SlideShare a Scribd company logo
1 of 11
Download to read offline
Application Ecosystem
Application ecosystems are growing in size, scope and complexity……
SaaS
Lift and shift
Rearchitect
Innovation
Shifting Landscape
‘Vendors are shifting their business models from on-
premises licensed software to public cloud-based
offerings, this trend will continue.’ - Gartner
Applications that are lifted and
shifted to the cloud can't take full
advantage of native cloud features -
may not be cost-effective.SaaSification
The SaaS Challenge
▪ Loss of Authority
▪ SaaS providers market direct to consumers
▪ Self selection – Consumerisation of IT
▪ Decentralised decision making
▪ Loss of Control
▪ Vendors define the architecture and deployment
▪ All that’s required is a browser and connectivity!
▪ Your data is managed by the vendor
▪ But IT retain Accountability
▪ Risk of security and regulatory infringement
▪ Fewer control points, reduced visibility
▪ Total dependence on many more vendors
Privacy Rectification Erasure Access Location
Is the data
adequately secured
and encrypted in
transit and at rest?
Who can access the
data, who stores
the data, can the
cloud provider
access it?
Is it easy to change
customer data on
request, do you
know where it is
located?
Can a customer’s data
be completely
deleted under your
control?
Is the data stored in
an approved
country with
adequate security and
privacy laws
Compliance
Can you prove that the SaaS applications your employees have
signed up to provide appropriate GDPR regulatory compliance ?
GDPR and SaaS
Criticality Threshold
Irreversibility Threshold
Discovery Rejection Withdrawn
Uncontrolled Adoption
Understanding Retirement
Unplanned Commitment
Adoption
Institutional
Lingering
Planned Commitment
Niche
Planned
Decline
Conscious
Uncoupling
Discovery Threshold
Cloud Adoption Lifecycle: Managed Adoption
Discovery: Evaluated by IT department as they test configurations, deployment, support processes
Understanding: Pilot with selected users who put the solution through it’s paces
Adoption: Controlled roll-out to departments and teams
Planned Commitment: In use across the organisation
Pilot
Rollout
Evaluation
Criticality Threshold
Irreversibility Threshold
Discovery Rejection Withdrawn
Uncontrolled Adoption
Understanding Retirement
Unplanned Commitment
Adoption
Institutional
Lingering
Planned Commitment
Niche
Planned
Decline
Conscious
Uncoupling
Discovery Threshold
Cloud Adoption Lifecycle: Viral Adoption
Discovery: Adopted by a single user, who immediately invites their colleagues to join
Uncontrolled Adoption: Makes the team’s life easier, they enthusiastically adopt it
Unplanned Commitment: Integral to the business, it’s impossible to imagine life without it
Network Effects
Viral Adoption
Independent Discovery
Take Back Control
Ampliphae Cloud Analytics Overview
Identify all the Cloud
Applications in use
within your
organisation.
Understand who uses
each application,
when, where and why.
Discovery
Highlight security,
regulatory and
commercial
considerations for
each Cloud
Application, and make
an appropriate
decision.
Governance
Block or optimise
access to individual
Cloud Applications.
Give your people the
information they need
to make informed
decisions.
Control
Continuously monitor
for new Cloud
Applications, and
audit cost and risk.
Cost and compliance
reporting
Audit Analyse
✓ Discover which applications your people are using
✓ Know where your data is stored
✓ Understand how secure it is and who can access it
✓ Govern and manage the vendors
✓ Control applications and activities in the Cloud
✓ Manage your risks and exposures
Deep insights into the
usage and adoption of
cloud applications.
Predict application
growth, identify
security threats and
anomalies
Cloud Application Discovery

More Related Content

What's hot

Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015Scalar Decisions
 
Cloud Performance Monitoring: Medtronic's CareLink(R) Cloud Application
Cloud Performance Monitoring: Medtronic's CareLink(R) Cloud ApplicationCloud Performance Monitoring: Medtronic's CareLink(R) Cloud Application
Cloud Performance Monitoring: Medtronic's CareLink(R) Cloud ApplicationKeynote Mobile Testing
 
