Answers To Gartner’s Six Cloud Computing Risks

Answers To Gartner’s Six Cloud Computing Risks

Cloud computing has been the subject of ever-increasing hype. Anything exposed to such publicity is always accompanied by criticism, whether it be constructive or destructive. Gartner, an information technology research and advisory firm, has completed a report which signifies some crucial risks in the cloud computing industry.

Given below, with appropriate answers to each, are six risks highlighted by the Gartner report.

1: Privileged User Access: A risk which deals with who manages the data of an organization in the cloud. Interestingly, the way most datacenters operate is that there are not very many people around. It is largely an automated process; software is in control of other software or data. In contrast, an organization could have untrustworthy or unreliable employees at its on-premises datacenter. The very fact that automated processes look after an organization’s data means that clouds are more secure compared to data in the hands of the organization itself.

2: Regulatory Compliance: A risk regarding certifications and regulations in relation to a cloud service. Here, the argument is that it is in the cloud service provider’s interest to get as many certifications as it can. Owing to the fact that Gartner’s report on cloud computing risks was published back in 2008, prominent cloud providers have actually acquired certification for their services and datacenters.

3:  Data location: Organizations think of it as a big issue regarding what will happen if their data swims out of control. Taking a step back, if one pictures an individual walking out of his office with a laptop on which his critical data is stored, the chances are high that this laptop could be snatched from him. So, the risk of data location is much greater if one does not store one’s data in the cloud. An intelligent response to the menace of data location is to choose multiple cloud services and store different portions of data in different clouds, so decreasing the danger of data location.

4: Data Segregation: An aspect which deals with the issue that one’s data should not mix with someone else’s data. Yet again, the response to this issue is automation. Today’s cloud services use highly automated services which literally decrease the chances of data loss and data segregation to nearly zero.

5: Data recovery: A topic which implies that consumers might not be able to get their data back. Principally, if some data is mission critical to an organization, the organization will double or even triple back up. More importantly, an organization cannot blame a cloud service for a logical failure – an organization is responsible for deleting its own files, and it cannot hold a cloud responsible for its lost data.

6: Long-term Viability: An aspect which implies that the cloud provider remains in service for eternity. Ideally speaking, there are two aspects of this situation. The first facet, as mentioned before, indicates that an organization should keep its mission-critical data backed up with other cloud services or in-house datacenters. The second part deals with the continuity of a business service. A cloud provider can easily achieve a higher level than a business on its own, particularly in the case of today’s small-scale businesses. Looking at the cloud giants of today, they do not look like they are going to hit any difficulties anytime soon.

Going even further and taking a look from a different angle, there could come a point where cloud providers have grown to such huge sizes that it would not be in the interests of governments to intervene – similar to the banking scenario of today.

By Haris Smith

Sorry, comments are closed for this post.

Comic
The Annual Compliance & Ethics Institute:  Hot Topics – Cyber Security, Big Data, Privacy Breach Response

The Annual Compliance & Ethics Institute: Hot Topics – Cyber Security, Big Data, Privacy Breach Response

Cyber Security, Big Data, Privacy Breach Response MINNEAPOLIS, Aug. 30, 2016 /PRNewswire-USNewswire/ — Cyber security, social media, modern slavery, anti-corruption, export controls and sanctions, and privacy top the list of “Hot Issues” compliance and ethics professionals face each day. These and many other compliance and ethics concerns will be addressed at the 2016 Compliance & Ethics…

Top 5 Digital Health Trends

Top 5 Digital Health Trends

Digital Health Trends It is very important to keep up with the changing technology. However, it is also just as important to advance the consumer experience, care delivery methods and create opportunities for career development for the healthcare workforce. Five trends that are proven to be effective in winning in the digital age have been…

Technological Advances In The Healthcare Industry

Technological Advances In The Healthcare Industry

The Healthcare Industry The use of smart devices in healthcare is expanding, and according to a report by Technavio the global smart wearable healthcare device and services market will show a compounded annual growth rate of over 18%. Thanks to modern medicine, lifespans are increasing, resulting in aging populations and a higher frequency of chronic…

How Secure Is Your School Campus Network?

How Secure Is Your School Campus Network?

