Why Morgan Stanley Is Wrong About Amazon Web Services

Why Morgan Stanley Is Wrong About Amazon Web Services

Why Morgan Stanley Is Wrong About Amazon Web Services

In their research report published the other week, Morgan Stanley came out projecting that Amazon Web Services (AWS) may be on track to reach $22 billion in revenues by 2022. Although it seems that the financiers understand the magnitude of the paradigm shift and the impact it will have on existing IT incumbents, they seem to have missed some key dynamics taking place in the IaaS cloud market, leading to conclusions that could end up being way off the mark.

Originally launched in 2006, AWS is the undisputed cloud pioneer. With revenues expected to hit $3.8 billion U.S. in 2013, they dominate the space. While there are certainly blue skies ahead for the clouds over the coming years, there have already been some early signs of market dynamics that will make it harder for AWS to maintain its relative strength in this market.

In the software business, the money has traditionally been in the enterprise. The same principle is likely to apply to cloud computing too. Granted, the market is still at its infancy as most enterprises are yet to make serious moves towards cloud computing, largely due to security and availability concerns. In February 2013 alone, AWS experienced cloud outages that no serious enterprise would withstand. So it is quite clear that in order for the enterprises to fully embrace the cloud computing paradigm, something has to change.

Looking back at the evolution of enterprise computing, the IBM mainframes dominated the markets for a long time. In many ways, the cloud computing model is not unlike the mainframe-computing model, as the capacity is being consumed from a central location and paid based on use. But while the IT industry is closing a full circle on the centralized computing model, the world we live in has come a long way over the last 50 years. Although a computing outage may not have been that big of an ordeal in the 1960s, in today’s information society it would likely have disastrous consequences. To address the availability concerns, decentralization is the key, as relying on just a few major cloud providers is tantamount to putting all information society’s “eggs” in very few baskets.

AWS’s success in the cloud space has largely been based on the economies of scale they have enjoyed given their status as the largest online retailer back in 2006. Coupled with the fact that during the early days there was not much competition from companies of equal stature, AWS was able to leverage its partnerships with small technology pioneers and go to frontiers no man had gone before. Over the last year or so, however, the success of AWS has attracted the attention of the large IT houses, and the technology advantage it enjoyed is eroding fast.

During 2012, industry bellwethers like Microsoft, Hewlett-Packard and IBM along with somewhat smaller players have introduced new solutions designed to equip Managed Service Providers (MSP) and carriers with the technology required to introduce competing IaaS cloud solutions to AWS. In fact, already in 2012, there were a handful of cloud providers out there that beat AWS to their service automation launches that took place during February 2013. While most of these players do not enjoy AWS’s brand recognition, it has done very little to slow them down since their cloud offerings are targeted at an existing customer base.

To throw more gasoline into the flames, the large IT companies are now offering turnkey cloud platforms to service providers on a pay-as-you-go basis. By leveraging these solutions, hundreds of MSPs and carriers can become cloud providers almost overnight and start competing with AWS without significant investments in the cloud infrastructure. And perhaps more importantly, these emerging cloud providers are able to offer their enterprise customers with IaaS cloud services that offer a number of advantages over AWS, reducing the uncertainty and accelerating the adoption of cloud computing models among the enterprise.

Based on discussions with a number of prospective enterprise end-users, the attributes they value in their decision-making around the cloud involves the following considerations:

Availability

Analyst firms such as Gartner have declared the AWS service level agreements (SLA) useless. There have also been complaints that buying cloud services from AWS involves “take it or leave it” terms and conditions that do not fall down well with larger enterprises. The MSPs turned into IaaS cloud providers are used to negotiating SLAs with their enterprise customers, eliminating this concern.

Security

AWS has introduced a number of cloud security innovations such as Virtual Private Cloud (VPC) and robust perimeter security allowing enterprises to securely tap into the computing capacity in the IaaS cloud. Also, many MSPs already have Virtual Private Network (VPN) connectivity between their data centers and their customers’ private networks. This allows them to offer IaaS cloud services as an extension of the enterprise computing environments, used for additional computing capacity when and where needed.

