To the Cloud? – Developing a Cloud Migration Strategy

Developing Migration Strategy

Following the Microsoft Worldwide Partner Conference last year, it became pretty clear that cloud computing had risen to dominance. This was going to be the next big thing, and following Microsoft’s lead, the concept of “cloud” rose to the top of everyone’s mind.

So it was no surprise Microsoft soon after launched a huge ad campaign that included national television spots and placements in high profile mags such as Wired.

With the prominence of cloud established, the question has now become, when you hear that cute little couple in the airport say “to the cloud”, how does one actually get there?

I attended a Gartner seminar that explained the importance of developing a cloud migration Strategy.  Gartner predicts that by 2012, most organizations will have virtualized a large part of their IT environment and by 2015, most will have migrated to the cloud.  There’s much hype about cloud computing at the moment but it is safe to assume that most organizations do not have a Cloud Adoption Strategy so I’ve put together a list of things to consider when taking that leap of faith. In fact, having a structured plan in mind will make it scarcely a “leap” at all.

1. Preparation

This is where you identify key stakeholders to build a core cloud team, identify business objectives and set goals on how to achieve them.  In order to get buy- in from the entire organization it is important that input is gathered from all affected business units within your organization.  Then your core cloud team needs to determine and agree upon the business objectives associated with migrating to the cloud.  Items such as saving capital vs. IT agility, single vendor vs. multi-vendor strategy, and risk tolerance all should be considered.

2. Business and Application Assessment

At this point you should ask yourself, “Which applications can we move to the cloud?”  Within any organization, there are a number of strategic and non-strategic IT services and applications and your core team needs to decide which ones are ready for the cloud and which ones still need to be managed in-house.  For example, there are organizations that are using Gmail as their primary email server but does that make sense for you?  Data protection and security is of utmost importance, especially for organizations that maintain extremely sensitive information e.g. health care, public sector.  Hosting this type of data may not be feasible in the cloud, at least not yet.

3. Vendor Selection

There are myriad cloud vendors out there and, of course at this stage, your organization needs to decide which vendor best fits your cloud strategy requirements.  Gartner suggests a three step process, an approach which you should, in my opinion, be following for any vendor.

Step One:
Request for Information – what’s the viability of the vendor?  Do they have a proven track record?  How transparent are they?

Step Two:
Gather Responses and Review – you will want to scrutinize each vendor’s responses hard and mark off the list those who do not meet your standards or requirements.

Step Three:
Send RFQ and Select the Vendor – be sure to limit your potential vendor list to 2-3 maximum and ensure that the migration plan they map out for you makes total sense for your organization.

4. Risk and Liability Mitigation

Although some risk cannot be avoided, the best way to mitigate it is through upfront planning.  You must consider contingency planning, exit strategies and securing liability insurance.

5. Steady State

Once you’ve deployed your strategy and migrated portions of your IT environment to the cloud, this is where the maintenance work begins.  Employ sound cloud governance procedures and inject cloud management into everyday operational activities.  At this stage it is important that your cloud adoption strategy is measured and meeting the business objectives that you’ve set early on.

Of course, this only scratches the surface on how to migrate to the cloud, but at least it provides a starting point for organizations that are curious about adoption.  There are pitfalls that you should avoid such as skipping steps.  Core teams may be tempted to go straight to vendor selection but doing so will cause you to build an ad hoc strategy that could easily lead to unnecessary risks, cost increases, and unintended business impacts.

So when you hear those words “to the cloud”, now you’ll have a better understanding of what that means and how to get started on your way.

By Ariel del Rosario

The Manuscript.png
Holiday Photos.png
David Fletcher Blown Image
The Backup.png
Mitigation Security
Data scraping solutions When people hear the term data scraping, their first thought is often about how companies use this technology for competitive reasons – specifically to pull publicly-available data from millions of websites in ...
Mark Ardito
‘Legacy systems’ often get a bit of a rough time in the IT community. But perhaps this is unfair. After all, in many cases you’re talking about software platforms that have lasted and been effective ...
Jonathan Custance
IoT –  Part of Your Essential Kit Jonathan Custance, Co-Founder of Green Custard outlines how industrial organisations can leverage IoT to dramatically reduce their carbon footprint  Technological progress and environmental sustainability have always been at ...
Gilad David Maayan
What Is Application Dependency Mapping? Modern software development teams use fast-paced DevOps work processes. However, the complexity of modern software applications often gets in the way. A typical enterprise software project has thousands of components, ...
Damian Ng
3 Cloud Modernization Challenges There’s no denying that migrating to the cloud unlocks multiple benefits for organizations looking to modernize their IT infrastructure. However, the journey to truly unlock the benefits of the cloud and ...
  • Plural Site

    Pluralsite

    Pluralsight provides online courses on popular programming languages and developer tools. Other courses cover fields such as IT security best practices, server infrastructure, and virtualization.

  • Isc2

    ISC2

    (ISC)² provides IT training, certifications, and exams that run online, on your premises, or in classrooms. Self-study resources are available. You can also train groups of 10 or more of your employees. If you want a job in cybersecurity, this is the route to take.

  • App Academy

    App Academy

    Immersive software engineering programs. No experience required. Pay $0 until you're hired. Join an online info session to learn more

  • Cybrary

    Cybrary

    CYBRARY Open source Cyber Security learning. Free for everyone, forever. The world's largest cyber security community. Cybrary provides free IT training and paid IT certificates. Courses for beginners, intermediates, and advanced users are available.