The Great Debate: Is The Cloud Ready For Mission Critical Applications?

The Great Debate: Is The Cloud Ready For Mission Critical Applications?

The Great Debate: Is The Cloud Ready for Mission Critical Applications?

We all know cloud is the future of IT, but there are still a few unanswered questions. For instance, with all the high-profile cloud outages, is the cloud really ready for mission critical applications? This common question arises because inevitably, we wonder if the cloud is more or less reliable and secure than our own data centers.

In a recent survey from North Bridge Venture Partners on cloud computing trends, 50 percent of respondents said they were confident cloud solutions were viable for mission critical business applications. Only three percent of those surveyed believed cloud was too risky, which improved from 14 percent the year prior.

It’s clear many companies are transitioning to the cloud, and as more make the move, more applications are being transitioned as well. While this shift to the cloud is becoming more prevalent, decision makers should take caution and not just throw everything into one pot. In fact, the cloud is not one-size-fits-all; some applications are a better fit for a private cloud while others are better suited for the public cloud, or quite frankly – some applications should not move to the cloud at all.

In addition to the private-public cloud consideration, is the question of what kind of cloud service would be best.

Today, cloud services are typically one of three environments:

  • SaaS (Software as a Service) could be a replacement for an application you currently run in
  • PaaS (Platform as a Service) can provide the application deployment platform your application requires12-cloud
  • IaaS (Infrastructure as a Service) provides only the underlying servers, storage and network services needed

These cloud services are truly only the beginning. Going forward you can expect the cloud to become a highly specialized place. Specialization is a natural development of any new market – and cloud will be no different. Already a few of these specialized clouds have taken off. These include Desktop as a Service (DaaS) and Disaster Recovery as a Service (DRaaS). Eventually, we’ll reach the point of custom clouds – whereby organizations can leverage API’s to craft custom business processes that exist across many specialized clouds.

While that vision is still some way off, today success in the cloud depends on characterizing applications or workloads based on different factors and correctly determining the fit to a particular deployment model. When it comes to mission critical applications, correctly assessing the various factors are even more valuable since the business depends on their availability.

Some of the factors to consider include business concerns such as cost, efficiency, security and flexibility. Technology factors include performance, scalability, manageability and the operating environments required. Mission critical applications also require the highest levels of availability and disaster recovery, so those are key considerations.

Additionally the majority of enterprise applications aren’t monolithic but consist of different tiers such as a presentation layer, business logic and database/file system. If there are well-defined interfaces between these tiers, some may be suited for the cloud and others may not.

Another important consideration is whether the application can run in a virtualized server environment. Databases or applications that are performance-intensive may not run well in a virtual machine. With regards to bare metal, today’s public clouds just can’t handle applications that are not virtualized. There are some technologies out there that can support the provisioning of full physical servers while still retaining the flexibility and automation that cloud services provide. They can provide the capability needed to deploy mission critical applications in a private cloud.

This leads to a hybrid cloud strategy of utilizing public clouds for testing/development and non-mission critical applications, and private clouds for mission critical or non-virtualized applications. Undoubtedly as the range of services offered by public providers continue to expand, the lines will blur, and current technology impediments will be overcome. So if, you haven’t already taken the plunge, now is the time.

By Pete Manca, CEO of Egeneramanca-pete

Pete Manca brings over 25 years’ experience in enterprise computing and business development, with expertise in a wide range of mission-critical enterprise data center technologies. Previously as CTO and EVP of Engineering, Manca led product planning by working directly with customers to understand their most difficult challenges and guide into solutions.

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comics
7 Common Cloud Security Missteps

7 Common Cloud Security Missteps

Cloud Security Missteps Cloud computing remains shrouded in mystery for the average American. The most common sentiment is, “It’s not secure.” Few realize how many cloud applications they access every day: Facebook, Gmail, Uber, Evernote, Venmo, and the list goes on and on… People flock to cloud services for convenient solutions to everyday tasks. They…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Hyperconverged Infrastructure In this article, we’ll explore three challenges that are associated with network deployment in a hyperconverged private cloud environment, and then we’ll consider several methods to overcome those challenges. The Main Challenge: Bring Your Own (Physical) Network Some of the main challenges of deploying a hyperconverged infrastructure software solution in a data center are the diverse physical…

How To Overcome Data Insecurity In The Cloud

How To Overcome Data Insecurity In The Cloud

Data Insecurity In The Cloud Today’s escalating attacks, vulnerabilities, breaches, and losses have cut deeply across organizations and captured the attention of, regulators, investors and most importantly customers. In many cases such incidents have completely eroded customer trust in a company, its services and its employees. The challenge of ensuring data security is far more…

Do Not Rely On Passwords To Protect Your Online Information

Do Not Rely On Passwords To Protect Your Online Information

Password Challenges  Simple passwords are no longer safe to use online. John Barco, vice president of Global Product Marketing at ForgeRock, explains why it’s time the industry embraced more advanced identity-centric solutions that improve the customer experience while also providing stronger security. Since the beginning of logins, consumers have used a simple username and password to…

3 Keys To Keeping Your Online Data Accessible

3 Keys To Keeping Your Online Data Accessible

Online Data Data storage is often a real headache for businesses. Additionally, the shift to the cloud in response to storage challenges has caused security teams to struggle to reorient, leaving 49 percent of organizations doubting their experts’ ability to adapt. Even so, decision makers should not put off moving from old legacy systems to…

2017 Brings DLP Technology and IoT’s Weaknesses to Light

2017 Brings DLP Technology and IoT’s Weaknesses to Light

DLP Technology In regards to data loss prevention (DLP), in the last five years many companies rushed to implement DLP solutions without taking the time to first identify the data that should not transit egress points. Most of these rushed implementations have not been successful. Security analysts, in particular 451 Research, have been recommending that…

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Cloud Email Migration In today’s litigious society, preserving your company’s data is a must if you (and your legal team) want to avoid hefty fines for data spoliation. But what about when you move to the cloud? Of course, you’ve probably thought of this already. You’ll have a migration strategy in place and you’ll carefully…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…