The Many Interpretations Of Cloud Brokers

Cloud Brokers

I had an interesting discussion the other day with a person who said “I don’t believe in cloud brokers.” I thought about the opening gambit for a bit wondering if in the end Cloud Brokers like the Easter Bunny and Santa Clause were open for “interpretation.”

Anyone can argue with a concept. But Cloud Brokers aren’t real? They are so “last century?” It was an interesting conversation. Cloud Broker is a term that many organizations mis-use or twist/bend to fit their product and their definition. I am a broker they loudly proclaim and then they show their product proudly labeled “Cloud Broker.” This also comes up when you play the “IT is a Commodity” game either at home or work.

Or as some pundits now proclaim IT as a Service you can consume. The reality of IT is that it has been a commodity for many years, the large outsourcing vendors have made a living taking IT services and selling them back to the business. Commodity IT services simply represent in all cases the expertise your organization doesn’t have today, that you won’t need next week. IT Services that you will need this afternoon for two hours and maybe an hour next week. You don’t want to hire someone for that 10 hour period so instead like cloud you leverage the existing Utility model for consulting. You go to XYZ Company and you rent a consultant.

The same is true in Cloud computing. What people miss is that the nature of those two hour consulting gigs is the reality of the relationship. You don’t go create a new relationship every time you want to bring on a consultant. You leverage the existing consulting partnerships you have. The same is true of the broker. Rather than having 20 distinct connections with 20 distinct Cloud Service Providers that you manage and maintain, you have one with the broker.

Now the broker is so much more than a relationship site. But in the long run it makes solid business sense to have that one place you go for cloud services. For the first part the more customer’s the broker’s collect the more bargaining power they have. All Cloud Service Providers have tiered or discounted services models. If you have a lot of customers you most likely will be able to pass along the greatest discount.

Saving 10 to 15% overall on your cloud costs would certainly justify the 1-3% fee the broker would apply to providing that service. Plus the broker could off you so much more. Shared Security services would allow the broker to notify you of any and all attacks in the system regardless of which customer was being attacked. You get more information about attacks and the broker can provide additional security services that will ensure you don’t fall prey to the attack.

Brokers can even offer a simple transaction fee model. For most customer’s you will want the flat rate from your broker, but some smaller or less active organizations could consider a 1% per transaction fee from the broker to cover the cost and services the broker provides.

I think the more interesting statement now isn’t “Cloud Brokers aren’t real,” instead it is more along the lines of consider “who is saying brokers aren’t real.” In the long run smart cloud service providers will line up to sign up with a broker. It reduces their cost of sales and gives them a consistent and larger pool of customers. But in the short run most of them don’t like the broker model. They equate it to the 1990’s when we would book travel through a broker. They don’t like the concept of IT as a Commodity today. I suspect that will change.

My answer to the question “I don’t believe in cloud brokers” was in the end what you see above and ending with the simple statement “it was long believed that human beings were not physically capable of going faster than 35 miles per hour.

By Scott Anderson

Metasploit-Penetration-Testing-Software-Pen-Testing-Security
Vulnerability Scanners Cyber security vulnerabilities are a constant nuisance and it certainly doesn't help with the world in a current state of disarray and uncertainty. Vulnerabilities leave businesses and individuals subject to a wide range ...
Kelly Dyer
Achieving Data Security Compliance As individuals, we go through life sharing information about ourselves in every aspect of our daily existence. From credit checks for securing a loan, through to entire personal and family medical ...
The all-new Stellar Repair for MS SQL – an Efficient Tool to Fix SQL Database Corruption
Efficient Tool to Fix SQL Database Corruption SQL database corruption is not uncommon. There are many reasons for SQL database corruption, such as virus infection, bugs in the SQL Server, errors during updates, abrupt system ...
Sofia Jaramillo
Augmented Reality in Architecture Augmented reality (AR) is a growing field of study and application in the world of architecture. This useful tool can help us visualize architectural designs by superimposing them onto real-world scenes ...
Rakesh Soni
Multi-tenant clouds are becoming more popular than ever because they're incredibly cost effective and easy to set up. If you're considering switching your business over to a multi-tenant cloud platform, this article is for you ...

SECURITY TRAINING

  • Isc2

    ISC2

    (ISC)² provides IT training, certifications, and exams that run online, on your premises, or in classrooms. Self-study resources are available. You can also train groups of 10 or more of your employees. If you want a job in cybersecurity, this is the route to take.

  • App Academy

    App Academy

    Immersive software engineering programs. No experience required. Pay $0 until you're hired. Join an online info session to learn more

  • Cybrary

    Cybrary

    CYBRARY Open source Cyber Security learning. Free for everyone, forever. The world's largest cyber security community. Cybrary provides free IT training and paid IT certificates. Courses for beginners, intermediates, and advanced users are available.

  • Plural Site

    Pluralsite

    Pluralsight provides online courses on popular programming languages and developer tools. Other courses cover fields such as IT security best practices, server infrastructure, and virtualization.