UK Government Cloud First Strategy Boosts SMB Cloud Vendors

UK Government Cloud First Strategy Boosts SMB Cloud Vendors

All government departments should first consider any public cloud solution before looking for anything else, states the latest set of IT recommendations issued by UK’s Cabinet office. This is momentous and not only for UK but for governments around the world and how cloud is being perceived.

The actual statement is – while procuring IT solutions within any public sector organizations, IT “should consider and fully evaluate potential Cloud solutions first – before they consider any other option”. There are several factors which have contributed to a mature level of trust in Cloud products but what stands out the most is the direct saving in cost. At a time when governments are taking their hands-off new ambitious projects in almost every department, IT finds it increasingly more difficult to get budget approved for new solutions or upgrades of legacy systems. Cloud presents a viable alternative to the longstanding government solution vendors. In most cases, the cost savings could be up to 70% which is significant at this time of financial crunch.

As we reviewed a recent survey which proved that more adoption of the cloud only adds more value, Government’s adoption of the cloud follows the same pattern which means that if “on the fringes” is the phrase which describes your Cloud strategy then you may not experience the real value add which Cloud promises to deliver. This has also been proven by the experience of new comers who often cite insufficient reduction in overall IT costs when they deploy their first Cloud solution. Therefore deep penetration and full-on adoption is key to achieving real benefits and it holds true for Government as well as enterprise.

UK Government’s G-Cloud (short for Government Cloud) program aims at building a platform for transparently connecting cloud service providers (IaaS, SaaS, PaaS etc) and Government departments looking to procure Cloud solutions. What’s encouraging to note is that out of the total of 708 suppliers registered with G-Cloud, 80% are SMBs which is an indicator of a booming Cloud service provider ecosystem. This initiative also sets an example for other Governments to follow with only one implication – accelerated Cloud adoption at all levels.

Looking at this Cloud adoption drive by public sector organizations critically, we cannot just bypass information security concerns especially when it comes to sensitive public data. Even though Governments are advancing towards standardizing Cloud security policies, any incident of breach, especially when the control of the data is shared with private, for-profit, entities would have far reaching impact and may even hurt Cloud ecosystem. It’s only logical for Cloud providers to put information security at the top of their priorities, even higher than scalability, usability and stability. Trust is key when it comes to the Cloud.

By Walter Bailey

Sorry, comments are closed for this post.

Comics
The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups Cloud platforms have become a necessary part of modern business with the benefits far outweighing the risks. However, the risks are real and account for billions of dollars in losses across the globe per year. If you’ve been hacked, you’re not alone. Here are some other companies in the past…

How To Humanize Your Data (And Why You Need To)

How To Humanize Your Data (And Why You Need To)

How To Humanize Your Data The modern enterprise is digital. It relies on accurate and timely data to support the information and process needs of its workforce and its customers. However, data suffers from a likability crisis. It’s as essential to us as oxygen, but because we don’t see it, we take it for granted.…

Ending The Great Enterprise Disconnect

Ending The Great Enterprise Disconnect

Five Requirements for Supporting a Connected Workforce It used to be that enterprises dictated how workers spent their day: stuck in a cubicle, tied to an enterprise-mandated computer, an enterprise-mandated desk phone with mysterious buttons, and perhaps an enterprise-mandated mobile phone if they traveled. All that is history. Today, a modern workforce is dictating how…

Four Trends Driving Demand For Data Security In 2017

Four Trends Driving Demand For Data Security In 2017

Data Security Trends 2017 will be a hallmark year for security in the enterprise as all industries have reached a tipping point with respect to cloud and mobile adoption, forcing more and more data beyond the corporate firewall. Over 100 IT executives weighed in on their plans for 2017 in our latest survey; buried among…

Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and orchestration. Although it has been mature for decades, the network security market had to transform rapidly with the advent of the BYOD trend and emergence of the cloud, which swept enterprises a few years ago.…

The Cancer Moonshot: Collaboration Is Key

The Cancer Moonshot: Collaboration Is Key

Cancer Moonshot In his final State of the Union address in January 2016, President Obama announced a new American “moonshot” effort: finding a cure for cancer. The term “moonshot” comes from one of America’s greatest achievements, the moon landing. If the scientific community can achieve that kind of feat, then surely it can rally around…

Using Private Cloud Architecture For Multi-Tier Applications

Using Private Cloud Architecture For Multi-Tier Applications

Cloud Architecture These days, Multi-Tier Applications are the norm. From SharePoint’s front-end/back-end configuration, to LAMP-based websites using multiple servers to handle different functions, a multitude of apps require public and private-facing components to work in tandem. Placing these apps in entirely public-facing platforms and networks simplifies the process, but at the cost of security vulnerabilities. Locating everything…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…