Cloud Governance Should Be Prioritized

Cloud Governance Should Be Prioritized

When businesses move existing applications and resources to the cloud, they always do it in phases, moving the most stable applications first in order to minimize down time. The transition is a slow process which enables users to have enough time to adapt to the new system. Because of this, cloud governance is also staggered per application or phase. The problem here is that people will get used to the staggered way governance is being implemented with many people overseeing governance for each different application. The correct method is a centralized approach to managing cloud services including monitoring of usage, security, uptime, and compliance of SLA’s.

Cloud infrastructure is particularly complex, and therefore needs to be abstracted in order for the resources to be used productively. This dictates the importance of a management or governance system between the people and the different systems consuming resources. This will also be a key element into finding out exactly how much benefit is being brought by the cloud-based monitoring system.

If your business is moving to the cloud, you should consider the following questions:

1. What should you be preparing for right now?

2. Are you looking at the overall picture? Implementation as well as completed migration of the essentials.

3. How well will everything fit together, and will you be in control of every aspect of the system?

4. Will you be able to check every type of monitoring data that you require or may require in the future?

5. And most importantly, will you be able to control the distribution of resources in a way that all of it is used efficiently and positively impact productivity?

You must develop a strategy that accommodates a growing resource pool and always assume that there will be more users and more resources added in the future. In short, be flexible. The problem is that most companies do not think this way. They are often acting in reaction to the present problems which will eventually push them towards more control and governance with very little importance given to productivity, and hence less value. What I mean is they will arrive at a system that may not provide resource allocation on the fly and will require sign off from several high-positions before the resource can be allocated. Too much control, less productivity, and ultimately diverges from one of the concepts of cloud computing, which is flexibility and resource allocation on the fly.

By Abdul Salam

Sorry, comments are closed for this post.

Comics
Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Cloud Email Migration In today’s litigious society, preserving your company’s data is a must if you (and your legal team) want to avoid hefty fines for data spoliation. But what about when you move to the cloud? Of course, you’ve probably thought of this already. You’ll have a migration strategy in place and you’ll carefully…

Cloud Services Providers – Learning To Keep The Lights On

Cloud Services Providers – Learning To Keep The Lights On

The True Meaning of Availability What is real availability? In our line of work, cloud service providers approach availability from the inside out. And in many cases, some never make it past their own front door given how challenging it is to keep the lights on at home let alone factors that are out of…

Having Your Cybersecurity And Eating It Too

Having Your Cybersecurity And Eating It Too

The Catch 22 The very same year Marc Andreessen famously said that software was eating the world, the Chief Information Officer of the United States was announcing a major Cloud First goal. That was 2011. Five years later, as both the private and public sectors continue to adopt cloud-based software services, we’re interested in this…

Through the Looking Glass: 2017 Tech and Security Industry Predictions

Through the Looking Glass: 2017 Tech and Security Industry Predictions

2017 Tech and Security Industry Predictions As we close out 2016, which didn’t start off very well for tech IPOs, momentum and performance has increased in the second half, and I believe that will continue well into 2017. M&A activity will also increase as many of the incumbents will realize that they need to inject…

Three Factors For Choosing Your Long-term Cloud Strategy

Three Factors For Choosing Your Long-term Cloud Strategy

Choosing Your Long-term Cloud Strategy A few weeks ago I visited the global headquarters of a large multi-national company to discuss cloud strategy with the CIO. I arrived 30 minutes early and took a tour of the area where the marketing team showcased their award winning brands. I was impressed by the digital marketing strategy…

How The CFAA Ruling Affects Individuals And Password-Sharing

How The CFAA Ruling Affects Individuals And Password-Sharing

Individuals and Password-Sharing With the 1980s came the explosion of computing. In 1980, the Commodore ushered in the advent of home computing. Time magazine declared 1982 was “The Year of the Computer.” By 1983, there were an estimated 10 million personal computers in the United States alone. As soon as computers became popular, the federal government…

Don’t Be Intimidated By Data Governance

Don’t Be Intimidated By Data Governance

Data Governance Data governance, the understanding of the raw data of an organization is an area IT departments have historically viewed as a lose-lose proposition. Not doing anything means organizations run the risk of data loss, data breaches and data anarchy – no control, no oversight – the Wild West with IT is just hoping…

Do Not Rely On Passwords To Protect Your Online Information

Do Not Rely On Passwords To Protect Your Online Information

Password Challenges  Simple passwords are no longer safe to use online. John Barco, vice president of Global Product Marketing at ForgeRock, explains why it’s time the industry embraced more advanced identity-centric solutions that improve the customer experience while also providing stronger security. Since the beginning of logins, consumers have used a simple username and password to…

Ending The Great Enterprise Disconnect

Ending The Great Enterprise Disconnect

Five Requirements for Supporting a Connected Workforce It used to be that enterprises dictated how workers spent their day: stuck in a cubicle, tied to an enterprise-mandated computer, an enterprise-mandated desk phone with mysterious buttons, and perhaps an enterprise-mandated mobile phone if they traveled. All that is history. Today, a modern workforce is dictating how…