Understanding The Cloud Migration Process

Understanding The Cloud Migration Process

Migrating to the cloud can be driven by a number of business factors – reducing capital outlay, increasing the throughput and making the system more robust. Regardless of what reasons they are, the movement to the cloud must be well thought out process. Buzzwords will not save, if you follow the wrong processes. In this post I will cover the issues to think about, during the migration.

1. Deciding on the applications and data to be migrated

You must first decide on what applications and data need to be kept in house and what need to be managed on the cloud. Typical components involved nclude databases, server code, client applications etc. Not all applications are designed for the cloud and this is true if your enterprise has a number of legacy applications. Virtualization can solve the problem in some of the cases, while in other cases you might have to go for a hybrid cloud-enterprise solution until your developers write new applications that supports the cloud resources.

2. Risk mitigation

Managing risk is one of the important factors you must account, especially if you are dealing with sensitive data. Over the years, your developers and engineers might have made a number of hacks to keep your enterprise data secure. Now, as you move many of those hacks would no longer work and might open up new holes you might not realize. Also moving to a public cloud can make your applications and data come under more attack. This requires a proper planning and security audit to understand all the risks involved.

3. Understanding the costs

While cloud computing can be cheap if done the right way, it can also get way expensive if follow the wrong processes. Understanding all the costs involved is a must before the migration. This is especially true if you have already made infrastructure investments recently. You have to take into your account of your performance needs, geo-redundancy requirements, dedicated infrastructure access, etc.

4. Making sure the regulatory things are handled

In many industries there are regulatory issues involved before the migration. For instance, if you are in the medical industry dealing with patient data that you cannot afford to lose or get leaked, you might not be able to move to a public cloud. Thus, make a list of regulatory requirements and audit needs, and see if your new cloud installation satisfies them all.

5. Training the developers and staff

Developers need to be retrained in writing applications that can leverage your cloud resources well. Your staff must also be trained on the security implications. While cloud service providers can provide you good security tools they can’t guard you against human stupidity. Couple of years ago there was an instance of a Twitter staff who inadvertently leaked all the sensitive data about Twitter, stored in her gmail account. The data included their acquisition plans etc and created a storm. Your staff must be  informed of the best practices in keeping your data secure, before you can complete the transition.

By Balaji Viswanathan

Sorry, comments are closed for this post.

Three Tips To Simplify Governance, Risk and Compliance

Three Tips To Simplify Governance, Risk and Compliance

Governance, Risk and Compliance Businesses are under pressure to deliver against a backdrop of evolving regulations and security threats. In the face of such challenges they strive to perform better, be leaner, cut costs and be more efficient. Effective governance, risk and compliance (GRC) can help preserve the business’ corporate integrity and protect the brand,…

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

There is a Difference – So Stop Comparing We are all familiar with the old saying “That’s like comparing apples to oranges” and though we learned this lesson during our early years we somehow seem to discount this idiom when discussing the Cloud. Specifically, IT buyers often feel justified when comparing the cost of a…

Disaster Recovery – A Thing Of The Past!

Disaster Recovery – A Thing Of The Past!

Disaster Recovery  Ok, ok – I understand most of you are saying disaster recovery (DR) is still a critical aspect of running any type of operations. After all – we need to secure our future operations in case of disaster. Sure – that is still the case but things are changing – fast. There are…

Three Reasons Cloud Adoption Can Close The Federal Government’s Tech Gap

Three Reasons Cloud Adoption Can Close The Federal Government’s Tech Gap

Federal Government Cloud Adoption No one has ever accused the U.S. government of being technologically savvy. Aging software, systems and processes, internal politics, restricted budgets and a cultural resistance to change have set the federal sector years behind its private sector counterparts. Data and information security concerns have also been a major contributing factor inhibiting the…

Maintaining Network Performance And Security In Hybrid Cloud Environments

Maintaining Network Performance And Security In Hybrid Cloud Environments

Hybrid Cloud Environments After several years of steady cloud adoption in the enterprise, an interesting trend has emerged: More companies are retaining their existing, on-premise IT infrastructures while also embracing the latest cloud technologies. In fact, IDC predicts markets for such hybrid cloud environments will grow from the over $25 billion global market we saw…

Do Not Rely On Passwords To Protect Your Online Information

Do Not Rely On Passwords To Protect Your Online Information

Password Challenges  Simple passwords are no longer safe to use online. John Barco, vice president of Global Product Marketing at ForgeRock, explains why it’s time the industry embraced more advanced identity-centric solutions that improve the customer experience while also providing stronger security. Since the beginning of logins, consumers have used a simple username and password to…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

Using Cloud Technology In The Education Industry

Using Cloud Technology In The Education Industry

Education Tech and the Cloud Arguably one of society’s most important functions, teaching can still seem antiquated at times. Many schools still function similarly to how they did five or 10 years ago, which is surprising considering the amount of technical innovation we’ve seen in the past decade. Education is an industry ripe for innovation…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…