Basic Checklist For Cloud Computing Customers

Basic Checklist For Cloud Computing Customers

Transition to the cloud could be one of the most important decisions you make in your IT infrastructure management. Thus, it is important that you do it the right way. I have collected a list of the basic things you should consider, before signing a contract with your cloud service provider:

1. Pricing
  • What is the initial setup fee?
  • What are the ongoing fees?
  • Are there any usage fees (charged according to bandwidth used or number of users)?
  • Is there a cap on how much the provider can increase the rates by? If the provider increases the rates beyond the cap, does it provide valid grounds for service termination?
  • What is the total cost of your existing IT infrastructure discounted to the present value? Is it higher than the total cost of the cloud infrastructure?

2. Availability

  • What is the uptime guaranteed by the provider?
  • How does the provider calculate the uptime?
  • Is there any compensation for not satisfying the uptime guarantee?
  • What is the cost per minute of your service downtime? For instance, if you run an online store, you could include the lost sales, cost of increased support calls and an estimate of the loss of brand goodwill.

3. Data Storage

  • How sensitive is your data?
  • Where are the data servers located?
  • What encryption methods are used to secure the data?
  • Are there any guarantees to protect your data against leaks?
  • Who can access your data in the data center?
  • Is the provider allowed to use data and/or metadata? For instance, in Gmail your email content can be read by Google’s algorithms for advertising purposes.
  • In what formats is the data stored? Are those formats easily convertible to the data storage format you use in-house?
  • How often are backups scheduled?
  • Do they use any kind of RAID architecture to improve reliability?

4.Performance and scaling

  • What are the specifications of the discs, RAM and processors used in the servers?
  • Do they use SSDs, flash devices or optimization techniques to improve performance?
  • What is the maximum bandwidth offered?
  • Are your data buses and discs shared with other users?
  • How soon can you add computing resources when needed?
  • What are the performance guarantees offered in the SLA?

5.Termination clauses

  • Can you terminate the contract at any time without a significant penalty?
  • Can you terminate the contract without penalty if there is a security breach or other tenuous circumstances?
  • On what grounds can the provider can terminate your contract?
  • How soon will the provider return your data after termination?

6. Support

  • Is emergency support available 24/7?
  • What kind of support channels are available (phone hotline/email/Web-based chat)?
  • How helpful is the customer help desk?
  • Does the provider have an extensive KB (knowledge base) to help your staff handle simple issues?
By Balaji Viswanathan

Sorry, comments are closed for this post.

Comics
The Security Gap: What Is Your Core Strength?

The Security Gap: What Is Your Core Strength?

The Security Gap You’re out of your mind if you think blocking access to file sharing services is filling a security gap. You’re out of your mind if you think making people jump through hoops like Citrix and VPNs to get at content is secure. You’re out of your mind if you think putting your…

5 Things To Consider About Your Next Enterprise Sharing Solution

5 Things To Consider About Your Next Enterprise Sharing Solution

Enterprise File Sharing Solution Businesses have varying file sharing needs. Large, multi-regional businesses need to synchronize folders across a large number of sites, whereas small businesses may only need to support a handful of users in a single site. Construction or advertising firms require sharing and collaboration with very large (several Gigabytes) files. Financial services…

Lavabit, Edward Snowden and the Legal Battle For Privacy

Lavabit, Edward Snowden and the Legal Battle For Privacy

The Legal Battle For Privacy In early June 2013, Edward Snowden made headlines around the world when he leaked information about the National Security Agency (NSA) collecting the phone records of tens of millions of Americans. It was a dramatic story. Snowden flew to Hong Kong and then Russia to avoid deportation to the US,…

Are Cloud Solutions Secure Enough Out-of-the-box?

Are Cloud Solutions Secure Enough Out-of-the-box?

Out-of-the-box Cloud Solutions Although people may argue that data is not safe in the Cloud because using cloud infrastructure requires trusting another party to look after mission critical data, cloud services actually are more secure than legacy systems. In fact, a recent study on the state of cloud security in the enterprise market revealed that…

Using Cloud Technology In The Education Industry

Using Cloud Technology In The Education Industry

Education Tech and the Cloud Arguably one of society’s most important functions, teaching can still seem antiquated at times. Many schools still function similarly to how they did five or 10 years ago, which is surprising considering the amount of technical innovation we’ve seen in the past decade. Education is an industry ripe for innovation…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

The Rise Of BI Data And How To Use It Effectively

The Rise Of BI Data And How To Use It Effectively

The Rise of BI Data Every few years, a new concept or technological development is introduced that drastically improves the business world as a whole. In 1983, the first commercially handheld mobile phone debuted and provided workers with an unprecedented amount of availability, leading to more productivity and profits. More recently, the Cloud has taken…

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Success for Today’s CMOs Being a CMO is an exhilarating experience – it’s a lot like running a triathlon and then following it with a base jump. Not only do you play an active role in building a company and brand, but the decisions you make have direct impact on the company’s business outcomes for…

3 Keys To Keeping Your Online Data Accessible

3 Keys To Keeping Your Online Data Accessible

Online Data Data storage is often a real headache for businesses. Additionally, the shift to the cloud in response to storage challenges has caused security teams to struggle to reorient, leaving 49 percent of organizations doubting their experts’ ability to adapt. Even so, decision makers should not put off moving from old legacy systems to…