Understanding The Cloud Migration Process

Understanding The Cloud Migration Process

Migrating to the cloud can be driven by a number of business factors – reducing capital outlay, increasing the throughput and making the system more robust. Regardless of what reasons they are, the movement to the cloud must be well thought out process. Buzzwords will not save, if you follow the wrong processes. In this post I will cover the issues to think about, during the migration.

1. Deciding on the applications and data to be migrated

You must first decide on what applications and data need to be kept in house and what need to be managed on the cloud. Typical components involved nclude databases, server code, client applications etc. Not all applications are designed for the cloud and this is true if your enterprise has a number of legacy applications. Virtualization can solve the problem in some of the cases, while in other cases you might have to go for a hybrid cloud-enterprise solution until your developers write new applications that supports the cloud resources.

2. Risk mitigation

Managing risk is one of the important factors you must account, especially if you are dealing with sensitive data. Over the years, your developers and engineers might have made a number of hacks to keep your enterprise data secure. Now, as you move many of those hacks would no longer work and might open up new holes you might not realize. Also moving to a public cloud can make your applications and data come under more attack. This requires a proper planning and security audit to understand all the risks involved.

3. Understanding the costs

While cloud computing can be cheap if done the right way, it can also get way expensive if follow the wrong processes. Understanding all the costs involved is a must before the migration. This is especially true if you have already made infrastructure investments recently. You have to take into your account of your performance needs, geo-redundancy requirements, dedicated infrastructure access, etc.

4. Making sure the regulatory things are handled

In many industries there are regulatory issues involved before the migration. For instance, if you are in the medical industry dealing with patient data that you cannot afford to lose or get leaked, you might not be able to move to a public cloud. Thus, make a list of regulatory requirements and audit needs, and see if your new cloud installation satisfies them all.

5. Training the developers and staff

Developers need to be retrained in writing applications that can leverage your cloud resources well. Your staff must also be trained on the security implications. While cloud service providers can provide you good security tools they can’t guard you against human stupidity. Couple of years ago there was an instance of a Twitter staff who inadvertently leaked all the sensitive data about Twitter, stored in her gmail account. The data included their acquisition plans etc and created a storm. Your staff must be  informed of the best practices in keeping your data secure, before you can complete the transition.

By Balaji Viswanathan

Sorry, comments are closed for this post.

Comics
The Key To Improving Business Lies In Eye-Interaction Tech

The Key To Improving Business Lies In Eye-Interaction Tech

Eye-Interaction Technology Analysts at Goldman Sachs predict virtual reality revenue will surpass TV within the next decade. More than just some gaming fad, VR represents a whole new way for organizations to train, research, and explore vast amounts of data. Despite its popularity, however, VR is still not in the hands of the majority, and business on a large scale cannot function without all business partners having access to the technology. But with eye interaction…

Identity and Access Management: Advancing to Meet the Changing Needs of Passwords and Governance

Identity and Access Management: Advancing to Meet the Changing Needs of Passwords and Governance

Identity and Access Management The identity and access management market continues to grow in a wide variety of industries of all sizes. As has been much discussed in many headlines, this is primarily because of three main reasons: 1) It is much more cost effective to implement than in past years; 2) Solutions can be implemented fairly quickly, and 3) Companies have realized the great benefits IAM solutions bring to their organization. As the IAM…

Three Factors For Choosing Your Long-term Cloud Strategy

Three Factors For Choosing Your Long-term Cloud Strategy

Choosing Your Long-term Cloud Strategy A few weeks ago I visited the global headquarters of a large multi-national company to discuss cloud strategy with the CIO. I arrived 30 minutes early and took a tour of the area where the marketing team showcased their award winning brands. I was impressed by the digital marketing strategy and the way they were clearly leveraging the world of social, mobile analytics and cloud. So I mentioned to our…

7 Common Cloud Security Missteps

7 Common Cloud Security Missteps

Cloud Security Missteps Cloud computing remains shrouded in mystery for the average American. The most common sentiment is, “It’s not secure.” Few realize how many cloud applications they access every day: Facebook, Gmail, Uber, Evernote, Venmo, and the list goes on and on… People flock to cloud services for convenient solutions to everyday tasks. They are so easy to start using that consumers rarely think twice about setting up an account or downloading a new…

2017 Brings DLP Technology and IoT’s Weaknesses to Light

2017 Brings DLP Technology and IoT’s Weaknesses to Light

DLP Technology In regards to data loss prevention (DLP), in the last five years many companies rushed to implement DLP solutions without taking the time to first identify the data that should not transit egress points. Most of these rushed implementations have not been successful. Security analysts, in particular 451 Research, have been recommending that companies should first identify and classify data before deploying DLP. Unfortunately, we are just now seeing companies execute this approach.…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are taking steps to improve data security, few are considering the most likely cause of such a threat: human error. According…

Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and orchestration. Although it has been mature for decades, the network security market had to transform rapidly with the advent of the BYOD trend and emergence of the cloud, which swept enterprises a few years ago. The market persevered, weathering the “end of perimeter security” claims and adapting to become more flexible and dynamic, reaching beyond…

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks Does cloud security risks ever bother you? It would be weird if it didn’t. Cloud computing has a lot of benefits, but also a lot of risks if done in the wrong way. So what are the most important risks? The European Network Information Security Agency did extensive research on that, and identified 35 risk categories. This analysis is used by a number of players in the industry, including certain banking regulators.…

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Once upon a time, only a select few companies like Google and Salesforce possessed the knowledge and expertise to operate efficient cloud infrastructure and applications. Organizations patronizing those companies benefitted with apps that offered new benefits in flexibility, scalability and cost effectiveness. These days, the sharp division between cloud and on-premises infrastructure is quickly becoming a thing of the past. In fact, the cloud has become so ingrained in the fabric of…