Forrester Study: Cloud Services Remains Elusive For Many Enterprises

Forrester Study: Cloud Services Remains Elusive For Many Enterprises

Key Findings Of Study: Cloud Services Remains Elusive For Many Enterprises

Companies Need A Unified Cloud and Network Strategy to Maximize Full Benefits of Cloud Computing, Software-as-a-Service, and Other Cloud-Based Services

HERNDON, VA – October 2, 2013 – Although cloud-based services are now widely utilized by the vast majority of enterprises, a new study by Forrester Consulting has found that many organizations are not realizing the full potential value of these services because their networks are not prepared to support the increased bandwidth demands and complexity of multiple cloud-based services.


The September 2013 commissioned study, “Building for the Future: What the New World of Cloud IT Means for the Network” which was conducted by Forrester Consulting on behalf of XO Communications and Juniper Networks, examined current cloud technology adoption trends, application usage types in the cloud, satisfaction levels with expected benefits, and the impacts cloud services are having on the enterprise network. The study surveyed more than 150 IT decision makers at companies with more than 500 employees across several industries.

Key Findings of the Study:

1. Cloud Services Adoption Is Widespread and Business-Critical Apps Are Moving to the Cloud

The study confirms the trend that enterprises are moving to the cloud with a majority of businesses having embraced at least one cloud service.  Moreover, after testing the waters with simple tasks, IT and business organizations are now shifting advanced, business-critical applications and services from internal data centers to cloud platforms. Specifically, the study found that:

•       More than 75% of enterprises are using or plan to use some type of cloud-based service;
•       50% more respondents plan on moving revenue-generating B2B e-commerce sites to cloud environments this year compared to last year;
•       Software, storage, and disaster-recovery-as-a service represent the top three cloud-based services; and
•       More than 50% of IT decision makers said their organization will be using four or more cloud platforms.

2. The True Value of Cloud Services Remains Elusive

While many enterprises are reporting cost savings by moving to cloud platforms, the reality is that very few enterprises have seen values outside of cost savings.  A major finding of the study contradicts one of the largest expectations IT professionals have when adopting cloud services: that the cloud provides them with a fast, easy set of IT resources.  According to the study, only 20% of IT decision makers said they were very satisfied with this benefit.  This is because many aspects of the infrastructure and operations supporting these services are not found in the cloud but in the network, which many enterprises have not refreshed for the new world of Cloud IT.

The findings in the study also reveal some interesting contradictions.  Although 88% of IT decision makers believe cloud-based services will have an impact on the network, less than half of them said their organization had upgraded their network in the last three years.

In fact, the study shows that most organizations have given a higher priority to implementing cloud-based services and other IT initiatives over refreshing or upgrading the network.  According to the study, IT decision makers have placed a higher priority on five other IT initiatives (server upgrades, pursuing cloud services, storage refresh, PC refresh, and upgrading security environments) over the upgrading their network.

3. A Scalable, Agile and High Performance Network is Necessary for the New World of Cloud IT

In order to improve the value of their cloud services and accommodate the impact of cloud services on the network, the majority of IT organizations have had to upgrade their company’s networks.  Specifically, the study found that:

•       78% of enterprises had to upgrade one or more aspects of the network
•       47% of enterprises had to upgrade network bandwidth
•       46% had to invest in new security services

Organizations expanding or implementing cloud services have taken these lessons to heart.  IT decision makers said that upgrading the network is now their top priority for a comprehensive strategy to support public cloud and other cloud-based services offerings.

What is clear in the study is that enterprise networks have reached a tipping point with respect to being able to support more business-critical services that reside in the cloud,” said Don MacNeil, chief marketing officer at XO Communications.  “In order to realize the full benefits of cloud-based services, companies will have to examine their networks for readiness, align it with their business and IT strategy, and start to design new network infrastructures to enable a scalable, high-performing, cost-effective and secure cloud services environment.”

The full study is available for download by clicking here.

In addition, XO Communications will be hosting a live webinar on October 9, 2013 at 2:00 p.m. EDT featuring guest speaker, Forrester Research, Inc. principal analyst Andre Kindness, who will review the key findings of the study.  To register for the webinar, go to

About Juniper Networks

Juniper Networks (NYSE: JNPR) delivers innovation across routing, switching and security. From the network core down to consumer devices, Juniper Networks’ innovations in software, silicon and systems transform the experience and economics of networking. Additional information can be found at Juniper Networks ( or connect with Juniper on Twitter and Facebook.

About XO Communications

XO Communications is a leading nationwide provider of advanced IP communications, intelligent networking, and cloud computing services for business, large enterprise and wholesale customers. These customers include more than half of the Fortune 500, in addition to leading cable, mobile wireless and domestic and international telecommunications companies. XO offers a superior customer experience through its innovative solutions, its employees’ focus on customers and the proven performance of its advanced network. To learn more about XO Communications, visit or  XO Communications is also on Twitter, YouTube, Facebook and LinkedIn.

XO and the formative uses of each are all trademarks and registered trademarks of XO Communications, LLC.  Other trademarks are the property of their respective trademark owners.

Juniper Networks and Junos are registered trademarks of Juniper Networks, Inc. in the United States and other countries. The Juniper Networks and Junos logo are trademarks of Juniper Networks, Inc. All other trademarks, service marks, registered trademarks, or registered service marks are the property of their respective owners.