Latency

Since AWS consists only of a handful of data centers operated around the world, many enterprise customers would have to connect to the AWS cloud over wide geographical distances. For enterprises running time-critical business applications, the latency associated with geographically remote data centers responsible for running the cloud can easily become a deal breaker. At the same time, an emerging cloud service provider with data centers nearby – with a state of the art cloud application deployment solution – is often better positioned to address this concern.

Privacy

Although AWS has state-of-the-art security measures in place, there are privacy issues that come with storing sensitive data outside an organization. The privacy issue is amplified with organizations having their domicile outside the United States, as storing critical data in US-owned data centers may be somewhat problematic due to the Patriot Act. Therefore, there is a clear need for regional and national players around the world that will be able to address the local privacy laws and considerations of enterprise and governmental customers.

Account Management

Having its origins in the business to consumer markets, AWS’s differentiation is largely based on price advantage derived from volume and self-service. While strong brand and aggressive pricing may have been enough to drive AWS’s early cloud initiatives leveraged by SMBs and development teams, the IT departments in the enterprise and government are used to receiving more attention from their IT providers. As many of the cloud newcomers have a solid background in serving these accounts with personal attention, they are better equipped to tailor cloud service packages to their customers.

In summary, although there is ample body of evidence that cloud computing will change the ways in which applications and services are being consumed, the handwriting on the wall says that the revolution may well end up eating its children, at least in relative terms. Enterprises are likely to drive the second wave of cloud computing but will introduce a new set of requirements that the cloud incumbent is not positioned to address entirely. Therefore, while I am confident that the cloud market will enjoy tremendous growth by 2022, I would not bank on AWS being able to hold on to its relative market share.

By Juha Holkkola,

juha-holkkola

Juha Holkkola is managing director of Nixu Software Oy Ltd, the cloud application deployment company, an affiliate of Nixu. He joined Nixu in early 2000 and has since held various business and sales management positions. Before Nixu, Juha worked for Nokia Networks and financial services company Danske Bank in marketing and treasury positions.

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comic
The Lighter Side Of The Cloud – Data Merge

The Lighter Side Of The Cloud – Data Merge

By Christian Mirra Please feel free to share our comics via social media networks such as Twitter, Facebook, LinkedIn, Instagram, Pinterest. Clear attribution (Twitter example: via @cloudtweaks) to our original comic sources is greatly appreciated.

The Rise Of Threat Intelligence Sharing

The Rise Of Threat Intelligence Sharing

Threat Intelligence Sharing  Security has been discussed often on CloudTweaks and for good reason. It is one of the most sought after topics of information in the technology industry.  It is virtually impossible to wake up and not read a headline that involves the words “Breached, Hacked, Compromised or Extorted (Ransomware)“. Included (below) is an…

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Cloud Email Migration In today’s litigious society, preserving your company’s data is a must if you (and your legal team) want to avoid hefty fines for data spoliation. But what about when you move to the cloud? Of course, you’ve probably thought of this already. You’ll have a migration strategy in place and you’ll carefully…

Higher Education Institutions Increasing Cloud Use In Next 5 Years

Higher Education Institutions Increasing Cloud Use In Next 5 Years

Cloud Computing Advancing Edtech In a new research study by ResearchMoz it’s predicted that the global cloud computing market in higher education will grow steadily at a CAGR of 24.57% over the period 2016 to 2020. Making use of computing resources connected by either public or private networks provides the benefits of scalable infrastructure, greater…

Big Data and AI Hold Greatest Promise For Healthcare Technologies

Big Data and AI Hold Greatest Promise For Healthcare Technologies

Digital Healthcare Executives and Investors Addressed Opportunities and Challenges Facing the Industry New York City – September 21, 2016 – According to a survey of 122 founders, executives and investors in health-tech companies released today by Silicon Valley Bank, big data and artificial intelligence will have the greatest impact on the industry in the year ahead. Healthcare…

