The Risks And Rewards Of Cloud Computing

The Risks And Rewards Of Cloud Computing

Cloud computing like any concept in the real world comes with risks and rewards. It is not a perfect solution where huge mistakes are forgiven without great consequences. In all honesty, cloud computing could actually make or break a company, depending on how they implement it. And if they actually do everything right, cloud computing will propel their company to success, reaping rewards that they never thought was possible with the old technology that they have been using.

First let us look at the risks associated with cloud computing.

1. Network dependency. Perhaps the most basic drawback of cloud computing is its dependency to the internet infrastructure. You need internet connection in order to access the cloud, and like anything connection based, it is prone to outages and service interruptions at any time. This means that it could occur during a very important task or transaction, either delaying it or losing it entirely if it was time constrained. As opposed to in-house servers that are hardwired. Though users will be unable to access these servers outside of the office, you can be sure that connectivity will be constant within the office premises.

2. Difficulty in creating hybrid systems. Some organizations especially those that hold sensitive information like government offices and financial institutions will have their own IT services and will never transfer their data offsite no matter the benefits of efficiency and performance. Though these IT systems are fairly consistent internally, there are currently no industry standardized forms that applies to all systems when it comes to connecting them with new cloud systems. Making a legacy system compatible with a public cloud structure requires some IT voodoo and maybe some hardware tweaks. But you can bet that these organizations will be reluctant to part with their tried and true systems.

3. Centralization. Because organizations typically outsource their data and application services to a centralized provider, a dependency is formed towards that company. If ever the provider is for some reason unable to provide service, then all clients are affected and this could cost money for everyone. This is especially troubling if it occurs for extended periods.

4. Data integrity. Data security is always paramount to any organization. There is already a huge risk when the data is hosted in-house, this is then compounded when it is placed offsite. This opens up new avenues for attack and just makes sure that data is traveling a lot ensuring that attackers will be able to intercept it in one way or another. Better encryption is required in this case, but technology is always evolving and you can bet that if a person came up with it, another person can break it. Privacy is another big concern in data integrity. You are handing data over to a third party and even with a privacy contract, what’s to stop anyone from that organization from taking a peek at the data and using it for self gain.

Of course, there are brighter sides to everything. It might be night in one part of the world, but it the sun is shining brightly on the other.

1. Cost reduction. The low barrier of entry and the pay-per-use model that cloud computing has makes it very scalable for large corporations yet still very affordable for small ones. This allows the smaller firms access to the big guns, a powerful computing infrastructure that previously could only be afforded by large corporations. This is because of virtualization and the application of the concept of economies of scale. Since not everyone will need massive amounts of resources, these can be leased to other clients, and the more clients there are, the cheaper the cloud operation becomes as the costs are being divided among the clients. This allows a cloud provider to offer virtually unlimited resources.

2. Increased efficiency. Because of reduced costs and time savings, firms can devote their time to other more important aspects. This is also because of the increased throughput that cloud applications can bring in the business processes.

3. Flexibility. Because organizations are not locked in by IT infrastructure they spent millions of 5 years ago, they can actually quickly change technologies and implementations without much risk and cost. If it does not work out for the new implementation then they can just switch back just as quickly, and this allows experimentation in the side of clients and gives developers and providers reasons to also experiment with new services and applications that their clients would need, even if they do not know it yet.

4. Security gains. But wait, didn’t we say that security was a risk? Well it can be both since security in cloud computing is just as good or bad as old networking implementations. But the difference this brings to a small organization with no technical knowledge is quite outstanding. Instead of spending money acquiring and implementing security systems training someone to run in-house implementations, the cloud provider already provides the hardware and knowledge to implement modern security measures.

5. Reliability. Despite the fact that internet connectivity is subject to outages, not to mention the provider itself. This is still more reliable that in-house systems because of the economies of scale. The vendor can provide 24/7 technical support and highly trained experienced personnel to handle the infrastructure and keep it at top condition, which all their clients can benefit from. Compare this to the old model where each organization would have their own team of on-site IT personnel which could be of questionable skill.

It is clear that there are risks to any endeavor, but it is also clear that the benefits that cloud computing brings to the business, especially to the smaller ones are very much a clear indicator for them to jump into it. But of course, they should plan their implementation properly, and vendors may be able to help in this aspect.

By Abdul Salam

Sorry, comments are closed for this post.

Comics
3 Keys To Keeping Your Online Data Accessible

3 Keys To Keeping Your Online Data Accessible

Online Data Data storage is often a real headache for businesses. Additionally, the shift to the cloud in response to storage challenges has caused security teams to struggle to reorient, leaving 49 percent of organizations doubting their experts’ ability to adapt. Even so, decision makers should not put off moving from old legacy systems to…

Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and orchestration. Although it has been mature for decades, the network security market had to transform rapidly with the advent of the BYOD trend and emergence of the cloud, which swept enterprises a few years ago.…

The Fully Aware, Hybrid-Cloud Approach

The Fully Aware, Hybrid-Cloud Approach

Hybrid-Cloud Approach For over 20 years, organizations have been attempting to secure their networks and protect their data. However, have any of their efforts really improved security? Today we hear journalists and industry experts talk about the erosion of the perimeter. Some say it’s squishy, others say it’s spongy, and yet another claims it crunchy.…

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

Embracing The Cloud We love the stories of big complacent industry leaders having their positions sledge hammered by nimble cloud-based competitors. Saleforce.com chews up Oracle’s CRM business. Airbnb has a bigger market cap than Marriott. Amazon crushes Walmart (and pretty much every other retailer). We say: “How could they have not seen this coming?” But, more…

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud Cloud computing is more than just another storage tier. Imagine if you’re able to scale up 10x just to handle seasonal volumes or rely on a true disaster-recovery solution without upfront capital. Although the pay-as-you-go pricing model of cloud computing makes it a noticeable expense, it’s the only solution for many…

The Rise Of BI Data And How To Use It Effectively

The Rise Of BI Data And How To Use It Effectively

The Rise of BI Data Every few years, a new concept or technological development is introduced that drastically improves the business world as a whole. In 1983, the first commercially handheld mobile phone debuted and provided workers with an unprecedented amount of availability, leading to more productivity and profits. More recently, the Cloud has taken…

7 Common Cloud Security Missteps

7 Common Cloud Security Missteps

Cloud Security Missteps Cloud computing remains shrouded in mystery for the average American. The most common sentiment is, “It’s not secure.” Few realize how many cloud applications they access every day: Facebook, Gmail, Uber, Evernote, Venmo, and the list goes on and on… People flock to cloud services for convenient solutions to everyday tasks. They…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

Do Not Rely On Passwords To Protect Your Online Information

Do Not Rely On Passwords To Protect Your Online Information

Password Challenges  Simple passwords are no longer safe to use online. John Barco, vice president of Global Product Marketing at ForgeRock, explains why it’s time the industry embraced more advanced identity-centric solutions that improve the customer experience while also providing stronger security. Since the beginning of logins, consumers have used a simple username and password to…