Breaking The Mold: Why IT Veterans Can’t Resist The Cloud

Breaking The Mold: Why IT Veterans Can’t Resist The Cloud

Why IT Veterans Can’t Resist the Cloud

Like it or not, Cloud Computing has transformed the way we communicate; from online storage to social networking, server virtualization truly pushes the boundaries of what is possible in a digitized world. Yet it was only a few years ago that the cloud was merely being used as a buzzword to describe specific web services hosted on shared web space. So what has changed? Cost, for one thing and availability for another; IT decision makers who once criticized the cloud may soon have to embrace it.

The Economics of Cloud Computing

A recent report in the economist wrote that small banking firms were expected to spend nearly $180 million on cloud services to better serve their clients. That means a global market for cloud services and availability is growing rapidly to support consumer demands, as well as expectations. Small banking firms can now host PDFs, email and other important financial documents on cloud storage platforms without having to invest in costly infrastructure. From a supply and demand standpoint the price of cloud based services can only get cheaper.

Lower costs reduce IT complexity and enable organizations to scale infrastructures depending on needs. That aforementioned small banking firm need not employ an entire IT department to maintain a virtual environment. Staff members may now work remotely allowing them to make the most of company resources – favorable attributes made possible by cloud-based resources. Even still, glitter isn’t gold amongst IT veterans who cannot make it past the shortcomings of the cloud. Gartner lists 3 key challenges for cloud computing: Security, governance and privacy for starters.

Security Risks

The threat of downtime is imminent to any organization reliant on cloud-based resources, particularly because cyber-attacks can render this virtual environment unresponsive. To most skeptics, security has become the main concern. At one end, you have the physical layer – a group of servers collocated within a secure location each partitioned to handle a certain amount of traffic, both upstream and downstream. The virtual end routes traffic to and from physical servers accordingly, but the more convoluted the signal path becomes (in theory) the more room for error exists.

Cloud environments are increasingly susceptible to DDoS (distributed denial of service attacks) because security protocols are easily bypassed by attackers at specific points of entry. Some organizations have gone as far as to implement a security appliance within the physical layer of a data center. Others simply rely on cloud security software, of which, can still be foiled by malicious attack. But aside from these obvious security pitfalls (that often beget other technologies), CTO’s still cannot and must not deny that the cloud computing business model works – and to an extent, works rather well considering its shortcomings. In fact, cloud based services are actually driving consumer trends faster than organizations can keep up.

Two Steps Forward One Step Back

Cloud’s popularity often outgrows infrastructure simply because it is cheap and everyone wants to offer a service to one-up the competition. What happens then is that companies partition more storage – enough to keep up with demand for the next few years, only to find that they’ve exceeded capacity in just a few short months. In that regard, cloud becomes a victim of its own success forcing IT decision makers back to the drawing board. Skeptics will still argue you cannot make a cloud environment secure as in a dedicated environment. Yet at this point there is no turning back. Clients, shareholders and customers expect to have specific IT resources at their fingertips, and as everyone runs to cloud based computing platforms, traditionalists must adapt or risk falling behind the times.

From an economic standpoint, cloud will continue to level the playing field for all types of IT vendors so long as organizations realize what their true cost of ownership is. If they aren’t utilizing their infrastructure efficiently they may be losing money by not outsourcing to a cloud provider such as, for example, AWS amazon web services. Whichever solution decision makers decide to stick with, one thing’s for certain; cloud product offerings will improve and costs will come down.

This is a post written by on behalf of Colocation America, a leading provider of data center services in Los Angeles.

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

Cloud Security: The Top 8 Risks According To ENISA

Cloud Security: The Top 8 Risks According To ENISA

Cloud Security Risks Does security in the cloud ever bother you? It would be weird if it didn’t. Cloud computing has a lot of benefits, but also a lot of risks if done in the wrong way. So what are the most important risks? The European Network Information Security Agency did extensive research on that,…

Managed Services Providers (MSPs) – Urged To Embrace The Cloud

Managed Services Providers (MSPs) – Urged To Embrace The Cloud

Managed Services Providers (MSPs)  If you’ve been observant of the MSP industry over the last two years, you’ve no doubt noticed that it has had significant difficulty expanding its service capabilities and growing its revenue stream around cloud computing. At least that was the analysis of recent market research studies assessing the status of cloud…

Dissecting Mr. Robot TV Series: Spotlight On Burning Online Privacy Risks

Dissecting Mr. Robot TV Series: Spotlight On Burning Online Privacy Risks

Mr. Robot And Burning Online Privacy Risks Despite the rapid development of web tools and computer security systems, online privacy remains a serious issue for most web users. According to some statistics provided by isaca.org, the total number of online security incidents worldwide grew to 42.8 million, leaving a great number of victims behind. As one…

What Technology Can Displace The Password?

What Technology Can Displace The Password?

The Future Password Many people shout that the password is dead or should be killed dead. The password could be killed, however, only when there is an alternative to the password. Let us think about what technology can displace the password. Some people might say that multi-factor authentications or ID federations will do it. It is not…

New Smartphones From Apple, Samsung and HTC Promise To Light Up 2016

New Smartphones From Apple, Samsung and HTC Promise To Light Up 2016

New Smartphones from Apple, Samsung and HTC (Sponsored post courtesy of Verizon Wireless) The launch of the Galaxy S7 Edge at the Mobile World Congress in Barcelona during February was the first shot in a vintage year for mobile phones. The S7 is an incredible piece of hardware, but launches from HTC and Apple later in the…

Featured Sponsored Articles
How Successful Businesses Ensure Quality Team Communication

How Successful Businesses Ensure Quality Team Communication

Quality Team Communication  (Sponsored post courtesy of Hubgets) Successful team communication and collaboration are as vital to project and overall business success as the quality of products and services an organization develops. We rely on a host of business tools to ensure appropriate customer interactions, sound product manufacturing, and smooth back-end operations. However, the interpersonal relationships…

Featured Sponsored Articles
How To Develop A Business Continuity Plan Using Internet Performance Management

How To Develop A Business Continuity Plan Using Internet Performance Management

Internet Performance Management Planning CDN Performance Series Provided By Dyn In our previous post, we laid out the problems of business continuity and Internet Performance Management in today’s online environment.  In this article, we will take a look at some of the ways you can use traffic steering capabilities to execute business continuity planning and…

Featured Sponsored Articles

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Sponsor