Cloud Service Providers – I’ll Have What They Are Having

Cloud Service Providers – I’ll Have What They Are Having

Cloud Service Providers – I’ll Have What They Are Having

My last two CloudTweaks posts have focused on a food themed view of cloud computing. The initial post is about the similarities between making Bouillabaisse and cloud computing. The second post was about the are you sure button that comes from a pizza delivery person that knows you never order all the pizza’s with white sauce. At dinner the other night I was looking around the restaurant and realized I didn’t know what I wanted.

Certainly the restaurant chosen by my family has a number of exceptional dishes. I had eaten there before so I knew the team would bring something wonderful. I was struggling with what to order when it appeared to me. Well, the waiter appeared carrying a beautiful dish and I decided “I’ll have what they are having.” (It was food, by the way, not an obscure “When Harry Met Sally” reference.)

cloud-blue

In the cloud world, you don’t always want what the person next to you is having. The primary difference being that I could see what the table next to me had ordered. I could smell the prepared food, and it was both well-presented and frankly smelled amazing. With cloud solutions, you have to be careful. It’s almost like cloud at time’s heads down the “Let’s Make A Deal” path rather than a fine dining experience. Do you want what is behind door number one or door number two?

I’ve advocated for some time that this is the market hole we need to fill. I’ve said before any number of times that the concept of an honest broker would well make what’s behind door number 1 smell and taste fantastic. Oh and, by the way, what’s behind door number 2 is also well prepared and tastes fantastic.

The problem today is twofold:

  • There are lots of brokers
  • There are lots of cloud service providers

Let’s for a moment take the NIST definition of broker (an aggregator of services). Based on that definition there are a lot of companies that have broker technologies today. A single portal with connections to Amazon, Microsoft Azure and Google represents an aggregator of services. But we are looking for a little more. In fact, what we want is a waiter walking by us with a dish we can see and well smell as well.

There are a lot of companies that provide Cloud Services. In fact, there are three tiers – traditional managed IT solutions (floor + your stuff as is no longer in your data center), managed cloud (VPC or virtual private cloud hosted by a partner) or the even broader public cloud offerings. Again the original goal here was to have a waiter walk by and let us see what our neighbors are having.

What can we do? This is an area where the concept of an expanded broker adds value. What is an expanded broker?

  • Aggregator of Services
  • Honest Broker (not a cloud service provider)
  • Relationships with all the major solutions
  • Understand of both security requirements and security implementations focused on specific industries

There are lots of cloud service providers to choose from. Each of them can tell you that their solution is the perfect fit for your organization. Your partnership with the expanded honest cloud broker is the advantage you have in this discussion going forward. The honest broker won’t try to sell you their hosted cloud service as they don’t have one. Instead, they will help you evaluate the CSP’s on the market to determine which one does have the dish you need.

In this model, you get not only the NIST defined aggregation of services but you also get a partner whose loyalty is with your organization. The Cloud Service Providers will work with this honest broker because in the end; they represent the best way for the CSP to show you what your neighbors are having without showing you more than you should see.

I’ll have what that organization is getting in the cloud please.

By Scott Andersen

About Scott Andersen

Scott Andersen is the managing partner and Chief Technology Officer of Creative Technology & Innovation. During his 25+ years in the technology industry Scott has followed many technology trends down the rabbit hole. From early adopter to last person selecting a technology Scott has been on all sides. Today he loves spending time on his boat, with his family and backing many Kickstarter and Indiegogo projects.

View All Articles

Sorry, comments are closed for this post.

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

Embracing The Cloud We love the stories of big complacent industry leaders having their positions sledge hammered by nimble cloud-based competitors. Saleforce.com chews up Oracle’s CRM business. Airbnb has a bigger market cap than Marriott. Amazon crushes Walmart (and pretty much every other retailer). We say: “How could they have not seen this coming?” But, more…

Data Breaches: Incident Response Planning – Part 1

Data Breaches: Incident Response Planning – Part 1

Incident Response Planning – Part 1 The topic of cybersecurity has become part of the boardroom agendas in the last couple of years, and not surprisingly — these days, it’s almost impossible to read news headlines without noticing yet another story about a data breach. As cybersecurity shifts from being a strictly IT issue to…

Cloud Services Providers – Learning To Keep The Lights On

Cloud Services Providers – Learning To Keep The Lights On

The True Meaning of Availability What is real availability? In our line of work, cloud service providers approach availability from the inside out. And in many cases, some never make it past their own front door given how challenging it is to keep the lights on at home let alone factors that are out of…

7 Common Cloud Security Missteps

7 Common Cloud Security Missteps

Cloud Security Missteps Cloud computing remains shrouded in mystery for the average American. The most common sentiment is, “It’s not secure.” Few realize how many cloud applications they access every day: Facebook, Gmail, Uber, Evernote, Venmo, and the list goes on and on… People flock to cloud services for convenient solutions to everyday tasks. They…

Beacons Flopped, But They’re About to Flourish in the Future

Beacons Flopped, But They’re About to Flourish in the Future

Cloud Beacons Flying High When Apple debuted cloud beacons in 2013, analysts predicted 250 million devices capable of serving as iBeacons would be found in the wild within weeks. A few months later, estimates put the figure at just 64,000, with 15 percent confined to Apple stores. Beacons didn’t proliferate as expected, but a few…

Disaster Recovery – A Thing Of The Past!

Disaster Recovery – A Thing Of The Past!

Disaster Recovery  Ok, ok – I understand most of you are saying disaster recovery (DR) is still a critical aspect of running any type of operations. After all – we need to secure our future operations in case of disaster. Sure – that is still the case but things are changing – fast. There are…