How Cloud Broker Software Is Accelerating Enterprise Cloud Migration

How Cloud Broker Software Is Accelerating Enterprise Cloud Migration

When I say “Cloud Broker”, don’t confuse it with the official definition which is – an agent who assists cloud consumers choose or migrate to single or multiple cloud platforms. There’s a new set of software which sits on top of the Cloud stack and adds value by providing new solutions on the Cloud, migrating enterprise systems along with the data or migrating between different cloud services. Much like the stock brokers, cloud broker software is acting as an enabler and a catalyst in Cloud adoption.

HHS (Health and Human Services Department) recently floated a RFI to determine detailed requirements for Cloud broker software. In this article I will discuss some of the key requirements laid out in the document.

1) Cross cloud provisioning engine

This is the key component. In fact, if you just have this and ignore every other aspect, you’ll have cloud broker software ready to take on serious migrations. This engine should be able to provision server instances across single or multiple cloud platforms – which is ideal for enterprises adopting hybrid-cloud strategy, provides capacity planning and load analysis and most importantly, support data portability and ideally application interoperability. Sounds a lot like software layer running atop PaaS cloud. The engine should also cover key security and privacy aspects.

2) Application Discovery

Should enable discovery of various SaaS applications across different cloud offerings. There has to be a mechanism to control and prioritize application discovery based on the needs of the enterprise.

3) Identity Management

An identity and credential management component which controls access to various cloud services for the consumer. It may ideally provide abstraction to the native identity and access control and management services of the individual cloud providers.

4) Billing

This is critical to cloud success. Coupled with provisioning engine, the cloud consumer will be able to find the best fit for their enterprise applications and data being served out of the cloud. Cloud broker software should provide a billing system which accurately logs expenditures based on actual usage data across the complete cloud portfolio of an enterprise.

5) Extensible

Cloud broker software itself should be offered as a cloud application which can be deployed with any cloud provider. Moreover, it should be extensible so the enterprise can add its own custom components to it.

With the proliferation of cloud providers in all shapes and sizes (PaaS, IaaS and SaaS etc), it’s now crucial to have a standards based platform which eases the process of migration and management of an enterprise’s cloud portfolio. There are several vendors offering cloud broker software for specific verticals. There’s also an Open Source project, CompatibleOne, which aims at building a standards based, cross-cloud provisioning engine.

By John Hampton

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comics
The Cancer Moonshot: Collaboration Is Key

The Cancer Moonshot: Collaboration Is Key

Cancer Moonshot In his final State of the Union address in January 2016, President Obama announced a new American “moonshot” effort: finding a cure for cancer. The term “moonshot” comes from one of America’s greatest achievements, the moon landing. If the scientific community can achieve that kind of feat, then surely it can rally around…

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Hyperconverged Infrastructure In this article, we’ll explore three challenges that are associated with network deployment in a hyperconverged private cloud environment, and then we’ll consider several methods to overcome those challenges. The Main Challenge: Bring Your Own (Physical) Network Some of the main challenges of deploying a hyperconverged infrastructure software solution in a data center are the diverse physical…

Are Cloud Solutions Secure Enough Out-of-the-box?

Are Cloud Solutions Secure Enough Out-of-the-box?

Out-of-the-box Cloud Solutions Although people may argue that data is not safe in the Cloud because using cloud infrastructure requires trusting another party to look after mission critical data, cloud services actually are more secure than legacy systems. In fact, a recent study on the state of cloud security in the enterprise market revealed that…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

Don’t Be Intimidated By Data Governance

Don’t Be Intimidated By Data Governance

Data Governance Data governance, the understanding of the raw data of an organization is an area IT departments have historically viewed as a lose-lose proposition. Not doing anything means organizations run the risk of data loss, data breaches and data anarchy – no control, no oversight – the Wild West with IT is just hoping…

How The CFAA Ruling Affects Individuals And Password-Sharing

How The CFAA Ruling Affects Individuals And Password-Sharing

Individuals and Password-Sharing With the 1980s came the explosion of computing. In 1980, the Commodore ushered in the advent of home computing. Time magazine declared 1982 was “The Year of the Computer.” By 1983, there were an estimated 10 million personal computers in the United States alone. As soon as computers became popular, the federal government…

Having Your Cybersecurity And Eating It Too

Having Your Cybersecurity And Eating It Too

The Catch 22 The very same year Marc Andreessen famously said that software was eating the world, the Chief Information Officer of the United States was announcing a major Cloud First goal. That was 2011. Five years later, as both the private and public sectors continue to adopt cloud-based software services, we’re interested in this…

Journey Science In Telecom: Take Customer Experience To The Next Level

Journey Science In Telecom: Take Customer Experience To The Next Level

Journey Science In Telecom Journey Science, being derived from connected data from different customer activities, has become pivotal for the telecommunications industry, providing the means to drastically improve the customer experience and retention. It has the ability to link together scattered pieces of data, and enhance a telco business’s objectives. Siloed approaches are becoming obsolete…

Using Cloud Technology In The Education Industry

Using Cloud Technology In The Education Industry

Education Tech and the Cloud Arguably one of society’s most important functions, teaching can still seem antiquated at times. Many schools still function similarly to how they did five or 10 years ago, which is surprising considering the amount of technical innovation we’ve seen in the past decade. Education is an industry ripe for innovation…