Cloud Computing: Types Of Cloud And Their Relevance – Part 2

Cloud Computing: Types Of Cloud And Their Relevance – Part 2

Types of Cloud and their relevance

There are three relevant types of clouds: Private (internal or vendor-hosted), Public (external), and Hybrid (mixed). Each cloud infrastructure has unique characteristics that can meet business objectives.

Enterprise Private Cloud

A private cloud enables enterprises to implement cloud computing solution at either their own site or at service provider’s datacenter. Enterprises are implementing a private cloud within areas of their infrastructure in which a cloud model makes the most sense. A private cloud provides many of the benefits of cloud computing without the loss of control and security risks associated with other cloud infrastructure models. A private cloud includes virtualization technology to enhance scalability, resource management, and hardware utilization. In addition, it incorporates datacenter automation of provisioning and chargeback metering for consumption and services-based billing capabilities. Identity-based security protocols ensure that only authorized personnel have access to appropriate applications and infrastructure.

An increasingly popular version of a private cloud is a vendor hosted private cloud, sometimes referred to as a partner cloud. With this alternative, the cloud is hosted within a vendor secure data center. Virtualized applications are moved to vendor data center servers, and the vendor uses its cloud enterprise support tools, testing technologies, and procedures.

(Image Source: KPMG)

Advantages/Disadvantages of Enterprise Private Cloud Infrastructure

A private cloud enables customers to leverage many of the benefits of cloud computing within its own datacenter facilities. This cloud infrastructure model is ideal for clients subject to stringent privacy restrictions (banks, government, etc.). However, a private cloud will provide little to no immediate cost savings due to the investments required in technologies.

A provider hosted private cloud allows organizations to take advantage of cloud computing and provider tools, techniques, and experience, while mitigating security risks. In addition, a provider hosted private cloud frees in-house resources and provides an immediate reduction in IT support costs by enabling consumption-based billing. It also eliminates future infrastructure CapEx, while freeing up internal capacity. In short, this cloud model permits users to leverage vendor cloud methodologies, tools, and lower prices. However, it does not provide the optimum promise of cloud computing such as the lowest price and unlimited elasticity to ramp resources.

Public Cloud

In a model similar to electric utilities, a public cloud enables organizations to use infrastructure and applications via the Internet that reside in the cloud. This shared pool of networks, servers, storage, applications, and services are available to multiple end-users or enterprises. End users without actually possessing these resources can gain access to them easily on demand via a Web browser from a laptop or a terminal, wherever they are needed and with minimal management or service provider effort.

(Image Source: KPMG)

Advantages/Disadvantages of Public Cloud

Using a public cloud has significant appeal because it requires no infrastructure investments while enabling unprecedented levels of scalability. The translation for IT shops: greater efficiencies and increased agility at a relatively low cost.

The downside: Organizations are hesitant to move to the public cloud primarily due to security and regulatory concerns. Others worry about locking data into a single vendor’s cloud infrastructure. While public cloud computing allows the enterprise to avoid many infrastructure expenses, it’s important to plan for other associated cost areas tied to a deployment, such as vendor management processes, capacity planning, service oriented architecture (SOA), chargeback systems, incident management and service level agreements (SLAs).

Hybrid Cloud Infrastructure

A hybrid or mixed cloud environment provides the best of both worlds – combining elements of private and public cloud infrastructures. Within this model, a public cloud is leveraged to extend or supplement an internal cloud. For example, a company may employ an internal cloud to share physical and virtual resources over a network, but extend these capabilities when needed such as at peak processing times. Implementing a mixed cloud infrastructure enables enterprises to pick and choose, which applications within the portfolio reside on a public versus private cloud. For example, this model permits financial applications with the most proprietary information to remain behind a firewall, while other software such as collaboration, customer service, or supply chain can reside on a public cloud.