Scalar cloud study2016_slideshare
Scalar cloud study2016_slideshareScalar cloud study2016_slideshare
Scalar cloud study2016_slideshareScalar Decisions
 
IT Service & Asset Management Better Together
IT Service & Asset Management Better TogetherIT Service & Asset Management Better Together
IT Service & Asset Management Better TogetherIvanti
 
Why You (& Your Enterprise) Should Care About Shadow Clouds
Why You (& Your Enterprise) Should Care About Shadow CloudsWhy You (& Your Enterprise) Should Care About Shadow Clouds
Why You (& Your Enterprise) Should Care About Shadow CloudsStave
 
Cloud Perspectives - Ottawa Seminar - Oct 6
Cloud Perspectives - Ottawa Seminar - Oct 6Cloud Perspectives - Ottawa Seminar - Oct 6
Cloud Perspectives - Ottawa Seminar - Oct 6Scalar Decisions
 
Secure Mobility with Analytics for the Private Cloud
Secure Mobility with Analytics for the Private CloudSecure Mobility with Analytics for the Private Cloud
Secure Mobility with Analytics for the Private CloudExtreme Networks
 
7 Best Practices to Protect Critical Business Information [Infographic]
7 Best Practices to Protect Critical Business Information [Infographic]7 Best Practices to Protect Critical Business Information [Infographic]
7 Best Practices to Protect Critical Business Information [Infographic]Citrix
 
Mobile Workspaces Go Where You Go [Infographic]
Mobile Workspaces Go Where You Go [Infographic]Mobile Workspaces Go Where You Go [Infographic]
Mobile Workspaces Go Where You Go [Infographic]Citrix
 
Modern Datacenter_FY14_FINAL
Modern Datacenter_FY14_FINALModern Datacenter_FY14_FINAL
Modern Datacenter_FY14_FINALJason Bowne
 
5 Steps to Gov IT Modernization
5 Steps to Gov IT Modernization5 Steps to Gov IT Modernization
5 Steps to Gov IT Modernizationscoopnewsgroup
 
Taming Your Hybrid Cloud - Doug Bourgeois
Taming Your Hybrid Cloud - Doug BourgeoisTaming Your Hybrid Cloud - Doug Bourgeois
Taming Your Hybrid Cloud - Doug Bourgeoisscoopnewsgroup
 
Future Proofing Your Mission - Samuel Gordy
Future Proofing Your Mission - Samuel GordyFuture Proofing Your Mission - Samuel Gordy
Future Proofing Your Mission - Samuel Gordyscoopnewsgroup
 
Implementing next generation mobile app strategies with Seqrite MDM
Implementing next generation mobile app strategies with Seqrite MDMImplementing next generation mobile app strategies with Seqrite MDM
Implementing next generation mobile app strategies with Seqrite MDMQuick Heal Technologies Ltd.
 
If You Are Not Embedding Analytics Into Your Day To Day Processes, You Are Do...
If You Are Not Embedding Analytics Into Your Day To Day Processes, You Are Do...If You Are Not Embedding Analytics Into Your Day To Day Processes, You Are Do...
If You Are Not Embedding Analytics Into Your Day To Day Processes, You Are Do...Dell World
 
The Future of Network Management
The Future of Network ManagementThe Future of Network Management
The Future of Network ManagementExtreme Networks
 
Voyss Cloud-Based Managed Services Webinar 9-14-12
 Voyss Cloud-Based Managed Services Webinar 9-14-12 Voyss Cloud-Based Managed Services Webinar 9-14-12
Voyss Cloud-Based Managed Services Webinar 9-14-12mjamesvoyss
 
Open Data Center Alliance 2014 Member Survey on Cloud Adoption
Open Data Center Alliance 2014 Member Survey on Cloud AdoptionOpen Data Center Alliance 2014 Member Survey on Cloud Adoption
Open Data Center Alliance 2014 Member Survey on Cloud AdoptionOpen Data Center Alliance
 

