Moving Beyond Cloud Management To Cloud Portfolio Management

Moving Beyond Cloud Management To Cloud Portfolio Management

Moving Beyond Cloud Management to Cloud Portfolio Management

Virtually every enterprise will be leveraging a portfolio of public and private clouds – whether by strategy or circumstance. In the 2013 – State of the Cloud survey, RightScale found that larger organizations are choosing multi–cloud (77 percent) with the majority of those (47 percent) choosing hybrid cloud strategies.

The ability to successfully manage and optimize your portfolio of applications across your portfolio of clouds will make the difference in how much business value IT can deliver to your organization. Cloud Management is an important piece of the puzzle, but companies are looking for more.

Workloads

In order to deliver the significant business value
 that a cloud portfolio can provide while ensuring the necessary level of governance, enterprises require new approaches. Cloud Portfolio Management (CPM) is a new type of solution — designed to help companies capitalize on this growing array of cloud technologies.

Cloud Portfolio Management solutions provide a comprehensive set of management capabilities
 that span all aspects of cloud usage across a broad variety of cloud options, going well beyond what vendor-specific public or private cloud management features provide. CPM solutions are designed to provide the enterprise with a single pane of glass to manage a portfolio of applications and optimize usage across a portfolio of clouds. They enable companies to choose the right cloud — public
 or private — for each application and to move applications between clouds as circumstances change. And they prevent lock-in and provide investment flexibility.

Here are six key characteristics of a Cloud Portfolio Management (CPM) solution. 

1) Abstracting Multiple Clouds

For the greatest efficiency and control, large companies abstract the significant differences between public and private clouds – and use a consistent management solution across these disparate environments. A Cloud Portfolio Management (CPM) solution allows you to operate seamlessly across varied cloud services and private cloud environments. Each cloud will differ in a wide variety of characteristics, including APIs, behaviors (for example how clouds provision storage differently), resource sizes and types, and security capabilities.

2) Delivering Self-Service IT

A critical requirement of enterprise cloud initiatives is to provide developers and application teams with self-service access to cloud services. Enterprise developers often face 4-8 week delays for the approval, purchasing, and provisioning of servers. Shadow IT has emerged as a reaction by developers and the business units they serve to these significant delays. Self-service access to cloud decreases the time it takes to access infrastructure from months to minutes, unleashing innovation and helping to speed new products to market. In order to deliver self-service capabilities and bring shadow IT into the fold, central IT organizations need to provide the same easy access to infrastructure that developers have come to expect from public cloud services. Internal users are unlikely to be satisfied with modest improvements to lengthy waits when they can take advantage of ever-increasing public cloud options.

3) Providing Governance and Controls

Many CIOs have little or no visibility into existing shadow use of cloud resources. As enterprises embrace self-service access to cloud infrastructure, IT organizations also need to ensure that they have visibility and governance across their portfolio of public and private clouds. The first challenge is to gain visibility across all cloud usage. Enterprises need a comprehensive view of which applications have been deployed in which clouds. In addition, they want to easily see how each application is architected, which technology components were used, and what security configurations are in place. To comply with regulations and internal policies, companies also need access to detailed audit trails that track every change.

The second challenge is putting in place appropriate governance controls. This includes identity and access controls that define what each user can do as well as budget controls that ensure costs stay within approved budgets.

4) Automating Lifecycle Management

Cloud Portfolio Management (CPM) provides a platform to manage cloud-based applications across their entire lifecycle — from development and test to staging and production – with full visibility and version control. CPM also supports modern practices including agile development, continuous deployment, dynamic configuration, and DevOps. As organizations seek to gain control over VM sprawl, best practices for application deployment have evolved to dynamic configuration of servers using such tools as Chef, Puppet, and Salt. These tools enable the creation of consistent, repeatable, and clone-able servers and deployments. CPM solutions will support a choice of configuration management tools while providing support for the unique requirements of multiple clouds. CPM solutions should offer out-of-the-box configuration templates with the ability to customize or create new templates that meet the specific requirements of the organization. Version control helps companies to manage changes over time and ensure consistency from development through production.