(Image Source: KPMG)

Advantages/Disadvantages of Hybrid Cloud Infrastructure

A mixed cloud infrastructure model supports high capacity time periods and mitigates security risks on mission-critical applications. It enables you to leverage the advantages of public cloud for more portable and appropriate applications, while maintaining control over legacy and vital systems with greater compliance, performance, and security requirements. The hybrid model also provides an optimal approach for architecture since organizations can combine local infrastructure with infrastructure that is scalable and provisioned on demand. Accordingly, a mixed model offers substantial cost savings at the same time as enabling almost unlimited flexibility. It is important to note, however, by using this model enterprises are trading additional cost savings for added security.

Because of these considerable advantages, a hybrid cloud model is likely to be the most widely adopted infrastructure for global enterprises. The drawback to this model is the complexity of monitoring and managing all portions of the hybrid cloud from a common portal or service desk. This requires considerable engineering on the part of the IT organization or the acquisition of third-party vendor services to provide the necessary “glue” to oversee the enterprise environment wealth of information on how to enhance their business value while reducing costs and freeing resources for more strategic initiatives.

By Gopan Joshi

Gopan is Product Manager: Cloud Computing Services, Netmagic Solutions Pvt. Ltd. and has expertise in managing products and services in various market scenarios and life cycle stages. His experiences ranges from introducing cutting edge innovations in existing products, existing markets to new technology, new markets.

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comic
Three Factors For Choosing Your Long-term Cloud Strategy

Three Factors For Choosing Your Long-term Cloud Strategy

Choosing Your Long-term Cloud Strategy A few weeks ago I visited the global headquarters of a large multi-national company to discuss cloud strategy with the CIO. I arrived 30 minutes early and took a tour of the area where the marketing team showcased their award winning brands. I was impressed by the digital marketing strategy…

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups Cloud platforms have become a necessary part of modern business with the benefits far outweighing the risks. However, the risks are real and account for billions of dollars in losses across the globe per year. If you’ve been hacked, you’re not alone. Here are some other companies in the past…

Are Cloud Solutions Secure Enough Out-of-the-box?

Are Cloud Solutions Secure Enough Out-of-the-box?

Out-of-the-box Cloud Solutions Although people may argue that data is not safe in the Cloud because using cloud infrastructure requires trusting another party to look after mission critical data, cloud services actually are more secure than legacy systems. In fact, a recent study on the state of cloud security in the enterprise market revealed that…

Using Private Cloud Architecture For Multi-Tier Applications

Using Private Cloud Architecture For Multi-Tier Applications

Cloud Architecture These days, Multi-Tier Applications are the norm. From SharePoint’s front-end/back-end configuration, to LAMP-based websites using multiple servers to handle different functions, a multitude of apps require public and private-facing components to work in tandem. Placing these apps in entirely public-facing platforms and networks simplifies the process, but at the cost of security vulnerabilities. Locating everything…

Micro-segmentation – Protecting Advanced Threats Within The Perimeter

Micro-segmentation – Protecting Advanced Threats Within The Perimeter

Micro-segmentation Changing with the times is frequently overlooked when it comes to data center security. The technology powering today’s networks has become increasingly dynamic, but most data center admins still employ archaic security measures to protect their network. These traditional security methods just don’t stand a chance against today’s sophisticated attacks. That hasn’t stopped organizations…

5 Ways To Ensure Your Cloud Solution Is Always Operational

5 Ways To Ensure Your Cloud Solution Is Always Operational

Ensure Your Cloud Is Always Operational We have become so accustomed to being online that we take for granted the technological advances that enable us to have instant access to everything and anything on the internet, wherever we are. In fact, it would likely be a little disconcerting if we really mapped out all that…

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Cloud Email Migration In today’s litigious society, preserving your company’s data is a must if you (and your legal team) want to avoid hefty fines for data spoliation. But what about when you move to the cloud? Of course, you’ve probably thought of this already. You’ll have a migration strategy in place and you’ll carefully…

Data Breaches: Incident Response Planning – Part 1

Data Breaches: Incident Response Planning – Part 1

Incident Response Planning – Part 1 The topic of cybersecurity has become part of the boardroom agendas in the last couple of years, and not surprisingly — these days, it’s almost impossible to read news headlines without noticing yet another story about a data breach. As cybersecurity shifts from being a strictly IT issue to…

