John Pientka

Drill Baby, Drill! It’s a Gusher Due to the Cloud

Cloud Gushing The U.S. leads the world in oil and gas production. Twenty years ago a barrel of oil was under $20. Ten years ago it was over $140. Today it is $45 to $60. How do you prosper with this kind of price volatility
/
Survey results reveal the biggest Artificial Intelligence challenges

Survey results reveal the biggest Artificial Intelligence challenges

Biggest Artificial Intelligence Challenges We’ve been told countless times over the past few years what an impact Artificial Intelligence (AI) is going to have on all our lives. But while it’s true that Artificial Intelligence will certainly provide some huge opportunities, a recent survey we
/
cloud deployment models

Cloud Deployment Models – Read The Important Differences

Cloud Deployment Models

Leveraging cloud deployment models in order to cut capital expenditure and control operating costs is important in the growth of cloud adoption. However, the cloud can bring security risks and challenges for IT Management, which can be more expensive  for the organization to deal with, even considering the cost saving achieved by moving to the cloud. Therefore, it is very important for businesses to understand their requirements before opting for various deployment models available on the cloud.

There are primarily four cloud deployment models, which are discussed below, along with scenarios in which a business could opt for each. These cloud deployment models have been recommended by the National Institute of Standards and Technology (NIST).

what are cloud deployment models? Cloud Deployment Models

The Private Cloud

This model doesn’t bring much in terms of cost efficiency: it is comparable to buying, building and managing your own infrastructure. Still, it brings in tremendous value from a security point of view. During their initial adaptation to the cloud, many organizations face challenges and have concerns related to data security. These concerns are taken care of by this model, in which hosting is built and maintained for a specific client. The infrastructure required for hosting can be on-premises or at a third-party location.

Security concerns are addressed through secure-access VPN or by the physical location within the client’s firewall system.

Furthermore, for mission-critical applications we need to consider downtime in terms of internet availability, quality and performance. Hence, hosting the application with an on-premises private cloud is the suggested approach.

In addition to security reasons, this model is adopted by organizations in cases where data or applications are required to conform to various regulatory standards such as SOX, HIPAA, or SAS 70, which may require data to be managed for privacy and audits that govern the corporation. For example, for the healthcare and pharmaceutical industries, moving data to the cloud may violate the norms. Similarly, different countries have different laws and regulations for managing and handling data, which can impede the business if cloud is under different jurisdiction.

Several SaaS applications provide options to their clients to maintain their data on their own premises to ensure data privacy is maintained according to the requirements of the particular business. Amazon also provides the option of a virtual private cloud.

The Public Cloud

The public cloud deployment model represents true cloud hosting. In this deployment model, services and infrastructure are provided to various clients. Google is an example of a public cloud. This service can be provided by a vendor free of charge or on the basis of a pay-per-user license policy.

This model is best suited for business requirements wherein it is required to manage load spikes, host SaaS applications, utilize interim infrastructure for developing and testing applications, and manage applications which are consumed by many users that would otherwise require large investment in infrastructure from businesses. This model helps to reduce capital expenditure and bring down operational IT costs.

The Hybrid Cloud

This cloud deployment model helps businesses to take advantage of secured applications and data hosting on a private cloud, while still enjoying cost benefits by keeping shared data and applications on the public cloud. This model is also used for handling cloud bursting, which refers to a scenario where the existing private cloud infrastructure is not able to handle load spikes and requires a fallback option to support the load. Hence, the cloud migrates workloads between public and private hosting without any inconvenience to the users.

Many PaaS deployments expose their APIs, which can be further integrated with internal applications or applications hosted on a private cloud, while still maintaining the security aspects. Microsoft Azure and Force.com are two examples of this model.

The Community Cloud

In the community cloud deployment model, the cloud infrastructure is shared by several organizations with the same policy and compliance considerations. This helps to further reduce costs as compared to a private cloud, as it is shared by larger group.

Various state-level government departments requiring access to the same data relating to the local population or information related to infrastructure, such as hospitals, roads, electrical stations, etc., can utilize a community cloud to manage applications and data.

Cloud computing is not a “silver–bullet” technology; hence, investment in any deployment model should be made based on business requirements, the criticality of the application and the level of support required.

By Neeraj Metha

CloudTweaks Contributor
Leading Cloud Source Since 2009
Established in 2009, CloudTweaks is recognized as one of the leading authorities in cloud connected technology information, resources and thought leadership services. Contact us for a list of our leading brand and thought leadership exposure programs.
follow me
3 Ways to Protect Users From Ransomware With the Cloud

3 Ways to Protect Users From Ransomware With the Cloud

Protect Users From Ransomware The threat of ransomware came into sharp focus over the course of 2016. Cybersecurity trackers have been aware of ransomware for ...
Sekhar Sarukkai

A Closer Look at Insider Threats and Sensitive Data in the Cloud

Sensitive Data in the Cloud A recent survey report conducted by the Cloud Security Alliance (CSA) revealed that  sensitive data in the cloud had reached ...
Brian Wheeler

3 Major Concerns For The Cloud

Concerns For The Cloud With the rise of cloud computing, different concerns about adopting the cloud have arisen over the years. In 2016, the top ...
Oracle News

Oracle Recognizes Top Cloud Innovators at OpenWorld

/
Accenture, Ferrari, GAP, OUTFRONT Media, and SKY Brasil among those recognized as 2019 Oracle Excellence Award Winners This week, Oracle honored a diverse set of customers and partners for outstanding ...
400 Million Medical Radiological Images Exposed on the Internet

400 Million Medical Radiological Images Exposed on the Internet

/
An analysis of medical image storage systems exposed to the public web reveals that almost 600 servers in 52 countries are completely unprotected against unauthorized access. Audited systems were unpatched ...
BBC Tech

New Twitter algorithms aim to stamp out trolling

/
A new tool can identify Twitter accounts engaging in bullying with over 90% accuracy, according to researchers. Its algorithms classify two specific types of offensive online behaviour - cyber-bullying and ...

TRENDING | TECH NEWS