5) Deliver Application SLAs

Cloud environments require new and innovative approaches to ensure that applications meet required SLAs. A CPM solution helps organizations to architect and automate applications to deliver both scalability and reliability. Cloud-based applications can be scaled horizontally by adding more instances to an application tier and scaled vertically by upsizing instances. Cloudbursting among cloud resource pools can help to provide additional flexibility as application demands grow. CPM solutions can act as a key foundation by enabling all three scaling options. In addition, cloud experts know that it is critical to plan for failure. Outages are inevitable – whether you are using a public cloud, your data center, or an outsourced provider. Spreading risk across vendors is a critical requirement for your CPM solution. In addition, to ensure that you can automate failover and DR strategies in the event of a cloud outage, a SaaS-based CPM solution will ensure that your management plane is operating even if your private or public cloud is experiencing problems. As a result, you can increase reliability and deliver SLAs.

6) Managing and Optimizing Costs

Cost management is an essential component of managing the financial options and impacts of a cloud portfolio strategy. As business units embrace the value that cloud delivers, usage and costs can easily spiral if not carefully managed and continuously optimized. The variable cost model of cloud computing introduces significant opportunities for savings, but also requires new approaches to minimize waste and optimize your spend. Users can often overprovision capacity or forget to de-provision temporary resources. A cloud cost analytics solution provides visibility into past, present, and future cloud usage and provides the critical information needed to manage spend. A cost management solution enables enterprises to do “what if” analysis on different deployments, clouds, and purchase options (on-demand cost vs. pre-purchased cost scenarios, for example).

Cloud Portfolio Management is a critical technology foundation that will support enterprise multi-cloud strategies and help drive innovation, growth, and efficiency. By implementing a CPM solution, IT teams can deliver self-service access to cloud services while maintaining the necessary governance, control, and cloud cost optimization. Understanding the role of CPM will help you deliver on your multi-cloud strategy and help your organization innovate and grow.

By Bret Clement,

Bret Clement manages global communications at RightScale. With RightScale Cloud Management, IT organizations can deliver instant access to a portfolio of private, public, and hybrid cloud services across business units and development teams while maintaining enterprise control.

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comic
Part 1 – Connected Vehicles: Paving The Way For IoT On Wheels

Part 1 – Connected Vehicles: Paving The Way For IoT On Wheels

Connected Vehicles From cars to combines, the IoT market potential of connected vehicles is so expansive that it will even eclipse that of the mobile phone. Connected personal vehicles will be the final link in a fully connected IoT ecosystem. This is an incredibly important moment to capitalize on given how much time people spend…

Embedded Sensors and the Wearable Personal Cloud

Embedded Sensors and the Wearable Personal Cloud

The Wearable Personal Cloud Wearable tech is one avenue of technology that’s encouraging cloud connections and getting us all onto interconnected networks, and with the continued miniaturization and advancement of computing the types of wearable tech are always expanding and providing us with new opportunities. A few years ago, smartwatches were rather clunky devices with…

SWIFT Says Bank Hacks Set To Increase

SWIFT Says Bank Hacks Set To Increase

Bank Hacks Set To Increase SWIFT, whose messaging network is used by banks to send payment instructions worth trillions of dollars each day, said three clients were hacked over the summer and cyber attacks on banks are set to increase. The theft of $81 million in February from Bangladesh’s central bank using SWIFT messages rocked…

Security: Avoiding A Hatton Garden-Style Data Center Heist

Security: Avoiding A Hatton Garden-Style Data Center Heist

Data Center Protection In April 2015, one of the world’s biggest jewelry heists occurred at the Hatton Garden Safe Deposit Company in London. Posing as workmen, the criminals entered the building through a lift shaft and cut through a 50cm-thick concrete wall with an industrial power drill. Once inside, the criminals had free and unlimited…

Automated Application Discovery Introduced By Savision At Microsoft Ignite 2016

Automated Application Discovery Introduced By Savision At Microsoft Ignite 2016

Automated Application Discovery ATLANTA, GEORGIA – September 26, 2016 – Savision, a market leader in service-oriented monitoring solutions that unify IT operations with IT service management, today announced the release of its automated application discovery module for Unity iQ. Savision’s automated application discovery module offers an agentless, trigger-based discovery method that captures infrastructure elements, application dependencies, as well…

Are CEO’s Missing Out On Big Data’s Big Picture?

