Cloud Service Providers – I’ll Have What They Are Having

Cloud Service Providers – I’ll Have What They Are Having

Cloud Service Providers – I’ll Have What They Are Having

My last two CloudTweaks posts have focused on a food themed view of cloud computing. The initial post is about the similarities between making Bouillabaisse and cloud computing. The second post was about the are you sure button that comes from a pizza delivery person that knows you never order all the pizza’s with white sauce. At dinner the other night I was looking around the restaurant and realized I didn’t know what I wanted.

Certainly the restaurant chosen by my family has a number of exceptional dishes. I had eaten there before so I knew the team would bring something wonderful. I was struggling with what to order when it appeared to me. Well, the waiter appeared carrying a beautiful dish and I decided “I’ll have what they are having.” (It was food, by the way, not an obscure “When Harry Met Sally” reference.)

cloud-blue

In the cloud world, you don’t always want what the person next to you is having. The primary difference being that I could see what the table next to me had ordered. I could smell the prepared food, and it was both well-presented and frankly smelled amazing. With cloud solutions, you have to be careful. It’s almost like cloud at time’s heads down the “Let’s Make A Deal” path rather than a fine dining experience. Do you want what is behind door number one or door number two?

I’ve advocated for some time that this is the market hole we need to fill. I’ve said before any number of times that the concept of an honest broker would well make what’s behind door number 1 smell and taste fantastic. Oh and, by the way, what’s behind door number 2 is also well prepared and tastes fantastic.

The problem today is twofold:

  • There are lots of brokers
  • There are lots of cloud service providers

Let’s for a moment take the NIST definition of broker (an aggregator of services). Based on that definition there are a lot of companies that have broker technologies today. A single portal with connections to Amazon, Microsoft Azure and Google represents an aggregator of services. But we are looking for a little more. In fact, what we want is a waiter walking by us with a dish we can see and well smell as well.

There are a lot of companies that provide Cloud Services. In fact, there are three tiers – traditional managed IT solutions (floor + your stuff as is no longer in your data center), managed cloud (VPC or virtual private cloud hosted by a partner) or the even broader public cloud offerings. Again the original goal here was to have a waiter walk by and let us see what our neighbors are having.

What can we do? This is an area where the concept of an expanded broker adds value. What is an expanded broker?

  • Aggregator of Services
  • Honest Broker (not a cloud service provider)
  • Relationships with all the major solutions
  • Understand of both security requirements and security implementations focused on specific industries

There are lots of cloud service providers to choose from. Each of them can tell you that their solution is the perfect fit for your organization. Your partnership with the expanded honest cloud broker is the advantage you have in this discussion going forward. The honest broker won’t try to sell you their hosted cloud service as they don’t have one. Instead, they will help you evaluate the CSP’s on the market to determine which one does have the dish you need.

In this model, you get not only the NIST defined aggregation of services but you also get a partner whose loyalty is with your organization. The Cloud Service Providers will work with this honest broker because in the end; they represent the best way for the CSP to show you what your neighbors are having without showing you more than you should see.

I’ll have what that organization is getting in the cloud please.

By Scott Andersen

About Scott Andersen

Scott Andersen is the managing partner and Chief Technology Officer of Creative Technology & Innovation. During his 25+ years in the technology industry Scott has followed many technology trends down the rabbit hole. From early adopter to last person selecting a technology Scott has been on all sides. Today he loves spending time on his boat, with his family and backing many Kickstarter and Indiegogo projects.

View All Articles

Sorry, comments are closed for this post.

From Startup To Becoming Enterprise Grade

From Startup To Becoming Enterprise Grade

Becoming Enterprise Grade How can an emerging business make a successful transition from selling to SMB customers that fueled their early growth to the enterprise customers that enable long-term profitability? What works with SMB customers often won’t get you a seat at the enterprise table. To make deep inroads into enterprise accounts, you have to…

Carve Outs And The Cloud: A Synergistic Coupling

Carve Outs And The Cloud: A Synergistic Coupling

Carve Outs and the Cloud The mergers and acquisitions market is a complex and challenging industry and the last two years has seen a rise in the number of transactions. Working with companies in this space over the last 10 years, we at RKON have seen and hopefully helped change the mindset of private equity…

5 Basic Safety Tips For Cloud Backups

5 Basic Safety Tips For Cloud Backups

Basic Cloud Backup Tips If you’re worried about the security of your data when it comes to cloud computing adoption, you’re not the only one. Industry experts claim that cloud computing data security is becoming an increasingly critical component in the data transmission process. And current mainstream services like Amazon’s EC2 just aren’t well-equipped enough…

Are you SURE you are ready for the cloud?

Are you SURE you are ready for the cloud?

Ready For The Cloud? For several years now, people and organizations have been slowly but surely moving their data and applications to the cloud. Whether it is a local private cloud, Hybrid or a fully hosted one, they all have one thing in common: They are no longer tied to physical hardware. That is how…

How IRM Makes Cloud-Based File Collaboration “Security-Aware”

How IRM Makes Cloud-Based File Collaboration “Security-Aware”

IRM Cloud-Based File Collaboration  Data breaches and data loss due to insider threats, including malicious insiders stealing, manipulating or destroying data, are the fastest-growing risks that keep managers up at night, according to new research by Ernst & Young. How can we ensure that the right people in an organization have the right access to…

New Smartphones From Apple, Samsung and HTC Promise To Light Up 2016

New Smartphones From Apple, Samsung and HTC Promise To Light Up 2016

New Smartphones from Apple, Samsung and HTC (Sponsored post courtesy of Verizon Wireless) The launch of the Galaxy S7 Edge at the Mobile World Congress in Barcelona during February was the first shot in a vintage year for mobile phones. The S7 is an incredible piece of hardware, but launches from HTC and Apple later in the…

Featured Sponsored Articles
How Successful Businesses Ensure Quality Team Communication

How Successful Businesses Ensure Quality Team Communication

Quality Team Communication  (Sponsored post courtesy of Hubgets) Successful team communication and collaboration are as vital to project and overall business success as the quality of products and services an organization develops. We rely on a host of business tools to ensure appropriate customer interactions, sound product manufacturing, and smooth back-end operations. However, the interpersonal relationships…

Featured Sponsored Articles
How To Develop A Business Continuity Plan Using Internet Performance Management

How To Develop A Business Continuity Plan Using Internet Performance Management

Internet Performance Management Planning CDN Performance Series Provided By Dyn In our previous post, we laid out the problems of business continuity and Internet Performance Management in today’s online environment.  In this article, we will take a look at some of the ways you can use traffic steering capabilities to execute business continuity planning and…

Featured Sponsored Articles

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Sponsor