Cloud Networking Changes Everything

Cloud Networking Changes Everything

The public cloud infrastructure-as-a-service (IaaS) market is booming and expected to grow by 47 percent, from $6 billion in 2012 to $9 billion in 2013, according to Gartner’s Forecast Overview: Public Cloud Services, Worldwide, 2011-2016, 4Q Update. Additionally, the overall public cloud computing market, including software-as-a-service (SaaS), platform-as-a-service (PaaS), IaaS and other related services, will grow from $110 to $131 billion over the same period with a CAGR of 41.3 percent through 2016. While this projected growth is significant, cloud computing still represents less than three percent of the $3.7 trillion spent on IT per year. This begs the question, If cloud computing is so hot, why is it still just three percent of the overall IT industry?

It might be helpful to look back to when cloud IaaS was introduced to the market more than eight years ago by Amazon.com. The primary goal was to provide computing capacity at a lower cost than actual physical servers. Since then, many other cloud service providers have jumped on the bandwagon to offer low-cost, best-effort cloud services. Yet, while a market for these services clearly exists, most don’t meet the enterprise requirements for a more reliable and secure computing platform. The problem lies in the fundamental challenge that end users have in using a server-centric cloud approach to solve problems better addressed by networks.

Red Flags

Security breaches cost U.S. businesses significant amounts of time and money, and carry legal ramifications for strictly regulated financial and medical institutions. As such, it shouldn’t come as too great a surprise that it is the main concern for 71 percent of corporate technology decision makers when evaluating cloud services for business critical workloads, as reported by a recent Intel survey. The same study found that 28 percent of IT professionals have experienced a public cloud-related security breach – which, according to 65 percent of respondent companies, is a greater percentage than with traditional IT infrastructures.

One reason for the significant level of concern about cloud security might be that most providers seem to share the same server-centric approach to cloud architecture. Organizations utilizing these types of cloud environments are often unknowingly making it easier for criminals to gain access to information. When establishing vast, cloud-based data centers that are business-critical by nature, companies must institute the same level or better of perimeter security controls than what is present in privately hosted clouds.

Evaluating the various concerns around public cloud security, the network tops the list as most cloud platforms are only accessible via the network, and it has been proven to be at the core of many security breaches. However, the network is also the backbone of most organizations today. Without a strong and secure network foundation, many − if not all − will find it challenging to deliver services to the market.

Network Evolution

Looking at all the major changes within the technology landscape in the last five years, patterns have changed substantially, and computing fabrics demand more from the network. Coupled with an increasingly mobile workforce and customer base, the need for reliable and secure services that can be scaled-up/down as needed, and hosted pay-as-you-go models is driving the re-evaluation of today’s cloud service providers.

The collaboration, and in some cases the merger, between traditional computing and static network aspects are guaranteed to impact any IT organization. Network services can no longer be viewed in a silo. Like security, quality of service and intelligent routing network services will become essential to delivering elastic cloud services that deliver the promise of true utility computing. Further, the ability to provision services “on the fly” will be impossible without the ability to connect to these services in a safe and secure manner.

Public cloud platforms are not exempt from this trend as additional perimeter control and logical network separation is necessary in providing secure cloud services that bridge the public and private network spheres. The network-centric cloud architecture is inevitable as it is clear that the current service model will have to evolve to provide the required security guarantees. By adopting a network-centric cloud platform, organizations will reap the on-demand provisioning and elasticity benefits of cloud services with security at the core.

By Phillip Spies,

Senior Services Architect, Cloud Services, Dimension Data

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comics
The Fully Aware, Hybrid-Cloud Approach

The Fully Aware, Hybrid-Cloud Approach

Hybrid-Cloud Approach For over 20 years, organizations have been attempting to secure their networks and protect their data. However, have any of their efforts really improved security? Today we hear journalists and industry experts talk about the erosion of the perimeter. Some say it’s squishy, others say it’s spongy, and yet another claims it crunchy.…

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks Does cloud security risks ever bother you? It would be weird if it didn’t. Cloud computing has a lot of benefits, but also a lot of risks if done in the wrong way. So what are the most important risks? The European Network Information Security Agency did extensive research on that, and…

Three Reasons Cloud Adoption Can Close The Federal Government’s Tech Gap

Three Reasons Cloud Adoption Can Close The Federal Government’s Tech Gap

Federal Government Cloud Adoption No one has ever accused the U.S. government of being technologically savvy. Aging software, systems and processes, internal politics, restricted budgets and a cultural resistance to change have set the federal sector years behind its private sector counterparts. Data and information security concerns have also been a major contributing factor inhibiting the…

The Cancer Moonshot: Collaboration Is Key

The Cancer Moonshot: Collaboration Is Key

Cancer Moonshot In his final State of the Union address in January 2016, President Obama announced a new American “moonshot” effort: finding a cure for cancer. The term “moonshot” comes from one of America’s greatest achievements, the moon landing. If the scientific community can achieve that kind of feat, then surely it can rally around…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

Disaster Recovery – A Thing Of The Past!

Disaster Recovery – A Thing Of The Past!

Disaster Recovery  Ok, ok – I understand most of you are saying disaster recovery (DR) is still a critical aspect of running any type of operations. After all – we need to secure our future operations in case of disaster. Sure – that is still the case but things are changing – fast. There are…

Four Recurring Revenue Imperatives

Four Recurring Revenue Imperatives

Revenue Imperatives “Follow the money” is always a good piece of advice, but in today’s recurring revenue-driven market, “follow the customer” may be more powerful. Two recurring revenue imperatives highlight the importance of responding to, and cherishing customer interactions. Technology and competitive advantage influence the final two. If you’re part of the movement towards recurring…

Using Cloud Technology In The Education Industry

Using Cloud Technology In The Education Industry

Education Tech and the Cloud Arguably one of society’s most important functions, teaching can still seem antiquated at times. Many schools still function similarly to how they did five or 10 years ago, which is surprising considering the amount of technical innovation we’ve seen in the past decade. Education is an industry ripe for innovation…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…