School Networks School related networks are one of the most attacked sectors today, coming in third worldwide to healthcare and retail. Because of the ever growing threat of cybercrime, IT professionals everywhere aren’t thinking in terms of “what if our network gets attacked?” Now, they think in terms of “when will our network be attacked?”…

IBM and VMware Expand Partnership to Enable Easy Hybrid Cloud Adoption

IBM and VMware Expand Partnership to Enable Easy Hybrid Cloud Adoption

IBM and VMware Expand Partnership More than 500 new clients, including Marriott International are now running VMware software on IBM Cloud since the strategic cloud partnership was announced;Introduction of VMware Cloud Foundation on IBM Cloud helps move existing apps to the cloud within hours; More than 4,000 IBM service professionals trained to help organizations extend…

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

Why Businesses Need Hybrid Solutions Running a cloud server is no longer the novel trend it once was. Now, the cloud is a necessary data tier that allows employees to access vital company data and maintain productivity from anywhere in the world. But it isn’t a perfect system — security and performance issues can quickly…

Don’t Be Intimidated By Data Governance

Don’t Be Intimidated By Data Governance

Data Governance Data governance, the understanding of the raw data of an organization is an area IT departments have historically viewed as a lose-lose proposition. Not doing anything means organizations run the risk of data loss, data breaches and data anarchy – no control, no oversight – the Wild West with IT is just hoping…

Maintaining Network Performance And Security In Hybrid Cloud Environments

Maintaining Network Performance And Security In Hybrid Cloud Environments

Hybrid Cloud Environments After several years of steady cloud adoption in the enterprise, an interesting trend has emerged: More companies are retaining their existing, on-premise IT infrastructures while also embracing the latest cloud technologies. In fact, IDC predicts markets for such hybrid cloud environments will grow from the over $25 billion global market we saw…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

Using Cloud Technology In The Education Industry

Using Cloud Technology In The Education Industry

Education Tech and the Cloud Arguably one of society’s most important functions, teaching can still seem antiquated at times. Many schools still function similarly to how they did five or 10 years ago, which is surprising considering the amount of technical innovation we’ve seen in the past decade. Education is an industry ripe for innovation…

Cloud Infographic – The Internet Of Things In 2020

Cloud Infographic – The Internet Of Things In 2020

The Internet Of Things In 2020 The growing interest in the Internet of Things is amongst us and there is much discussion. Attached is an archived but still relevant infographic by Intel which has produced a memorizing snapshot at how the number of connected devices have exploded since the birth of the Internet and PC.…

Unusual Clandestine Cloud Data Centre Service Locations

Unusual Clandestine Cloud Data Centre Service Locations

Unusual Clandestine Cloud Data Centre Service Locations Everyone knows what the cloud is, but does everybody know where the cloud is? We try to answer that as we look at some of the most unusual data centre locations in the world. Under the Eyes of a Deity Deep beneath the famous Uspenski Cathedral in the…

The Big Data Movement Gets Bigger

The Big Data Movement Gets Bigger

The Big Data Movement In recent years, Big Data and Cloud relations have been growing steadily. And while there have been many questions raised around how best to use the information being gathered, there is no question that there is a real future between the two. The growing importance of Big Data Scientists and the…

Surprising Facts and Stats About The Big Data Industry

Surprising Facts and Stats About The Big Data Industry

Facts and Stats About The Big Data Industry If you start talking about big data to someone who is not in the industry, they immediately conjure up images of giant warehouses full of servers, staff poring over page after page of numbers and statistics, and some big brother-esque official sat in a huge government building…

The Future Of Cybersecurity

The Future Of Cybersecurity

The Future of Cybersecurity In 2013, President Obama issued an Executive Order to protect critical infrastructure by establishing baseline security standards. One year later, the government announced the cybersecurity framework, a voluntary how-to guide to strengthen cybersecurity and meanwhile, the Senate Intelligence Committee voted to approve the Cybersecurity Information Sharing Act (CISA), moving it one…

Big Data and Financial Services – Security Threat or Massive Opportunity?

Big Data and Financial Services – Security Threat or Massive Opportunity?

Big Data and Financial Services Cloud Banking Insights Series focuses on big data in the financial services industry and whether it is a security threat or actually a massive opportunity. How does big data fit into an overall cloud strategy? Most FI’s have a positive mind-set towards cloud IT consumption as it not only enables…