Allan Leinwand

Transparency on the web and the Lack Thereof

Cloud Transparency

The enterprise cloud is changing the way we do things from our day jobs, to social media, entertainment, and everyday interactions. While many of today’s enterprises are leading the way to complete digital transformation, one concern they often have is the lack of transparency of cloud computing.

It’s a fact that many cloud service providers do not offer customers visibility into their operating environments. Customers have no idea where their data resides physically or virtually, and are not given access to information about specific services or when those services will be upgraded. While this is generally accepted in the consumer world, the enterprise cannot tolerate this lack of visibility, access, and lack of control of their own data or the services that run the business.

The absence of transparency has led some enterprises to consider building private clouds in their own data centers. While this gives them the control and visibility they want, it also comes with a big price tag, not to mention security and operational issues. In the end, it’s not worth the time and resources, and it doesn’t allow the enterprise to take full advantage of the positive features of public cloud services.

On the flip side, public clouds provide many benefits for the enterprise including the ability to quickly launch services that change the way work gets done.

Some of these services include: 1) virtual machines for developers and quality engineers, 2) storage for backups, 3) desktop productivity applications such as email and calendaring and 4) IT, security, legal and customer service workflow applications. Of course, every enterprise wants all these services but unfortunately, the transparency and control that enterprises want is not there today in most public clouds.

In order to make the enterprise cloud the platform that drives all enterprise workflow, a compromise has to be made. Cloud service providers need to give their customers greater visibility and the control they are used to having in their own data centers. Customers should expect the following from their cloud service provider:

  • Choose where your data goes – One primary factor in achieving true visibility and control of data in a cloud service is that customers should be able to request and know where their service and data physically resides (i.e. datacenter locations). This knowledge will help customers overcome some of the fear and lack of confidence that can at times occur with the seemingly ominous idea of data floating around somewhere in “the cloud.”
  • Real availability – An additional element of customers achieving increased visibility of their data in the cloud is the level at which data availability and metrics are available. Instead of customers all being grouped together in large sets of data without the ability to distinguish one from another, availability should be achieved at the customer instance level. With availability at this granular level, customers can be presented with customized metrics specific to each of their instances, instead of a more generic set of metrics applying to a group of customers. This is real availability, and combined with knowledge of the physical location of data and services, customers can achieve true visibility into their data and have a significantly higher level of confidence and trust in the cloud service provider.
  • Deal with the issues – If there is an availability issue then customers should have access to the root cause incident with all the details. If the incident results in a problem that needs to be fixed in the service provider’s software or a change that needs to happen on the infrastructure, then this should remain transparent to the customer. Customers entrust their data to the cloud service provider, and in return they should expect an honest and realistic view into the service provider’s management of that data. When problems arise, they should not be invisible to the customer, the customer should be given information about the issues and insight into how the issues are being resolved.

CloudTweaks Comic

  • Granular transparency – In addition to remaining transparent when issues arise, service providers should also provide customers with a high level of transparency every day, with all transactions impacting a customer instance. Customers are used to running their own services, with the ability to monitor and see their data on a daily basis. As such, service providers should provide customers with the ability to view and download every transaction that is performed on their instance, and remove one of the main hurdles customers face in handing over data to a service provider on the cloud.
  • Full control – Whether it is for compliance, testing or user acceptance purposes, enterprises want complete control of their instances including when their service will be upgraded or when new features will be enabled. Customers should be able to have input on the date and time of upgrades as well as all aspects of the management of their instances. This moves beyond the visibility and availability of services and data and ensures that when services are being changed or updated, the customer has more than just transparency, they have control.

While it’s not a perfect system, cloud service providers are catching on that they need to build and operate a service similarly to how an enterprise runs their services, giving them full access to their data. This transparency will help enterprises have greater confidence in the cloud and will strengthen the relationship between provider and customer.

By Allan Leinwand

THOUGHT LEADERS

Ken Adamson Proficio

The Cloudification of Healthcare: Benefits and Risks

Cloud Healthcare: Benefits and Risks Many organizations are moving most of their business-critical applications and workloads to the cloud. The healthcare industry is no exception ...
Cloudtweaks Ai

Have You Heard of AI Washing? Meet the Latest Case: An AI Washing Machine!

Have You Heard of AI Washing? AI (Artificial Intelligence) Washing is the current attempt to imbue the latest, coolest buzz term into old school products ...
Evelyn Min

Why Information Security Need to be Empowered to Manage Data Breaches

Manage Data Breaches 2017 saw over 2 dozen major security breaches in 2017.  While the public may have grown numb to the number and constant stream ...
John

DIY AI! Build your own AI with kits from Google

Worried about the rise of the machines? Like doing things yourself? Now you can address both. Build your own AI with kits from Google. You ...
Mykola Konrad Headshot Edited

Online Communications Security: Whose Business Is It, Anyway?

Cloud Communications Security Don’t count on cloud providers to provide all your UCaaS security It’s official: Unified Communications-as-a-Service (UCaaS) has arrived as a mainstream technology, ...

SPONSOR PARTNERS