Cloud Networking Changes Everything

Cloud Networking Changes Everything

The public cloud infrastructure-as-a-service (IaaS) market is booming and expected to grow by 47 percent, from $6 billion in 2012 to $9 billion in 2013, according to Gartner’s Forecast Overview: Public Cloud Services, Worldwide, 2011-2016, 4Q Update. Additionally, the overall public cloud computing market, including software-as-a-service (SaaS), platform-as-a-service (PaaS), IaaS and other related services, will grow from $110 to $131 billion over the same period with a CAGR of 41.3 percent through 2016. While this projected growth is significant, cloud computing still represents less than three percent of the $3.7 trillion spent on IT per year. This begs the question, If cloud computing is so hot, why is it still just three percent of the overall IT industry?

It might be helpful to look back to when cloud IaaS was introduced to the market more than eight years ago by Amazon.com. The primary goal was to provide computing capacity at a lower cost than actual physical servers. Since then, many other cloud service providers have jumped on the bandwagon to offer low-cost, best-effort cloud services. Yet, while a market for these services clearly exists, most don’t meet the enterprise requirements for a more reliable and secure computing platform. The problem lies in the fundamental challenge that end users have in using a server-centric cloud approach to solve problems better addressed by networks.

Red Flags

Security breaches cost U.S. businesses significant amounts of time and money, and carry legal ramifications for strictly regulated financial and medical institutions. As such, it shouldn’t come as too great a surprise that it is the main concern for 71 percent of corporate technology decision makers when evaluating cloud services for business critical workloads, as reported by a recent Intel survey. The same study found that 28 percent of IT professionals have experienced a public cloud-related security breach – which, according to 65 percent of respondent companies, is a greater percentage than with traditional IT infrastructures.

One reason for the significant level of concern about cloud security might be that most providers seem to share the same server-centric approach to cloud architecture. Organizations utilizing these types of cloud environments are often unknowingly making it easier for criminals to gain access to information. When establishing vast, cloud-based data centers that are business-critical by nature, companies must institute the same level or better of perimeter security controls than what is present in privately hosted clouds.

Evaluating the various concerns around public cloud security, the network tops the list as most cloud platforms are only accessible via the network, and it has been proven to be at the core of many security breaches. However, the network is also the backbone of most organizations today. Without a strong and secure network foundation, many − if not all − will find it challenging to deliver services to the market.

Network Evolution

Looking at all the major changes within the technology landscape in the last five years, patterns have changed substantially, and computing fabrics demand more from the network. Coupled with an increasingly mobile workforce and customer base, the need for reliable and secure services that can be scaled-up/down as needed, and hosted pay-as-you-go models is driving the re-evaluation of today’s cloud service providers.

The collaboration, and in some cases the merger, between traditional computing and static network aspects are guaranteed to impact any IT organization. Network services can no longer be viewed in a silo. Like security, quality of service and intelligent routing network services will become essential to delivering elastic cloud services that deliver the promise of true utility computing. Further, the ability to provision services “on the fly” will be impossible without the ability to connect to these services in a safe and secure manner.

Public cloud platforms are not exempt from this trend as additional perimeter control and logical network separation is necessary in providing secure cloud services that bridge the public and private network spheres. The network-centric cloud architecture is inevitable as it is clear that the current service model will have to evolve to provide the required security guarantees. By adopting a network-centric cloud platform, organizations will reap the on-demand provisioning and elasticity benefits of cloud services with security at the core.

By Phillip Spies,

Senior Services Architect, Cloud Services, Dimension Data

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comic
Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

There is a Difference – So Stop Comparing We are all familiar with the old saying “That’s like comparing apples to oranges” and though we learned this lesson during our early years we somehow seem to discount this idiom when discussing the Cloud. Specifically, IT buyers often feel justified when comparing the cost of a…

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And Virtual Reality This is a term I created (Virtual Immersion). Ah…the sweet smell of Virtual Immersion Success! Virtual Immersion© (VI) an extension/expansion of Virtual Reality to include the senses beyond visual and auditory. Years ago there was a television commercial for a bathing product called Calgon. The tagline of the commercial was Calgon…

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

Why Businesses Need Hybrid Solutions Running a cloud server is no longer the novel trend it once was. Now, the cloud is a necessary data tier that allows employees to access vital company data and maintain productivity from anywhere in the world. But it isn’t a perfect system — security and performance issues can quickly…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

Using Private Cloud Architecture For Multi-Tier Applications

Using Private Cloud Architecture For Multi-Tier Applications

Cloud Architecture These days, Multi-Tier Applications are the norm. From SharePoint’s front-end/back-end configuration, to LAMP-based websites using multiple servers to handle different functions, a multitude of apps require public and private-facing components to work in tandem. Placing these apps in entirely public-facing platforms and networks simplifies the process, but at the cost of security vulnerabilities. Locating everything…

