Business Versus Technical Cloud Brokers And Why It Matters

Business Versus Technical Cloud Brokers And Why It Matters

Business Versus Technical Cloud Brokers

Gartner predictsBy 2015, at least 20% of all cloud services will be consumed via internal or external cloud service brokerages, rather than directly, up from less than 5% today.” Thus, it is important to understand what a cloud broker is and what they do; however, before we can do that, we need to clear up some confusion between different definitions and implementations of cloud brokers.

The term “cloud broker” was defined by NIST in Special Publication 500-292, the NIST Cloud Computing Reference Architecture, as “An entity that manages the use, performance and delivery of cloud services, and negotiates relationships between Cloud Providers and Cloud Consumers.” The use of the word “entity” makes it ambiguous as to whether a broker is a person or a software service; however, most interpreted this “actor” as a person or persons in a business. NIST divides the broker’s services into three categories service intermediation, service aggregation, and service arbitrage. Service intermediation means the broker enhances a vendor’s cloud service and provides that enhanced service to the cloud consumer (in essence, “wrapping” the cloud provider’s service to provide enhanced functionality). Service aggregation is where the broker integrates or combines multiple services into a single new service like in the case of data integration. Service arbitrage is where a broker arbitrates between multiple vendors and the client to select the best provider. NIST cleared up the ambiguity of this definition in a later special publication, 500-299, the NIST Cloud Computing Security Reference Architecture where it clearly differentiated between a “cloud business broker” and a “cloud technical broker”. In this article, we will explore the differences between these two concepts and how both are being leveraged today.

broker-cloud

A cloud business broker is the traditional definition of a broker, akin to a stockbroker or commodity broker, where an intermediary assists a customer in navigating through a complex environment of many options. A better name for this may be “cloud agent.” An early example of this was the Defense Information Systems Agency (DISA) that was designated as the Department of Defense’ (DoD) cloud broker on June 26, 2013. Another Government example is the Intelligence Community (IC) CIO which is leading other IC agencies to develop and migrate to a community cloud. On the commercial side, there are companies like Cloudsherpas.com that offer cloud business broker services.

A cloud technical broker pertains to a new type of software that sits on top of cloud providers to abstract, simplify and map various cloud offerings to your environment. Cloud broker software assists organizations in creating solutions in the cloud, migrating solutions to the cloud and moving solutions between clouds. Examples of cloud technical broker software are the Gravitant platform, Incadence Strategic Solutions (my company) Axon Cloud Broker, the Compatible One Open Source cloud broker and JamCracker.

These two concepts – business role and software tool – can be effectively combined in the Office of the Chief Information Officer for an organization whereby the CIO uses one to better perform the other. “Gartner Inc. analyst Dru Reeves said CIOs are best positioned to be service brokers because they possess both the technical knowledge and implementation experience to grasp the risks cloud services pose to the business.” Many CIOs in both the Government and Private sector are gladly stepping into this role. Secondly, CIOs can leverage a technical cloud broker to assist their business units in evaluating and selecting cloud providers and help them to migrate their applications to that selected provider. One cloud broker vendor, Gravitant, cites a State of Texas Case study where they successfully tested the Gravitant platform and business units were able to use its procurement workflow tool to select and design the best cloud platforms for their needs. In regards to Application Migration to the cloud, InCadence Strategic Solutions (whom I work for), has migrated its Army customers applications to the cloud using its Axon Cloud broker software.

In this article, we have distinguished between business and technical cloud brokers and shown the value of both. We also examined how smart CIOs are combining these concepts to help their organizations select the best provider and migrate their legacy applications to the cloud.

michael

By Michael C.Daconta,

Michael is the Vice President of Advanced Technology at InCadence Strategic Solutions and the former Metadata Program Manager for the Department of Homeland Security.  His new book is entitled, “The Great Cloud Migration: Your Roadmap to Cloud Computing, Big Data and Linked Data”.  

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Are You Sure You’re Ready For The Cloud?: Connectivity

Are You Sure You’re Ready For The Cloud?: Connectivity

Cloud Connectivity Many times when we think of “cloud” we think of the elastic compute and storage, but we forget one very important thing, connectivity. Even though connectivity is no part of the cloud itself, it does have a direct bearing on how we access it, use it, and play around with it. If our…

Understanding Big Data – Are Big Data Analytics Your Friend or Enemy?

Understanding Big Data – Are Big Data Analytics Your Friend or Enemy?

Understanding Big Data The term “Big Data” is highly reminiscent of terms like “Big Pharma”, and it has a tendency to make consumers and professionals alike a bit nervous. However, whereas Big Pharma refers to large pharmaceuticals companies with market sway and seemingly countless political lobbyists, big data simply refers to the exponentially rapid growth…

All Enterprises Should Model Themselves After Today’s Startups

All Enterprises Should Model Themselves After Today’s Startups

Startups Leveraging Cloud Services Never in history has it been easier to start a business and fast track growth to dominate a market. Conversely, it has never been possible to transform from market leader to market memory faster than now. New startups are disrupting the market, fast tracking growth and sucker punching the market leaders.…

Disaster Recovery – A Thing Of The Past!

Disaster Recovery – A Thing Of The Past!

Disaster Recovery  Ok, ok – I understand most of you are saying disaster recovery (DR) is still a critical aspect of running any type of operations. After all – we need to secure our future operations in case of disaster. Sure – that is still the case but things are changing – fast. There are…

Basic Cloud Risk Assessment Tips

Basic Cloud Risk Assessment Tips

Basic Cloud Risk Assessment You should worry about the risks of cloud computing. But don’t get too scared. With a few simple steps you can easily get a basic understanding of your risks in the cloud and even have a good start in managing these risks. If you are a large corporation in a regulated…

The iCloud Scandal – Who Is To Blame? –  ‘Cloud’ Security vs. ‘Internet’ Security

The iCloud Scandal – Who Is To Blame? – ‘Cloud’ Security vs. ‘Internet’ Security

How the iCloud Scandal Has Helped to Define the Difference Between ‘Cloud’ Security and ‘Internet’ Security Busting the myth that bad cloud security was to blame for Apple’s recent celebrity data disaster Overview: We discuss the ‘celebrity hacking’ iCloud saga and debate whether or not the breach was likely down to Cloud encryption issues or…

Is Fear Holding Back a Next Generation of Cyber Security Approaches?

Is Fear Holding Back a Next Generation of Cyber Security Approaches?

Next Generation of Cyber Security As I walked through RSA last week, I was struck by the usual fear laden messages “You’re not safe and never will be but I (vendor) have a silver bullet that will protect you.” And, I wondered if this fear-based approach is deterring a badly needed next generation of cyber…

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Advertising