Report: Enterprise Cloud Computing Moves Into Mature Growth Phase

Report: Enterprise Cloud Computing Moves Into Mature Growth Phase

Verizon Cloud Report Enterprises using the cloud, even for mission-critical projects, is no longer new or unusual. It’s now firmly established as a reliable workhorse for an organization and one that can deliver great value and drive transformation. That’s according to a new report from Verizon entitled “State of the Market: Enterprise Cloud 2016.” which…

Protecting Your Web Applications In A Hybrid Cloud Environment

Protecting Your Web Applications In A Hybrid Cloud Environment

Protecting Your Web Applications It’s no secret that organizations are embracing the cloud and all the benefits that it entails. Whether its cost savings, increased flexibility or enhanced productivity – businesses around the world are leveraging the cloud to scale their business and better serve their customers. They are using a variety of cloud solutions…

Cloud Infographic – Interesting Big Data Facts

Cloud Infographic – Interesting Big Data Facts

Big Data Facts You Didn’t Know The term Big Data has been buzzing around tech circles for a few years now. Forrester has defined big data as “Technologies and techniques that make capturing value from data at an extreme scale economical.” The key word here is economical. If the costs of extracting, processing, and making use…

Three Factors For Choosing Your Long-term Cloud Strategy

Three Factors For Choosing Your Long-term Cloud Strategy

Choosing Your Long-term Cloud Strategy A few weeks ago I visited the global headquarters of a large multi-national company to discuss cloud strategy with the CIO. I arrived 30 minutes early and took a tour of the area where the marketing team showcased their award winning brands. I was impressed by the digital marketing strategy…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

Big Data and Financial Services – Security Threat or Massive Opportunity?

Big Data and Financial Services – Security Threat or Massive Opportunity?

Big Data and Financial Services Cloud Banking Insights Series focuses on big data in the financial services industry and whether it is a security threat or actually a massive opportunity. How does big data fit into an overall cloud strategy? Most FI’s have a positive mind-set towards cloud IT consumption as it not only enables…

Expert Insights Into The Yahoo Breach

Expert Insights Into The Yahoo Breach

Yahoo Breach Latest reports suggest that the recent Yahoo! data breach may exceed 500 million records, with some sources implying millions more records penetrated, upping the total number of records stolen in various recent hacks to approximately 3.5 billion. CloudTweaks spoke to Kevin O’Brien, CEO of GreatHorn, for expert insight into this latest violation. GreatHorn…

Using Private Cloud Architecture For Multi-Tier Applications

Using Private Cloud Architecture For Multi-Tier Applications

Cloud Architecture These days, Multi-Tier Applications are the norm. From SharePoint’s front-end/back-end configuration, to LAMP-based websites using multiple servers to handle different functions, a multitude of apps require public and private-facing components to work in tandem. Placing these apps in entirely public-facing platforms and networks simplifies the process, but at the cost of security vulnerabilities. Locating everything…

Big Data’s Significant Role In Fintech

Big Data’s Significant Role In Fintech

Data Banking Fintech covers a range of financial fields such as retail banking, investments, and lending and thanks to the mobile and internet innovations of late is a thriving sector. Offering improvements which drive customer satisfaction and education in an area previously inscrutable and dictated by gigantic inflexible corporations, fintech is helping put the power…

Battle of the Clouds: Multi-Instance vs. Multi-Tenant

Battle of the Clouds: Multi-Instance vs. Multi-Tenant

Multi-Instance vs. Multi-Tenant The cloud is part of everything we do. It’s always there backing up our data, pictures, and videos. To many, the cloud is considered to be a newer technology. However, cloud services actually got their start in the late 90s when large companies used it as a way to centralize computing, storage,…

Infographic: 9 Things To Know About Business Intelligence (BI) Software

Infographic: 9 Things To Know About Business Intelligence (BI) Software

Business Intelligence (BI) Software  How does your company track its data? It’s a valuable resource—so much so that it’s known as Business Intelligence, or BI. But using it, integrating it into your daily processes, that can be significantly difficult. That’s why there’s software to help. But when it comes to software, there are lots of…