastructure, security, cloud, data management and…

Part 1 – Connected Vehicles: Paving The Way For IoT On Wheels

Part 1 – Connected Vehicles: Paving The Way For IoT On Wheels

Connected Vehicles From cars to combines, the IoT market potential of connected vehicles is so expansive that it will even eclipse that of the mobile phone. Connected personal vehicles will be the final link in a fully connected IoT ecosystem. This is an incredibly important moment to capitalize on given how much time people spend…

Embedded Sensors and the Wearable Personal Cloud

Embedded Sensors and the Wearable Personal Cloud

The Wearable Personal Cloud Wearable tech is one avenue of technology that’s encouraging cloud connections and getting us all onto interconnected networks, and with the continued miniaturization and advancement of computing the types of wearable tech are always expanding and providing us with new opportunities. A few years ago, smartwatches were rather clunky devices with…

SWIFT Says Bank Hacks Set To Increase

SWIFT Says Bank Hacks Set To Increase

Bank Hacks Set To Increase SWIFT, whose messaging network is used by banks to send payment instructions worth trillions of dollars each day, said three clients were hacked over the summer and cyber attacks on banks are set to increase. The theft of $81 million in February from Bangladesh’s central bank using SWIFT messages rocked…

Security: Avoiding A Hatton Garden-Style Data Center Heist

Security: Avoiding A Hatton Garden-Style Data Center Heist

Data Center Protection In April 2015, one of the world’s biggest jewelry heists occurred at the Hatton Garden Safe Deposit Company in London. Posing as workmen, the criminals entered the building through a lift shaft and cut through a 50cm-thick concrete wall with an industrial power drill. Once inside, the criminals had free and unlimited…

Cloud-based GRC Intelligence Supports Better Business Performance

Cloud-based GRC Intelligence Supports Better Business Performance

Cloud-based GRC Intelligence All businesses need a strategy and processes for governance, risk and compliance (GRC). Many still view GRC activity as a burdensome ‘must-do,’ approaching it reactively and managing it with non-specialized tools. GRC is a necessary business endeavor but it can be elevated from a cost drain to a value-add activity. By integrating…

Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and orchestration. Although it has been mature for decades, the network security market had to transform rapidly with the advent of the BYOD trend and emergence of the cloud, which swept enterprises a few years ago.…

THE FUTURE OF BIG DATA AND DNS ANALYTICS

THE FUTURE OF BIG DATA AND DNS ANALYTICS

Big Data and DNS Analytics Big Data is revolutionizing the way admins manage their DNS traffic. New management platforms are combining historical data with advanced analytics to inform admins about possible performance degradation in their networks. Not only that, but they also have the ability to suggest ways to optimize network configurations for faster routing.…

The Fully Aware, Hybrid-Cloud Approach

The Fully Aware, Hybrid-Cloud Approach

Hybrid-Cloud Approach For over 20 years, organizations have been attempting to secure their networks and protect their data. However, have any of their efforts really improved security? Today we hear journalists and industry experts talk about the erosion of the perimeter. Some say it’s squishy, others say it’s spongy, and yet another claims it crunchy.…

Driving Success: 6 Key Metrics For Every Recurring Revenue Business

Driving Success: 6 Key Metrics For Every Recurring Revenue Business

Recurring Revenue Business Metrics Recurring revenue is the secret sauce behind the explosive growth of powerhouses like Netflix and Uber. Unsurprisingly, recurring revenue is also quickly gaining ground in more traditional industries like healthcare and the automotive business. In fact, nearly half of U.S. businesses have adopted or are planning to adopt a recurring revenue model,…

Cloud Security: The Top 8 Risks According To ENISA

Cloud Security: The Top 8 Risks According To ENISA

Cloud Security Risks Does security in the cloud ever bother you? It would be weird if it didn’t. Cloud computing has a lot of benefits, but also a lot of risks if done in the wrong way. So what are the most important risks? The European Network Information Security Agency did extensive research on that,…

Containerization: The Bold Face Of The Cloud In 2016

Containerization: The Bold Face Of The Cloud In 2016

Containerization And The Cloud “Right now, the biggest technology shift in the cloud is a rapid evolution from simple virtual machine (VM) hosting toward containerization’’ says the CTO of Microsoft Azure, Mark Russinovitch, a man who deals with the evolving cloud infrastructure every day. In his words, containerization is “an incredibly efficient, portable, and lightweight…

Surprising Facts and Stats About The Big Data Industry

Surprising Facts and Stats About The Big Data Industry

Facts and Stats About The Big Data Industry If you start talking about big data to someone who is not in the industry, they immediately conjure up images of giant warehouses full of servers, staff poring over page after page of numbers and statistics, and some big brother-esque official sat in a huge government building…

How Data Science And Machine Learning Is Enabling Cloud Threat Protection

How Data Science And Machine Learning Is Enabling Cloud Threat Protection

Data Science and Machine Learning Security breaches have been consistently rising in the past few years. Just In 2015, companies detected 38 percent more security breaches than in the previous year, according to PwC’s Global State of Information Security Survey 2016. Those breaches are a major expense — an average of $3.79 million per company,…