Cloud Service Providers – I’ll Have What They Are Having

Cloud Service Providers – I’ll Have What They Are Having

Cloud Service Providers – I’ll Have What They Are Having

My last two CloudTweaks posts have focused on a food themed view of cloud computing. The initial post is about the similarities between making Bouillabaisse and cloud computing. The second post was about the are you sure button that comes from a pizza delivery person that knows you never order all the pizza’s with white sauce. At dinner the other night I was looking around the restaurant and realized I didn’t know what I wanted.

Certainly the restaurant chosen by my family has a number of exceptional dishes. I had eaten there before so I knew the team would bring something wonderful. I was struggling with what to order when it appeared to me. Well, the waiter appeared carrying a beautiful dish and I decided “I’ll have what they are having.” (It was food, by the way, not an obscure “When Harry Met Sally” reference.)

cloud-blue

In the cloud world, you don’t always want what the person next to you is having. The primary difference being that I could see what the table next to me had ordered. I could smell the prepared food, and it was both well-presented and frankly smelled amazing. With cloud solutions, you have to be careful. It’s almost like cloud at time’s heads down the “Let’s Make A Deal” path rather than a fine dining experience. Do you want what is behind door number one or door number two?

I’ve advocated for some time that this is the market hole we need to fill. I’ve said before any number of times that the concept of an honest broker would well make what’s behind door number 1 smell and taste fantastic. Oh and, by the way, what’s behind door number 2 is also well prepared and tastes fantastic.

The problem today is twofold:

  • There are lots of brokers
  • There are lots of cloud service providers

Let’s for a moment take the NIST definition of broker (an aggregator of services). Based on that definition there are a lot of companies that have broker technologies today. A single portal with connections to Amazon, Microsoft Azure and Google represents an aggregator of services. But we are looking for a little more. In fact, what we want is a waiter walking by us with a dish we can see and well smell as well.

There are a lot of companies that provide Cloud Services. In fact, there are three tiers – traditional managed IT solutions (floor + your stuff as is no longer in your data center), managed cloud (VPC or virtual private cloud hosted by a partner) or the even broader public cloud offerings. Again the original goal here was to have a waiter walk by and let us see what our neighbors are having.

What can we do? This is an area where the concept of an expanded broker adds value. What is an expanded broker?

  • Aggregator of Services
  • Honest Broker (not a cloud service provider)
  • Relationships with all the major solutions
  • Understand of both security requirements and security implementations focused on specific industries

There are lots of cloud service providers to choose from. Each of them can tell you that their solution is the perfect fit for your organization. Your partnership with the expanded honest cloud broker is the advantage you have in this discussion going forward. The honest broker won’t try to sell you their hosted cloud service as they don’t have one. Instead, they will help you evaluate the CSP’s on the market to determine which one does have the dish you need.

In this model, you get not only the NIST defined aggregation of services but you also get a partner whose loyalty is with your organization. The Cloud Service Providers will work with this honest broker because in the end; they represent the best way for the CSP to show you what your neighbors are having without showing you more than you should see.

I’ll have what that organization is getting in the cloud please.

By Scott Andersen

About Scott Andersen

Scott Andersen is the managing partner and Chief Technology Officer of Creative Technology & Innovation. During his 25+ years in the technology industry Scott has followed many technology trends down the rabbit hole. From early adopter to last person selecting a technology Scott has been on all sides. Today he loves spending time on his boat, with his family and backing many Kickstarter and Indiegogo projects.

View All Articles

Sorry, comments are closed for this post.

Comic
Investing In The Future With The Introduction of Sage Cloud

Investing In The Future With The Introduction of Sage Cloud

CHICAGO, IL–(Marketwired – Jul 26, 2016) – Sage, a market leader in cloud accounting software, announced today at Sage Summit 2016 its strong commitment to future technologies, with a focus on new and existing partnerships that power business growth. Revealed during CEO Stephen Kelly’s keynote address, which opened the world’s largest gathering of entrepreneurs and…

2016 Tour de France: Racing With Big Data

2016 Tour de France: Racing With Big Data

2016 Tour de France The 2016 Tour de France has just concluded, with Chris Froome (SKY) taking his third overall win. Not the kind of event we often focus on here at CloudTweaks, but Dimension Data has put its analytics technology to use tracking the journeys of each rider across all 21 stages, and their…

Ransomware: A Digital Pandemic – Is There A Cure?

Ransomware: A Digital Pandemic – Is There A Cure?

