Business Versus Technical Cloud Brokers And Why It Matters

Business Versus Technical Cloud Brokers And Why It Matters

Business Versus Technical Cloud Brokers

Gartner predictsBy 2015, at least 20% of all cloud services will be consumed via internal or external cloud service brokerages, rather than directly, up from less than 5% today.” Thus, it is important to understand what a cloud broker is and what they do; however, before we can do that, we need to clear up some confusion between different definitions and implementations of cloud brokers.

The term “cloud broker” was defined by NIST in Special Publication 500-292, the NIST Cloud Computing Reference Architecture, as “An entity that manages the use, performance and delivery of cloud services, and negotiates relationships between Cloud Providers and Cloud Consumers.” The use of the word “entity” makes it ambiguous as to whether a broker is a person or a software service; however, most interpreted this “actor” as a person or persons in a business. NIST divides the broker’s services into three categories service intermediation, service aggregation, and service arbitrage. Service intermediation means the broker enhances a vendor’s cloud service and provides that enhanced service to the cloud consumer (in essence, “wrapping” the cloud provider’s service to provide enhanced functionality). Service aggregation is where the broker integrates or combines multiple services into a single new service like in the case of data integration. Service arbitrage is where a broker arbitrates between multiple vendors and the client to select the best provider. NIST cleared up the ambiguity of this definition in a later special publication, 500-299, the NIST Cloud Computing Security Reference Architecture where it clearly differentiated between a “cloud business broker” and a “cloud technical broker”. In this article, we will explore the differences between these two concepts and how both are being leveraged today.

broker-cloud

A cloud business broker is the traditional definition of a broker, akin to a stockbroker or commodity broker, where an intermediary assists a customer in navigating through a complex environment of many options. A better name for this may be “cloud agent.” An early example of this was the Defense Information Systems Agency (DISA) that was designated as the Department of Defense’ (DoD) cloud broker on June 26, 2013. Another Government example is the Intelligence Community (IC) CIO which is leading other IC agencies to develop and migrate to a community cloud. On the commercial side, there are companies like Cloudsherpas.com that offer cloud business broker services.

A cloud technical broker pertains to a new type of software that sits on top of cloud providers to abstract, simplify and map various cloud offerings to your environment. Cloud broker software assists organizations in creating solutions in the cloud, migrating solutions to the cloud and moving solutions between clouds. Examples of cloud technical broker software are the Gravitant platform, Incadence Strategic Solutions (my company) Axon Cloud Broker, the Compatible One Open Source cloud broker and JamCracker.

These two concepts – business role and software tool – can be effectively combined in the Office of the Chief Information Officer for an organization whereby the CIO uses one to better perform the other. “Gartner Inc. analyst Dru Reeves said CIOs are best positioned to be service brokers because they possess both the technical knowledge and implementation experience to grasp the risks cloud services pose to the business.” Many CIOs in both the Government and Private sector are gladly stepping into this role. Secondly, CIOs can leverage a technical cloud broker to assist their business units in evaluating and selecting cloud providers and help them to migrate their applications to that selected provider. One cloud broker vendor, Gravitant, cites a State of Texas Case study where they successfully tested the Gravitant platform and business units were able to use its procurement workflow tool to select and design the best cloud platforms for their needs. In regards to Application Migration to the cloud, InCadence Strategic Solutions (whom I work for), has migrated its Army customers applications to the cloud using its Axon Cloud broker software.

In this article, we have distinguished between business and technical cloud brokers and shown the value of both. We also examined how smart CIOs are combining these concepts to help their organizations select the best provider and migrate their legacy applications to the cloud.

michael

By Michael C.Daconta,

Michael is the Vice President of Advanced Technology at InCadence Strategic Solutions and the former Metadata Program Manager for the Department of Homeland Security.  His new book is entitled, “The Great Cloud Migration: Your Roadmap to Cloud Computing, Big Data and Linked Data”.  

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Shadow IT To Remain A Focus For Both Cloud Vendors And CIOs

Shadow IT To Remain A Focus For Both Cloud Vendors And CIOs

Shadow IT To Remain A Focus Shadow IT, a phenomenon defined as building internal IT systems without the official organizational approval has been a growing concern for CIOs over the last few years. In 2015, it climbed to the top of the list of the emerging IT threats, with as much as 83% CIOs reporting…

How Data Science And Machine Learning Is Enabling Cloud Threat Protection

How Data Science And Machine Learning Is Enabling Cloud Threat Protection

Data Science and Machine Learning Security breaches have been consistently rising in the past few years. Just In 2015, companies detected 38 percent more security breaches than in the previous year, according to PwC’s Global State of Information Security Survey 2016. Those breaches are a major expense — an average of $3.79 million per company,…

Will Your Internet of Things Device Testify Against You?

Will Your Internet of Things Device Testify Against You?

Will Your Internet of Things Device Testify Imagine this:  Your wearable device is subpoenaed to testify against you.  You were driving when you were over the legal alcohol limit and data from a smart Breathalyzer device is used against you. Some might argue that such a use case could potentially safeguard society. However, it poses…

What Agency Can Benefit The Most From IoT/CSP?

What Agency Can Benefit The Most From IoT/CSP?

What Agency Can Benefit The Most? I was recently giving a talk to some students when one of them asked me a question I hadn’t heard before. She said “How does the Internet of Things really impact the government? What agency benefits the most from IoT/CPS?” I paused for a moment, it is a great…

How Successful Businesses Ensure Quality Team Communication

How Successful Businesses Ensure Quality Team Communication

Quality Team Communication  (Sponsored post courtesy of Hubgets) Successful team communication and collaboration are as vital to project and overall business success as the quality of products and services an organization develops. We rely on a host of business tools to ensure appropriate customer interactions, sound product manufacturing, and smooth back-end operations. However, the interpersonal relationships…

Featured Sponsored Articles
How To Develop A Business Continuity Plan Using Internet Performance Management

How To Develop A Business Continuity Plan Using Internet Performance Management

Internet Performance Management Planning CDN Performance Series Provided By Dyn In our previous post, we laid out the problems of business continuity and Internet Performance Management in today’s online environment.  In this article, we will take a look at some of the ways you can use traffic steering capabilities to execute business continuity planning and…

Featured Sponsored Articles
Optimizing Digital Marketing Through Accessibility & Aesthetics

Optimizing Digital Marketing Through Accessibility & Aesthetics

Optimizing Digital Marketing In The Cloud Marketers are constantly looking for better ways to tantalize and engage customers, and there’s no space more competitive than the digital universe. Deliberating over pleasing layouts, effective calls to action, site responsiveness, and much more, digital marketers have more than enough to keep themselves busy without understanding the intricacies…

Featured Sponsored Articles

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Sponsor