Cloud Networking Changes Everything

Cloud Networking Changes Everything

The public cloud infrastructure-as-a-service (IaaS) market is booming and expected to grow by 47 percent, from $6 billion in 2012 to $9 billion in 2013, according to Gartner’s Forecast Overview: Public Cloud Services, Worldwide, 2011-2016, 4Q Update. Additionally, the overall public cloud computing market, including software-as-a-service (SaaS), platform-as-a-service (PaaS), IaaS and other related services, will grow from $110 to $131 billion over the same period with a CAGR of 41.3 percent through 2016. While this projected growth is significant, cloud computing still represents less than three percent of the $3.7 trillion spent on IT per year. This begs the question, If cloud computing is so hot, why is it still just three percent of the overall IT industry?

It might be helpful to look back to when cloud IaaS was introduced to the market more than eight years ago by Amazon.com. The primary goal was to provide computing capacity at a lower cost than actual physical servers. Since then, many other cloud service providers have jumped on the bandwagon to offer low-cost, best-effort cloud services. Yet, while a market for these services clearly exists, most don’t meet the enterprise requirements for a more reliable and secure computing platform. The problem lies in the fundamental challenge that end users have in using a server-centric cloud approach to solve problems better addressed by networks.

Red Flags

Security breaches cost U.S. businesses significant amounts of time and money, and carry legal ramifications for strictly regulated financial and medical institutions. As such, it shouldn’t come as too great a surprise that it is the main concern for 71 percent of corporate technology decision makers when evaluating cloud services for business critical workloads, as reported by a recent Intel survey. The same study found that 28 percent of IT professionals have experienced a public cloud-related security breach – which, according to 65 percent of respondent companies, is a greater percentage than with traditional IT infrastructures.

One reason for the significant level of concern about cloud security might be that most providers seem to share the same server-centric approach to cloud architecture. Organizations utilizing these types of cloud environments are often unknowingly making it easier for criminals to gain access to information. When establishing vast, cloud-based data centers that are business-critical by nature, companies must institute the same level or better of perimeter security controls than what is present in privately hosted clouds.

Evaluating the various concerns around public cloud security, the network tops the list as most cloud platforms are only accessible via the network, and it has been proven to be at the core of many security breaches. However, the network is also the backbone of most organizations today. Without a strong and secure network foundation, many − if not all − will find it challenging to deliver services to the market.

Network Evolution

Looking at all the major changes within the technology landscape in the last five years, patterns have changed substantially, and computing fabrics demand more from the network. Coupled with an increasingly mobile workforce and customer base, the need for reliable and secure services that can be scaled-up/down as needed, and hosted pay-as-you-go models is driving the re-evaluation of today’s cloud service providers.

The collaboration, and in some cases the merger, between traditional computing and static network aspects are guaranteed to impact any IT organization. Network services can no longer be viewed in a silo. Like security, quality of service and intelligent routing network services will become essential to delivering elastic cloud services that deliver the promise of true utility computing. Further, the ability to provision services “on the fly” will be impossible without the ability to connect to these services in a safe and secure manner.

Public cloud platforms are not exempt from this trend as additional perimeter control and logical network separation is necessary in providing secure cloud services that bridge the public and private network spheres. The network-centric cloud architecture is inevitable as it is clear that the current service model will have to evolve to provide the required security guarantees. By adopting a network-centric cloud platform, organizations will reap the on-demand provisioning and elasticity benefits of cloud services with security at the core.

By Phillip Spies,

Senior Services Architect, Cloud Services, Dimension Data

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

Why Businesses Need Hybrid Solutions Running a cloud server is no longer the novel trend it once was. Now, the cloud is a necessary data tier that allows employees to access vital company data and maintain productivity from anywhere in the world. But it isn’t a perfect system — security and performance issues can quickly…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Success for Today’s CMOs Being a CMO is an exhilarating experience – it’s a lot like running a triathlon and then following it with a base jump. Not only do you play an active role in building a company and brand, but the decisions you make have direct impact on the company’s business outcomes for…

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

There is a Difference – So Stop Comparing We are all familiar with the old saying “That’s like comparing apples to oranges” and though we learned this lesson during our early years we somehow seem to discount this idiom when discussing the Cloud. Specifically, IT buyers often feel justified when comparing the cost of a…

Digital Twin And The End Of The Dreaded Product Recall

Digital Twin And The End Of The Dreaded Product Recall

The Digital Twin  How smart factories and connected assets in the emerging Industrial IoT era along with the automation of machine learning and advancement of artificial intelligence can dramatically change the manufacturing process and put an end to the dreaded product recalls in the future. In recent news, Samsung Electronics Co. has initiated a global…

Disaster Recovery – A Thing Of The Past!

Disaster Recovery – A Thing Of The Past!

Disaster Recovery  Ok, ok – I understand most of you are saying disaster recovery (DR) is still a critical aspect of running any type of operations. After all – we need to secure our future operations in case of disaster. Sure – that is still the case but things are changing – fast. There are…

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks Does cloud security risks ever bother you? It would be weird if it didn’t. Cloud computing has a lot of benefits, but also a lot of risks if done in the wrong way. So what are the most important risks? The European Network Information Security Agency did extensive research on that, and…

Beacons Flopped, But They’re About to Flourish in the Future

Beacons Flopped, But They’re About to Flourish in the Future

Cloud Beacons Flying High When Apple debuted cloud beacons in 2013, analysts predicted 250 million devices capable of serving as iBeacons would be found in the wild within weeks. A few months later, estimates put the figure at just 64,000, with 15 percent confined to Apple stores. Beacons didn’t proliferate as expected, but a few…