Victim Of Cloud-Washing? Use VPCs To Compete With The Big Firms

Victim Of Cloud-Washing? Use VPCs To Compete With The Big Firms

Victim of Cloud-Washing? Use VPCs to Compete with the Big Firms

As Amazon continues to innovate and deliver new services at an incredible pace it can be a challenge for others in the Cloud Service Provider (CSP) market to keep up. Predicted high growth on public cloud services is causing some existing data center providers to engage in cloud washing – labeling their services as “cloud” or “cloud-enabled”. This leaves genuine CSPs squeezed at both ends – struggling to keep up with Amazon, and struggling to differentiate from cloud washed managed services.

Virtual Private Clouds (VPC) provide one way to stand out. By giving subscribers the means to secure their data in a public cloud environment and connect back to resources in the enterprise CSPs can ease the transition into the cloud and add value for customers.

CSPs have two approaches they can take to delivering VPC. The first is to implement a service provider software defined networking (SDN) layer that can be exposed through an API (and user interface) to customers. This requires a significant investment in the SDN capability and its associated equipment, software and roll out. An alternative approach is to make use of network function virtualization (NFV) where the VPC is implemented entirely in software that’s under the customers’ control. The NFV version operates by running in existing virtual machines and over the top of the existing network. This can be done by simply offering an image to customers as part of a standard image library.

NFV-based VPCs: All the capabilities without the hardware

An NFV based approach to VPC gives cloud customers full control over their security, topology, protocols and addressing, which allows customers to bring workloads to the cloud that they otherwise wouldn’t. Security remains a top concern for those looking to adopt cloud, and security of data in motion to the cloud and in the cloud helps a great deal. Flexible deployment topologies are another benefit of the NFV approach to VPC, allowing for networks that span multiple regions and fault boundaries. It’s hard for CSPs to support protocols like multicast in a multi tenant environment, but a VPC provides the containment and NFV provides enablement. Finally control over addressing lets customers move applications without time consuming, costly and potentially hazardous changes to application configuration.

VPCs can increase the number of potential application topologies customers will move to the cloud and create new revenue streams. With a VPC offering, data center providers and CSPs can expand core cloud offering and make enhanced security and network control features available to their end customers without the cost of new hardware.

ryan-koopBy Ryan Koop,

Ryan Koop is the Director of Products and Marketing at CohesiveFT. Ryan’s role spans technical product development, customer support, business development and thought leadership. Prior to joining CohesiveFT, Ryan was part of a trading platform software company in the US Derivative Markets.

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

4 Cloud Technology Trends To Look Out For

4 Cloud Technology Trends To Look Out For

Cloud Technology Trends When you are reading articles on the future of tech on the Internet you cannot escape mention of the cloud: it is set to be the best thing that has ever happened to us, pundits assure us, and there is a promise of some serious money to be made. Reading these articles you can tell there is…

The Most Powerful Free Cloudware Tools Available to Modern Businesses

The Most Powerful Free Cloudware Tools Available to Modern Businesses

5 Essential Cloud Tools for Your Innovative Business Why these cloudware tools are a must for any modern business Smart business owners are always on the lookout for ways to save money. One of the best ways is capitalising on some of the best free cloudware tools available to businesses. Sixty percent of small and medium…

Managed Services Providers (MSPs) – Urged To Embrace The Cloud

Managed Services Providers (MSPs) – Urged To Embrace The Cloud

Managed Services Providers (MSPs)  If you’ve been observant of the MSP industry over the last two years, you’ve no doubt noticed that it has had significant difficulty expanding its service capabilities and growing its revenue stream around cloud computing. At least that was the analysis of recent market research studies assessing the status of cloud…

Even Companies With A “Cloud First” Strategy Have Lingering Security Concerns

Even Companies With A “Cloud First” Strategy Have Lingering Security Concerns

Lingering Security Concerns Considering the cost and time-to-market advantages of SaaS applications in particular, it’s no surprise that companies are looking to the cloud to meet their business objectives. But what happens when a ‘cloud first’ company must also put security and compliance first? In a recent Bitglass survey report from a cloud access security…

The iCloud Scandal – Who Is To Blame? –  ‘Cloud’ Security vs. ‘Internet’ Security

The iCloud Scandal – Who Is To Blame? – ‘Cloud’ Security vs. ‘Internet’ Security

How the iCloud Scandal Has Helped to Define the Difference Between ‘Cloud’ Security and ‘Internet’ Security Busting the myth that bad cloud security was to blame for Apple’s recent celebrity data disaster Overview: We discuss the ‘celebrity hacking’ iCloud saga and debate whether or not the breach was likely down to Cloud encryption issues or…

New Smartphones From Apple, Samsung and HTC Promise To Light Up 2016

New Smartphones From Apple, Samsung and HTC Promise To Light Up 2016

New Smartphones from Apple, Samsung and HTC (Sponsored post courtesy of Verizon Wireless) The launch of the Galaxy S7 Edge at the Mobile World Congress in Barcelona during February was the first shot in a vintage year for mobile phones. The S7 is an incredible piece of hardware, but launches from HTC and Apple later in the…

Featured Sponsored Articles
How Successful Businesses Ensure Quality Team Communication

How Successful Businesses Ensure Quality Team Communication

Quality Team Communication  (Sponsored post courtesy of Hubgets) Successful team communication and collaboration are as vital to project and overall business success as the quality of products and services an organization develops. We rely on a host of business tools to ensure appropriate customer interactions, sound product manufacturing, and smooth back-end operations. However, the interpersonal relationships…

Featured Sponsored Articles
How To Develop A Business Continuity Plan Using Internet Performance Management

How To Develop A Business Continuity Plan Using Internet Performance Management

Internet Performance Management Planning CDN Performance Series Provided By Dyn In our previous post, we laid out the problems of business continuity and Internet Performance Management in today’s online environment.  In this article, we will take a look at some of the ways you can use traffic steering capabilities to execute business continuity planning and…

Featured Sponsored Articles

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Sponsor