Cisco Discusses the Resilience of Cloud Strategy

Cisco Discusses the Resilience of Cloud Strategy

Cloud Strategy

With businesses and consumers relying on the public cloud more than ever, it’s important that market transparency and resilience is improved. Enrico Fuiano, Senior Solutions Marketing Manager, Cisco Cloud Marketing, takes a look at the resilience of cloud strategy noting that IT organizations have adopted cloud primarily in two distinct ways: some standardize cloud infrastructure to improve data center efficiencies, thus reducing total number of suppliers across their entire IT value chain; others instead implement a ‘best of breed’ tactic, applying complex and heterogeneous IT environments which allow for the optimization of IT infrastructures related to specific applications required. The question Fuiano asks is, as cloud service adoption increases, will the range of cloud providers being utilized by IT decision makers increase or decrease? The study sponsored by Cisco and completed by IDC highlights some significant results.

Multiple Cloud Providers

Sebastian Stadil CEOSuggests Scalr CEO Sebastian Stadil, “In most enterprises, multi-cloud infrastructure emerges as a result of organic adoption. One business unit, department or team uses AWS and another uses Azure and there you go: a multi-cloud organization...” But the IDC findings further note that mature organizations demand a diverse choice from multiple cloud providers based on policies, location, and governance principles. Moreover, those organizations best able to obtain the most value from cloud providers are increasing their enthusiasm for a diverse range of cloud providers.

Speaking exclusively with CloudTweaks, Fuiano states, “We continue to witness how sophisticated enterprise class environments rely on the use of multiple cloud providers to achieve their business objectives. The study that IDC conducted confirms that organizations prefer to put in place inherently resilient cloud strategies. This allows them to better mitigate risks and optimize their choice of cloud providers based on their specific IT service requirements...”

Facing the Challenges

Unfortunately, multi-cloud environments often increase complexity and managing a convoluted portfolio of cloud-based applications can be a challenge. Suggests Fuiano, Cisco CloudCenter application-centric technology assists multi-cloud users by allowing them to:

  • Build cloud-independent application profiles quickly and easily that define requirements for deployment and management of an entire application stack.
  • Deploy the application profile as well as related components and data to any cloud environment or data center with just one click.
  • Apply an extensive range of application lifecycle actions to set policies for in-place scaling, assist with cross-environment bursting or high availability and disaster recovery, and stop deployment.

Because cloud administration and governance are so important, it’s necessary for administrators to be able to centrally manage cloud accounts, regulate costs, and provide data regarding use. Says Fuiano, “IT organizations understand that their role has changed. They have to act as ‘brokers of IT services’ to deliver IT at a faster pace. The combination of Cisco CloudCenter with our Cloud Professional Services portfolio can enable our customers to make that transition. The key is to deliver application-centric services while maintaining central governance, security, and control…

For businesses utilizing the cloud efficiently, benefiting from a choice of contractual terms and transparent pricing as well as the assortment of tools and applications available, multi-cloud infrastructures are likely to dominate. However, the recent IDC global cloud study indicates that while cloud adoption has indeed achieved mainstream levels this year, with 68% of surveyed organizations already using either private or public cloud for more than a couple of small applications, less than 3% of organizations have implemented optimized cloud strategies. We’ve perhaps still a way to go before proficient multi-cloud strategies are the main order of the day, but top service providers are already gearing up to ensures organizations have the support they need when it’s required.

By Jennifer Klostermann

About Jennifer Klostermann

Jennifer Klostermann is an experienced writer with a Bachelor of Arts degree majoring in writing and performance arts. She has studied further in both the design and mechanical engineering fields, and worked in a variety of areas including market research, business and IT management, and engineering. An avid technophile, Jen is intrigued by all the latest innovations and trending advances, and is happiest immersed in technology.

View All Articles

Sorry, comments are closed for this post.

Comics
Cyber Criminals Are Business People Too

Cyber Criminals Are Business People Too

Cyber Crime Business You’re on the morning train on the way to work and take a look at the guy next to you. He’s clean-cut, wearing a crisp suit and holding a leather briefcase just like dozens of others. Just another worker headed to the office, right?. Yes, but not in the way you think…

Digital Twin And The End Of The Dreaded Product Recall

Digital Twin And The End Of The Dreaded Product Recall

The Digital Twin  How smart factories and connected assets in the emerging Industrial IoT era along with the automation of machine learning and advancement of artificial intelligence can dramatically change the manufacturing process and put an end to the dreaded product recalls in the future. In recent news, Samsung Electronics Co. has initiated a global…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

How To Overcome Data Insecurity In The Cloud

How To Overcome Data Insecurity In The Cloud

Data Insecurity In The Cloud Today’s escalating attacks, vulnerabilities, breaches, and losses have cut deeply across organizations and captured the attention of, regulators, investors and most importantly customers. In many cases such incidents have completely eroded customer trust in a company, its services and its employees. The challenge of ensuring data security is far more…

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Once upon a time, only a select few companies like Google and Salesforce possessed the knowledge and expertise to operate efficient cloud infrastructure and applications. Organizations patronizing those companies benefitted with apps that offered new benefits in flexibility, scalability and cost effectiveness. These days, the sharp division between cloud and on-premises infrastructure…

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

DDoS Attacks October 21st, 2016 went into the annals of Internet history for the large scale Distributed Denial of Service (DDoS) attacks that made popular Internet properties like Twitter, SoundCloud, Spotify and Box inaccessible to many users in the US. The DDoS attack happened in three waves targeting DNS service provider Dyn, resulting in a total of about…

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks Does cloud security risks ever bother you? It would be weird if it didn’t. Cloud computing has a lot of benefits, but also a lot of risks if done in the wrong way. So what are the most important risks? The European Network Information Security Agency did extensive research on that, and…

How To Humanize Your Data (And Why You Need To)

How To Humanize Your Data (And Why You Need To)

How To Humanize Your Data The modern enterprise is digital. It relies on accurate and timely data to support the information and process needs of its workforce and its customers. However, data suffers from a likability crisis. It’s as essential to us as oxygen, but because we don’t see it, we take it for granted.…

Are Cloud Solutions Secure Enough Out-of-the-box?

Are Cloud Solutions Secure Enough Out-of-the-box?

Out-of-the-box Cloud Solutions Although people may argue that data is not safe in the Cloud because using cloud infrastructure requires trusting another party to look after mission critical data, cloud services actually are more secure than legacy systems. In fact, a recent study on the state of cloud security in the enterprise market revealed that…