Are CEO’s Missing Out On Big Data’s Big Picture?

Big Data’s Big Picture Big data allows marketing and production strategists to see where their efforts are succeeding and where they need some work. With big data analytics, every move you make for your company can be backed by data and analytics. While every business venture involves some level of risk, with big data, that risk…

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

There is a Difference – So Stop Comparing We are all familiar with the old saying “That’s like comparing apples to oranges” and though we learned this lesson during our early years we somehow seem to discount this idiom when discussing the Cloud. Specifically, IT buyers often feel justified when comparing the cost of a…

LAVABIT, EDWARD SNOWDEN, AND THE LEGAL BATTLE FOR PRIVACY

LAVABIT, EDWARD SNOWDEN, AND THE LEGAL BATTLE FOR PRIVACY

The Legal Battle For Privacy In early June 2013, Edward Snowden made headlines around the world when he leaked information about the National Security Agency (NSA) collecting the phone records of tens of millions of Americans. It was a dramatic story. Snowden flew to Hong Kong and then Russia to avoid deportation to the US,…

THE FUTURE OF BIG DATA AND DNS ANALYTICS

THE FUTURE OF BIG DATA AND DNS ANALYTICS

Big Data and DNS Analytics Big Data is revolutionizing the way admins manage their DNS traffic. New management platforms are combining historical data with advanced analytics to inform admins about possible performance degradation in their networks. Not only that, but they also have the ability to suggest ways to optimize network configurations for faster routing.…

Cloud Infographic – The Data Scientist

Cloud Infographic – The Data Scientist

Data Scientist Report The amount of data in our world has been exploding in recent years. Managing big data has become an integral part of many businesses, generating billions of dollars of competitive innovations, productivity and job growth. Forecasting where the big data industry is going has become vital to corporate strategy. Enter the Data…

Cloud Computing – A Requirement For Greater Innovation

Cloud Computing – A Requirement For Greater Innovation

Cloud Computing Innovation Sao Paulo, Brazil has had trouble with both energy and water supplies as of late. Despite it is the rainy period. Unfortunately Sao Paulo is very dependent on its rain as a majority of its power is generated from large dams. No water, no energy. Difficult situation for a city of some…

M2M, IoT and Wearable Technology: Where To Next?

M2M, IoT and Wearable Technology: Where To Next?

M2M, IoT and Wearable Technology Profiling 600 companies and including 553 supporting tables and figures, recent reports into the M2M, IoT and Wearable Technology ecosystems forecast opportunities, challenges, strategies, and industry verticals for the sectors from 2015 to 2030. With many service providers looking for new ways to fit wearable technology with their M2M offerings…

7 Common Cloud Security Missteps

7 Common Cloud Security Missteps

Cloud Security Missteps Cloud computing remains shrouded in mystery for the average American. The most common sentiment is, “It’s not secure.” Few realize how many cloud applications they access every day: Facebook, Gmail, Uber, Evernote, Venmo, and the list goes on and on… People flock to cloud services for convenient solutions to everyday tasks. They…

Consequences Of Combining Off Premise Cloud Storage and Corporate Data

Consequences Of Combining Off Premise Cloud Storage and Corporate Data

Off Premise Corporate Data Storage Cloud storage is a broad term. It can encompass anything from on premise solutions, to file storage, disaster recovery and off premise options. To narrow the scope, I’ve dedicated the focus of today’s discussion to the more popular cloud storage services—such as Dropbox, Box, OneDrive—which are also known as hosted,…

Report: Enterprise Cloud Computing Moves Into Mature Growth Phase

Report: Enterprise Cloud Computing Moves Into Mature Growth Phase

Verizon Cloud Report Enterprises using the cloud, even for mission-critical projects, is no longer new or unusual. It’s now firmly established as a reliable workhorse for an organization and one that can deliver great value and drive transformation. That’s according to a new report from Verizon entitled “State of the Market: Enterprise Cloud 2016.” which…