Cloud Adoption Statistics

Cloud Adoption Statistics

Cloud adoption decisions will be taken in the near future by employees who do not have an IT background. That’s an interesting shift in the IT world! According to a report issued by Capgemini, chief marketing officers, executive and even people from human resource departments, finance or administration departments will be making some of these cloud adoption decisions. 460 organizations globally, 50 of them in the UK were surveyed for this report.

The main reason for this change might be that cloud adoption and implementation into the overall strategy of an organization and in different departments influences the activity of all employees, not only of those from the IT department. Therefore, the decisions will be made by people with – different positions within a company and not necessarily by those having an IT background. SaaS based solutions for CRM, accounting and marketing solutions for example do not require hardware and software maintained by an IT department so they are able to be managed from within the individual departments.

Even though collaboration between the team members and departments inside an organization is the main purpose for business-and cloud apps, there are some critical points to consider before adopting the cloud and not including someone from the IT department.

Here are the top five concerns for organizations moving to the cloud:

  • Security
  • Privacy
  • Federated Identity / Single Sign-On
  • Interoperability and Portability
  • Service Level Agreements (SLAs)

Despite these concerns, many organizations have moved to the cloud. It appears that the main reasons they do so are:

  • to increase productivity and efficiency
  • to follow similar companies that have moved applications to the cloud
  • to meet customer requirements.

And according to the Global Cloud Networking Survey by Cisco, the most desired application for cloud migration is Storage, followed by Enterprise Resource Planning (ERP) applications, email and collaboration solutions. However, the top three applications that have been moved or are being planned to be moved to public or private clouds in the next year are: email and Web services, storage and collaboration solutions.

Taking into consideration these facts, the next few years are to be quite challenging both for the executives and for the cloud providers. Executives will be taking charge of essential decisions that involve cloud adoption and managing these providers, therefore this is a big step for the industry.

By Rick Blaisdell

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comics
How To Humanize Your Data (And Why You Need To)

How To Humanize Your Data (And Why You Need To)

How To Humanize Your Data The modern enterprise is digital. It relies on accurate and timely data to support the information and process needs of its workforce and its customers. However, data suffers from a likability crisis. It’s as essential to us as oxygen, but because we don’t see it, we take it for granted. Because we take it for granted, we don’t often think we need to go open a window for fresh air.…

2017 Brings DLP Technology and IoT’s Weaknesses to Light

2017 Brings DLP Technology and IoT’s Weaknesses to Light

DLP Technology In regards to data loss prevention (DLP), in the last five years many companies rushed to implement DLP solutions without taking the time to first identify the data that should not transit egress points. Most of these rushed implementations have not been successful. Security analysts, in particular 451 Research, have been recommending that companies should first identify and classify data before deploying DLP. Unfortunately, we are just now seeing companies execute this approach.…

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

DDoS Attacks October 21st, 2016 went into the annals of Internet history for the large scale Distributed Denial of Service (DDoS) attacks that made popular Internet properties like Twitter, SoundCloud, Spotify and Box inaccessible to many users in the US. The DDoS attack happened in three waves targeting DNS service provider Dyn, resulting in a total of about three hours of service outage. The attack was orchestrated using a botnet of connected devices including a large number of webcams…

Three Tips To Simplify Governance, Risk and Compliance

Three Tips To Simplify Governance, Risk and Compliance

Governance, Risk and Compliance Businesses are under pressure to deliver against a backdrop of evolving regulations and security threats. In the face of such challenges they strive to perform better, be leaner, cut costs and be more efficient. Effective governance, risk and compliance (GRC) can help preserve the business’ corporate integrity and protect the brand, but in an ever-changing technology landscape and with complex, inter-related business operations to manage, implementing GRC can seem like a…

Through the Looking Glass: 2017 Tech and Security Industry Predictions

Through the Looking Glass: 2017 Tech and Security Industry Predictions

2017 Tech and Security Industry Predictions As we close out 2016, which didn’t start off very well for tech IPOs, momentum and performance has increased in the second half, and I believe that will continue well into 2017. M&A activity will also increase as many of the incumbents will realize that they need to inject new DNA into their stagnant cultures and flat to declining revenue numbers. Cyber Security Market Expands My first prediction, which…

The Fully Aware, Hybrid-Cloud Approach

The Fully Aware, Hybrid-Cloud Approach

Hybrid-Cloud Approach For over 20 years, organizations have been attempting to secure their networks and protect their data. However, have any of their efforts really improved security? Today we hear journalists and industry experts talk about the erosion of the perimeter. Some say it’s squishy, others say it’s spongy, and yet another claims it crunchy. Are they trying to say the perimeter is changing, or that the perimeter no longer exists? In the context of…

Journey Science In Telecom: Take Customer Experience To The Next Level

Journey Science In Telecom: Take Customer Experience To The Next Level

Journey Science In Telecom Journey Science, being derived from connected data from different customer activities, has become pivotal for the telecommunications industry, providing the means to drastically improve the customer experience and retention. It has the ability to link together scattered pieces of data, and enhance a telco business’s objectives. Siloed approaches are becoming obsolete – take call centers as an example – there is only so much that you can do with data from…

Don’t Be Intimidated By Data Governance

Don’t Be Intimidated By Data Governance

Data Governance Data governance, the understanding of the raw data of an organization is an area IT departments have historically viewed as a lose-lose proposition. Not doing anything means organizations run the risk of data loss, data breaches and data anarchy – no control, no oversight – the Wild West with IT is just hoping for the best. On the flipside, opening the hood and checking if policies or regulations are being respected means you…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are taking steps to improve data security, few are considering the most likely cause of such a threat: human error. According…