Cloud Computing: Cloud Service Models – Part 3

Cloud Service Models – Part 3

Continued From Part 2…

Infrastructure as a Service (IaaS)

This service model enables user organizations to forgo deployment of new datacenter equipment to handle growing operational needs. Rather, the business obtains needed IT infrastructure – servers, security, storage, networks, etc. – from a cloud services provider, often via a self-service catalog. While a user company can run applications, databases, operating systems and other software on top of its selected infrastructure, it has no direct control over or access to those machines. The cloud service provider manages the infrastructure, including any scaling up or down as needed.

Infrastructure as a Service is similar in concept to a traditional dedicated hosting service, with two major differences: Organizations tap into a shared, highly scalable pool of resources, and they pay for only what’s used on a utility basis. In other words, organizations can increase productivity while eliminating under utilization costs. IT shops must keep in mind, however, that multi-tenancy applies across the public cloud infrastructure. They have no way of controlling the types of virtual resources running atop the infrastructure they’ve provisioned from the cloud.

Platform as a Service (PaaS)

Derived from the SaaS model, PaaS caters to developers’ needs. Rather than simply delivering prepackaged applications via the on a service model, a PaaS provider offers up the entire computing platform and solutions stack needed for an application runtime environment. With PaaS, a company can deploy applications without incurring the associated upfront provisioning and ongoing maintenance and management costs of the underlying infrastructure. The user organization has application control, the caveat in many cases being that the developers must be comfortable with the PaaS provider’s choices for programming languages, interfaces, development tools, database support and the like.

The types of PaaS offerings vary; which option works best for a business depends on its goals. For example, some cloud companies offer a PaaS and SaaS combo, providing organizations with the ability to customize the packaged application. Although being able to tweak the application may make the SaaS model more attractive, the catch is that when combined with a PaaS offering, SaaS becomes less portable. The richest PaaS offerings enable an organization to support the entire application development lifecycle.

Software as a Service (SaaS)

Often geared toward the end user who needs access through a web browser or other thin clients, SaaS provides access to applications hosted on a service provider’s cloud infrastructure. A business can find just about any general office application available via the SaaS model. Customer relationship management (CRM), calendaring, e-mail and human resources management are among some of the more common applications delivered as services from the cloud infrastructure.

For IT departments, IT service management, spam filtering, intrusion prevention and other traditional security software are among the application types increasingly available via the SaaS model. With SaaS, the user organization neither owns the application nor the associated servers, operating systems, storage, network or other IT resources required for its support and delivery. For example, users can define their own firewall policies or white-label applications in their names.

Key Questions When Considering the Cloud

Some questions to ask internally before hopping on to the Cloud bandwagon:

  • Which parts of my business are suitable for moving to a cloud-based delivery model and which are not?

  • How much of each process should I consider placing on the cloud?

  • Should I retain control in-house but use cloud-based infrastructure, buy the entire process as a service, or something in between?

  • Which services are enterprise-ready and offer the right levels of security and governance for my business?

  • How does transitioning to a cloud impact my procurement and what else should I consider before signing on the dotted line?

  • How do I establish a winning strategy to fulfill short-term needs and provide long-term advantage by leveraging virtualization and cloud?
By Gopan Joshi

Gopan is Product Manager: Cloud Computing Services, Netmagic Solutions Pvt. Ltd. and has expertise in managing products and services in various market scenarios and life cycle stages. His experiences ranges from introducing cutting edge innovations in existing products, existing markets to new technology, new markets.

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…

Adopting A Cohesive GRC Mindset For Cloud Security

Adopting A Cohesive GRC Mindset For Cloud Security

Cloud Security Mindset Businesses are becoming wise to the compelling benefits of cloud computing. When adopting cloud, they need a high level of confidence in how it will be risk-managed and controlled, to preserve the security of their information and integrity of their operations. Cloud implementation is sometimes built up over time in a business,…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud Cloud computing is more than just another storage tier. Imagine if you’re able to scale up 10x just to handle seasonal volumes or rely on a true disaster-recovery solution without upfront capital. Although the pay-as-you-go pricing model of cloud computing makes it a noticeable expense, it’s the only solution for many…

Three Reasons Cloud Adoption Can Close The Federal Government’s Tech Gap

Three Reasons Cloud Adoption Can Close The Federal Government’s Tech Gap

Federal Government Cloud Adoption No one has ever accused the U.S. government of being technologically savvy. Aging software, systems and processes, internal politics, restricted budgets and a cultural resistance to change have set the federal sector years behind its private sector counterparts. Data and information security concerns have also been a major contributing factor inhibiting the…

The Fully Aware, Hybrid-Cloud Approach

The Fully Aware, Hybrid-Cloud Approach

Hybrid-Cloud Approach For over 20 years, organizations have been attempting to secure their networks and protect their data. However, have any of their efforts really improved security? Today we hear journalists and industry experts talk about the erosion of the perimeter. Some say it’s squishy, others say it’s spongy, and yet another claims it crunchy.…

The Security Gap: What Is Your Core Strength?

The Security Gap: What Is Your Core Strength?

The Security Gap You’re out of your mind if you think blocking access to file sharing services is filling a security gap. You’re out of your mind if you think making people jump through hoops like Citrix and VPNs to get at content is secure. You’re out of your mind if you think putting your…

Cloud-Based or On-Premise ERP Deployment? Find Out

Cloud-Based or On-Premise ERP Deployment? Find Out

ERP Deployment You know how ERP deployment can improve processes within your supply chain, and the things to keep in mind when implementing an ERP system. But do you know if cloud-based or on-premise ERP deployment is better for your company or industry? While cloud computing is becoming more and more popular, it is worth…