What's hot (20)

Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015
 
Cloud Performance Monitoring: Medtronic's CareLink(R) Cloud Application
Cloud Performance Monitoring: Medtronic's CareLink(R) Cloud ApplicationCloud Performance Monitoring: Medtronic's CareLink(R) Cloud Application
Cloud Performance Monitoring: Medtronic's CareLink(R) Cloud Application
 
Scalar cloud study2016_slideshare
Scalar cloud study2016_slideshareScalar cloud study2016_slideshare
Scalar cloud study2016_slideshare
 
IT Service & Asset Management Better Together
IT Service & Asset Management Better TogetherIT Service & Asset Management Better Together
IT Service & Asset Management Better Together
 
Why You (& Your Enterprise) Should Care About Shadow Clouds
Why You (& Your Enterprise) Should Care About Shadow CloudsWhy You (& Your Enterprise) Should Care About Shadow Clouds
Why You (& Your Enterprise) Should Care About Shadow Clouds
 
Cloud Perspectives - Ottawa Seminar - Oct 6
Cloud Perspectives - Ottawa Seminar - Oct 6Cloud Perspectives - Ottawa Seminar - Oct 6
Cloud Perspectives - Ottawa Seminar - Oct 6
 
Secure Mobility with Analytics for the Private Cloud
Secure Mobility with Analytics for the Private CloudSecure Mobility with Analytics for the Private Cloud
Secure Mobility with Analytics for the Private Cloud
 
7 Best Practices to Protect Critical Business Information [Infographic]
7 Best Practices to Protect Critical Business Information [Infographic]7 Best Practices to Protect Critical Business Information [Infographic]
7 Best Practices to Protect Critical Business Information [Infographic]
 
Mobile Workspaces Go Where You Go [Infographic]
Mobile Workspaces Go Where You Go [Infographic]Mobile Workspaces Go Where You Go [Infographic]
Mobile Workspaces Go Where You Go [Infographic]
 
Modern Datacenter_FY14_FINAL
Modern Datacenter_FY14_FINALModern Datacenter_FY14_FINAL
Modern Datacenter_FY14_FINAL
 
5 Steps to Gov IT Modernization
5 Steps to Gov IT Modernization5 Steps to Gov IT Modernization
5 Steps to Gov IT Modernization
 
Taming Your Hybrid Cloud - Doug Bourgeois
Taming Your Hybrid Cloud - Doug BourgeoisTaming Your Hybrid Cloud - Doug Bourgeois
Taming Your Hybrid Cloud - Doug Bourgeois
 
Future Proofing Your Mission - Samuel Gordy
Future Proofing Your Mission - Samuel GordyFuture Proofing Your Mission - Samuel Gordy
Future Proofing Your Mission - Samuel Gordy
 
Implementing next generation mobile app strategies with Seqrite MDM
Implementing next generation mobile app strategies with Seqrite MDMImplementing next generation mobile app strategies with Seqrite MDM
Implementing next generation mobile app strategies with Seqrite MDM
 
If You Are Not Embedding Analytics Into Your Day To Day Processes, You Are Do...
If You Are Not Embedding Analytics Into Your Day To Day Processes, You Are Do...If You Are Not Embedding Analytics Into Your Day To Day Processes, You Are Do...
If You Are Not Embedding Analytics Into Your Day To Day Processes, You Are Do...
 