LAVABIT, EDWARD SNOWDEN, AND THE LEGAL BATTLE FOR PRIVACY

LAVABIT, EDWARD SNOWDEN, AND THE LEGAL BATTLE FOR PRIVACY

The Legal Battle For Privacy In early June 2013, Edward Snowden made headlines around the world when he leaked information about the National Security Agency (NSA) collecting the phone records of tens of millions of Americans. It was a dramatic story. Snowden flew to Hong Kong and then Russia to avoid deportation to the US,…

Adopting A Cohesive GRC Mindset For Cloud Security

Adopting A Cohesive GRC Mindset For Cloud Security

Cloud Security Mindset Businesses are becoming wise to the compelling benefits of cloud computing. When adopting cloud, they need a high level of confidence in how it will be risk-managed and controlled, to preserve the security of their information and integrity of their operations. Cloud implementation is sometimes built up over time in a business,…

The Security Gap: What Is Your Core Strength?

The Security Gap: What Is Your Core Strength?

The Security Gap You’re out of your mind if you think blocking access to file sharing services is filling a security gap. You’re out of your mind if you think making people jump through hoops like Citrix and VPNs to get at content is secure. You’re out of your mind if you think putting your…

The Fully Aware, Hybrid-Cloud Approach

The Fully Aware, Hybrid-Cloud Approach

Hybrid-Cloud Approach For over 20 years, organizations have been attempting to secure their networks and protect their data. However, have any of their efforts really improved security? Today we hear journalists and industry experts talk about the erosion of the perimeter. Some say it’s squishy, others say it’s spongy, and yet another claims it crunchy.…

Cloud Services Providers – Learning To Keep The Lights On

Cloud Services Providers – Learning To Keep The Lights On

The True Meaning of Availability What is real availability? In our line of work, cloud service providers approach availability from the inside out. And in many cases, some never make it past their own front door given how challenging it is to keep the lights on at home let alone factors that are out of…

The Cloud Above Our Home

The Cloud Above Our Home

Our Home – Moving All Things Into The Cloud The promise of a smart home had excited the imagination of the movie makers long ago. If you have seen any TV shows in the nineties or before, the interpretation presented itself to us as a computerized personal assistant or a robot housekeeper. It was smart,…

Mobile Connected Technologies – The Future Of The Healthcare Industry

Mobile Connected Technologies – The Future Of The Healthcare Industry

Mobile Connected Technologies Clinics, hospitals, and other healthcare facilities are embracing new mobile technologies in order to be more efficient in their daily tasks. With faster communication and better collaboration, clinicians can spend much less time handling medical devices and more time administering care to their patients. Industry experts are stating that mobile connected technologies…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…

How Your Startup Can Benefit From Cloud Computing And Growth Hacking

How Your Startup Can Benefit From Cloud Computing And Growth Hacking

Ambitious Startups An oft-quoted statistic, 50% of new businesses fail within five years. And the culling of startups is even more dramatic, with an estimated nine out of ten folding. But to quote Steve Jobs, “I’m convinced that about half of what separates the successful entrepreneurs from the non-successful ones is pure perseverance.” So while…

Containerization: The Bold Face Of The Cloud In 2016

Containerization: The Bold Face Of The Cloud In 2016

Containerization And The Cloud “Right now, the biggest technology shift in the cloud is a rapid evolution from simple virtual machine (VM) hosting toward containerization’’ says the CTO of Microsoft Azure, Mark Russinovitch, a man who deals with the evolving cloud infrastructure every day. In his words, containerization is “an incredibly efficient, portable, and lightweight…

Cloud Security: The Top 8 Risks According To ENISA

Cloud Security: The Top 8 Risks According To ENISA

Cloud Security Risks Does security in the cloud ever bother you? It would be weird if it didn’t. Cloud computing has a lot of benefits, but also a lot of risks if done in the wrong way. So what are the most important risks? The European Network Information Security Agency did extensive research on that,…