The Cancer Moonshot: Collaboration Is Key

The Cancer Moonshot: Collaboration Is Key

Cancer Moonshot In his final State of the Union address in January 2016, President Obama announced a new American “moonshot” effort: finding a cure for cancer. The term “moonshot” comes from one of America’s greatest achievements, the moon landing. If the scientific community can achieve that kind of feat, then surely it can rally around…

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups Cloud platforms have become a necessary part of modern business with the benefits far outweighing the risks. However, the risks are real and account for billions of dollars in losses across the globe per year. If you’ve been hacked, you’re not alone. Here are some other companies in the past…

Cloud Services Providers – Learning To Keep The Lights On

Cloud Services Providers – Learning To Keep The Lights On

The True Meaning of Availability What is real availability? In our line of work, cloud service providers approach availability from the inside out. And in many cases, some never make it past their own front door given how challenging it is to keep the lights on at home let alone factors that are out of…

The Rise Of BI Data And How To Use It Effectively

The Rise Of BI Data And How To Use It Effectively

The Rise of BI Data Every few years, a new concept or technological development is introduced that drastically improves the business world as a whole. In 1983, the first commercially handheld mobile phone debuted and provided workers with an unprecedented amount of availability, leading to more productivity and profits. More recently, the Cloud has taken…

Mobile Connected Technologies – The Future Of The Healthcare Industry

Mobile Connected Technologies – The Future Of The Healthcare Industry

Mobile Connected Technologies Clinics, hospitals, and other healthcare facilities are embracing new mobile technologies in order to be more efficient in their daily tasks. With faster communication and better collaboration, clinicians can spend much less time handling medical devices and more time administering care to their patients. Industry experts are stating that mobile connected technologies…

The Cloud Above Our Home

The Cloud Above Our Home

Our Home – Moving All Things Into The Cloud The promise of a smart home had excited the imagination of the movie makers long ago. If you have seen any TV shows in the nineties or before, the interpretation presented itself to us as a computerized personal assistant or a robot housekeeper. It was smart,…

Cloud Infographic – The Future (IoT)

Cloud Infographic – The Future (IoT)

The Future (IoT) By the year 2020, it is being predicted that 40 to 80 billion connected devices will be in use. The Internet of Things or IoT will transform your business and home in many truly unbelievable ways. The types of products and services that we can expect to see in the next decade…

The Global Rise of Cloud Computing

The Global Rise of Cloud Computing

The Global Rise of Cloud Computing Despite the rapid growth of cloud computing, the cloud still commands a small portion of overall enterprise IT spending. Estimates I’ve seen put the percentage between 5% and 10% of the slightly more than $2 trillion (not including telco) spent worldwide in 2014 on enterprise IT. Yet growth projections…

5 Considerations You Need To Review Before Investing In Data Analytics

5 Considerations You Need To Review Before Investing In Data Analytics

Review Before Investing In Data Analytics Big data, when handled properly, can lead to big change. Companies in a wide variety of industries are partnering with data analytics companies to increase operational efficiency and make evidence-based business decisions. From Kraft Foods using business intelligence (BI) to cut customer satisfaction analysis time in half, to a…

Expert Insights Into The Yahoo Breach

Expert Insights Into The Yahoo Breach

Yahoo Breach Latest reports suggest that the recent Yahoo! data breach may exceed 500 million records, with some sources implying millions more records penetrated, upping the total number of records stolen in various recent hacks to approximately 3.5 billion. CloudTweaks spoke to Kevin O’Brien, CEO of GreatHorn, for expert insight into this latest violation. GreatHorn…

Using Private Cloud Architecture For Multi-Tier Applications

Using Private Cloud Architecture For Multi-Tier Applications

Cloud Architecture These days, Multi-Tier Applications are the norm. From SharePoint’s front-end/back-end configuration, to LAMP-based websites using multiple servers to handle different functions, a multitude of apps require public and private-facing components to work in tandem. Placing these apps in entirely public-facing platforms and networks simplifies the process, but at the cost of security vulnerabilities. Locating everything…

Big Data’s Significant Role In Fintech

Big Data’s Significant Role In Fintech

Data Banking Fintech covers a range of financial fields such as retail banking, investments, and lending and thanks to the mobile and internet innovations of late is a thriving sector. Offering improvements which drive customer satisfaction and education in an area previously inscrutable and dictated by gigantic inflexible corporations, fintech is helping put the power…

Battle of the Clouds: Multi-Instance vs. Multi-Tenant

Battle of the Clouds: Multi-Instance vs. Multi-Tenant

Multi-Instance vs. Multi-Tenant The cloud is part of everything we do. It’s always there backing up our data, pictures, and videos. To many, the cloud is considered to be a newer technology. However, cloud services actually got their start in the late 90s when large companies used it as a way to centralize computing, storage,…

Infographic: 9 Things To Know About Business Intelligence (BI) Software

Infographic: 9 Things To Know About Business Intelligence (BI) Software

Business Intelligence (BI) Software  How does your company track its data? It’s a valuable resource—so much so that it’s known as Business Intelligence, or BI. But using it, integrating it into your daily processes, that can be significantly difficult. That’s why there’s software to help. But when it comes to software, there are lots of…