# # #

The following information provides profile information on the respondents to the survey.
Respondents by Company Size:

•       500 – 999 employees: 19%
•       1,000 – 4,999 employees: 38%
•       5,000 – 19,999 employees: 22%
•       20,000 or more employees: 21%

Respondents by Industry:

•       Manufacturing: 31%
•       Healthcare: 21%
•       Financial Services and Insurance: 20%
•       Professional & Business Services (consulting, legal, real estate, transportation services): 12%
•       Retail & Wholesale: 7%
•       Information Technology: 4%
•       Hospitality: 3%
•       Media & Entertainment: 2%

Level of involvement with decisions about the use cloud services:

•       54% said they were the final decision makers regarding their organizations’ use of cloud/SaaS implementations and/or vendor selection.
•       46% said they influence decisions regarding implementation of and/or vendor selection for cloud/SaaS services or manage vendor relations.

Position or title within the organization:

•       45% said they had overall responsibility for the IT department with a title such as CIO, CTO, etc.
•       21% said they held a senior position within the IT department, such as Senior VP, VP, Chief IT Architect.
•       34% said they were a director or manager with the IT department/function.

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

CloudTweaks Comics
Security: Avoiding A Hatton Garden-Style Data Center Heist

Security: Avoiding A Hatton Garden-Style Data Center Heist

Data Center Protection In April 2015, one of the world’s biggest jewelry heists occurred at the Hatton Garden Safe Deposit Company in London. Posing as workmen, the criminals entered the building through a lift shaft and cut through a 50cm-thick concrete wall with an industrial power drill. Once inside, the criminals had free and unlimited…

Four Recurring Revenue Imperatives

Four Recurring Revenue Imperatives

Revenue Imperatives “Follow the money” is always a good piece of advice, but in today’s recurring revenue-driven market, “follow the customer” may be more powerful. Two recurring revenue imperatives highlight the importance of responding to, and cherishing customer interactions. Technology and competitive advantage influence the final two. If you’re part of the movement towards recurring…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

Data Breaches: Incident Response Planning – Part 1

Data Breaches: Incident Response Planning – Part 1

Incident Response Planning – Part 1 The topic of cybersecurity has become part of the boardroom agendas in the last couple of years, and not surprisingly — these days, it’s almost impossible to read news headlines without noticing yet another story about a data breach. As cybersecurity shifts from being a strictly IT issue to…

Ending The Great Enterprise Disconnect

Ending The Great Enterprise Disconnect

Five Requirements for Supporting a Connected Workforce It used to be that enterprises dictated how workers spent their day: stuck in a cubicle, tied to an enterprise-mandated computer, an enterprise-mandated desk phone with mysterious buttons, and perhaps an enterprise-mandated mobile phone if they traveled. All that is history. Today, a modern workforce is dictating how…

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

There is a Difference – So Stop Comparing We are all familiar with the old saying “That’s like comparing apples to oranges” and though we learned this lesson during our early years we somehow seem to discount this idiom when discussing the Cloud. Specifically, IT buyers often feel justified when comparing the cost of a…

Lavabit, Edward Snowden and the Legal Battle For Privacy

Lavabit, Edward Snowden and the Legal Battle For Privacy

The Legal Battle For Privacy In early June 2013, Edward Snowden made headlines around the world when he leaked information about the National Security Agency (NSA) collecting the phone records of tens of millions of Americans. It was a dramatic story. Snowden flew to Hong Kong and then Russia to avoid deportation to the US,…

Cloud Infographic – DDoS attacks, unauthorized access and false alarms

Cloud Infographic – DDoS attacks, unauthorized access and false alarms

DDoS attacks, unauthorized access and false alarms Above DDoS attacks, unauthorized access and false alarms, malware is the most common incident that security teams reported responding to in 2014, according to a recent survey from SANS Institute and late-stage security startup AlienVault. The average cost of a data breach? $3.5 million, or $145 per sensitive…

A New CCTV Nightmare: Botnets And DDoS attacks

A New CCTV Nightmare: Botnets And DDoS attacks

Botnets and DDoS Attacks There’s just so much that seems as though it could go wrong with closed-circuit television cameras, a.k.a. video surveillance. With an ever-increasing number of digital eyes on the average person at all times, people can hardly be blamed for feeling like they’re one misfortune away from joining the ranks of Don’t…

Update: Timeline of the Massive DDoS DYN Attacks

Update: Timeline of the Massive DDoS DYN Attacks

DYN DDOS Timeline This morning at 7am ET a DDoS attack was launched at Dyn (the site is still down at the minute), an Internet infrastructure company whose headquarters are in New Hampshire. So far the attack has come in 2 waves, the first at 11.10 UTC and the second at around 16.00 UTC. So…

The Conflict Of Net Neutrality And DDoS-Attacks!

The Conflict Of Net Neutrality And DDoS-Attacks!

The Conflict Of Net Neutrality And DDoS-Attacks! So we are all cheering as the FCC last week made the right choice in upholding the principle of net neutrality! For the general public it is a given that an ISP should be allowed to charge for bandwidth and Internet access but never to block or somehow…


Sponsored Partners

AT&T Pinpoints 4 Key Elements To Achieving Security With The Internet of Things
The Value of Hybrid Cloud
Skin Based Technology – The Intelligent Tattoo
Help Your Business Improve Security By Choosing The Right Cloud Provider
Confused By The Cloud? A New eBook Reveals All…
Going Virtual? Keep One Eye On The Hardware And The Other On Habits
Cyber Security: An Ounce of Prevention
Internet Performance Management In Today’s Volatile Online Environment
Collaborative Economy – Customer Appreciation Day
Collaborative Economy – The Death Of “Death By Meeting”
Understanding The Importance Of A Flexible Hybrid Cloud Solution
Security Training Through Practical Experience