The Rise Of Ransomware You can imagine the scene: you’ve just completed that business plan and a set of accounts. Finally, it’s done and saved, ready for a final read through and to be sent out to your contact list. And right when you’re ready to click “Send”, the next thing you see on the…

Martech In A Content Crazed World

Martech In A Content Crazed World

Content Crazed World Everywhere you look there are pop-up ads and offers, at times it can feel like overload. What used to be a few online ads on websites has now grown into a wild world of offers that consume your every device. These advancements in marketing technology can not only be overwhelming to the…

Hubgets – Advanced Collaboration, Enriched Communication

Hubgets – Advanced Collaboration, Enriched Communication

Advanced Collaboration Tool Sponsored series provided in collaboration with Hubgets Collaboration tools have advanced leaps and bounds with the advent of cloud technology, and the services available are only getting better. Promising features such as sophisticated group communication, productive management of tasks and meetings, and the ultimate dream, working remotely from some gorgeous island destination, innovative collaboration…

Don’t Be Intimidated By Data Governance

Don’t Be Intimidated By Data Governance

Data Governance Data governance, the understanding of the raw data of an organization is an area IT departments have historically viewed as a lose-lose proposition. Not doing anything means organizations run the risk of data loss, data breaches and data anarchy – no control, no oversight – the Wild West with IT is just hoping…

Data Breaches: Incident Response Planning – Part 1

Data Breaches: Incident Response Planning – Part 1

Incident Response Planning – Part 1 The topic of cybersecurity has become part of the boardroom agendas in the last couple of years, and not surprisingly — these days, it’s almost impossible to read news headlines without noticing yet another story about a data breach. As cybersecurity shifts from being a strictly IT issue to…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

The Fully Aware, Hybrid-Cloud Approach

The Fully Aware, Hybrid-Cloud Approach

Hybrid-Cloud Approach For over 20 years, organizations have been attempting to secure their networks and protect their data. However, have any of their efforts really improved security? Today we hear journalists and industry experts talk about the erosion of the perimeter. Some say it’s squishy, others say it’s spongy, and yet another claims it crunchy.…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…

What Top SaaS Vendors Do To Ensure Successful Onboarding

What Top SaaS Vendors Do To Ensure Successful Onboarding

What Top SaaS Vendors Do I am not going to mention names in this article, but if you want to be the best, you must look at what the best do – and do it better. The importance of investing in SaaS onboarding can be easily overlooked in favor of designing efficient and powerful software…

Low Cost Cloud Computing Gives Rise To Startups

Low Cost Cloud Computing Gives Rise To Startups

Balancing The Playing Field For Startups According to a Goldman Sachs report, cloud infrastructure and platform spending could reach $43 billion by 2018, which is up $16 billion from last year, representing a growth of around 30% from 2013 said the analyst. This phenomenal growth is laying the foundation for a new breed of startup…

How Data Science And Machine Learning Is Enabling Cloud Threat Protection

How Data Science And Machine Learning Is Enabling Cloud Threat Protection

Data Science and Machine Learning Security breaches have been consistently rising in the past few years. Just In 2015, companies detected 38 percent more security breaches than in the previous year, according to PwC’s Global State of Information Security Survey 2016. Those breaches are a major expense — an average of $3.79 million per company,…

Cloud Infographic – The Future (IoT)

Cloud Infographic – The Future (IoT)

The Future (IoT) By the year 2020, it is being predicted that 40 to 80 billion connected devices will be in use. The Internet of Things or IoT will transform your business and home in many truly unbelievable ways. The types of products and services that we can expect to see in the next decade…

Five Signs The Internet of Things Is About To Explode

Five Signs The Internet of Things Is About To Explode

The Internet of Things Is About To Explode By 2020, Gartner estimates that the Internet of Things (IoT) will generate incremental revenue exceeding $300 billion worldwide. It’s an astoundingly large figure given that the sector barely existed three years ago. We are now rapidly evolving toward a world in which just about everything will become…

Using Big Data To Analyze Venture Capitalists’ Ability To Recognize Potential

Using Big Data To Analyze Venture Capitalists’ Ability To Recognize Potential

Big Data To Analyze Using Big Data to Analyze Venture Capitalists’ Ability To Recognize Potential For those who are regularly involved with SMEs, venture capital, and company valuations, it is common knowledge that start-ups that exit for more than $1 billion dollars are extremely rare – often termed ‘unicorn’ companies. Despite their rarity, it should…