The Future of Network Management
The Future of Network ManagementThe Future of Network Management
The Future of Network Management
 
Voyss Cloud-Based Managed Services Webinar 9-14-12
 Voyss Cloud-Based Managed Services Webinar 9-14-12 Voyss Cloud-Based Managed Services Webinar 9-14-12
Voyss Cloud-Based Managed Services Webinar 9-14-12
 
Cloud Adoption Trends
Cloud Adoption TrendsCloud Adoption Trends
Cloud Adoption Trends
 
6 aproaches
6 aproaches6 aproaches
6 aproaches
 
Open Data Center Alliance 2014 Member Survey on Cloud Adoption
Open Data Center Alliance 2014 Member Survey on Cloud AdoptionOpen Data Center Alliance 2014 Member Survey on Cloud Adoption
Open Data Center Alliance 2014 Member Survey on Cloud Adoption
 

Similar to Cloud Application Discovery

BATbern48_How Zero Trust can help your organisation keep safe.pdf
BATbern48_How Zero Trust can help your organisation keep safe.pdfBATbern48_How Zero Trust can help your organisation keep safe.pdf
BATbern48_How Zero Trust can help your organisation keep safe.pdfBATbern
 
Cloud App Security Customer Presentation.pdf
Cloud App Security Customer Presentation.pdfCloud App Security Customer Presentation.pdf
Cloud App Security Customer Presentation.pdfErikHof4
 
Blocking Viral SaaS Adoption is Blocking Innovation - Novosco & Amplipahe
Blocking Viral SaaS Adoption is Blocking Innovation - Novosco & AmplipaheBlocking Viral SaaS Adoption is Blocking Innovation - Novosco & Amplipahe
Blocking Viral SaaS Adoption is Blocking Innovation - Novosco & AmplipaheNovosco
 
Migrating to the Cloud - From Preparation to Operation copy.pdf
Migrating to the Cloud - From Preparation to Operation copy.pdfMigrating to the Cloud - From Preparation to Operation copy.pdf
Migrating to the Cloud - From Preparation to Operation copy.pdfSymptai Consulting Limited
 
How to Overcome Network Access Control Limitations for Better Network Security
How to Overcome Network Access Control Limitations for Better Network SecurityHow to Overcome Network Access Control Limitations for Better Network Security
How to Overcome Network Access Control Limitations for Better Network SecurityCryptzone
 
The System Administrator Role in the Cloud Era: Better Than Ever (ENT212) | A...
The System Administrator Role in the Cloud Era: Better Than Ever (ENT212) | A...The System Administrator Role in the Cloud Era: Better Than Ever (ENT212) | A...
The System Administrator Role in the Cloud Era: Better Than Ever (ENT212) | A...Amazon Web Services
 
Empired Convergence 2017 - Keeping Pace, Staying Safe in the Digital World
Empired Convergence 2017 - Keeping Pace, Staying Safe in the Digital WorldEmpired Convergence 2017 - Keeping Pace, Staying Safe in the Digital World
Empired Convergence 2017 - Keeping Pace, Staying Safe in the Digital WorldEmpired
 
Improve_Application_Availability_and_Performance_Sales_Crib_Sheet.pdf
Improve_Application_Availability_and_Performance_Sales_Crib_Sheet.pdfImprove_Application_Availability_and_Performance_Sales_Crib_Sheet.pdf
Improve_Application_Availability_and_Performance_Sales_Crib_Sheet.pdfمنیزہ ہاشمی
 
Moving Beyond Remote Access: Discover the Power of Zero Trust Network Access
Moving Beyond Remote Access: Discover the Power of Zero Trust Network AccessMoving Beyond Remote Access: Discover the Power of Zero Trust Network Access
Moving Beyond Remote Access: Discover the Power of Zero Trust Network AccessEnterprise Management Associates
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifySumana Mehta
 
Auditing in the Cloud
Auditing in the CloudAuditing in the Cloud
Auditing in the Cloudtcarrucan
 
How Zero Trust Changes Identity & Access
How Zero Trust Changes Identity & AccessHow Zero Trust Changes Identity & Access
How Zero Trust Changes Identity & AccessIvan Dwyer
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackThousandEyes
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackThousandEyes
 
Simplifying Security Management in the Virtual Data Center
Simplifying Security Management in the Virtual Data CenterSimplifying Security Management in the Virtual Data Center
Simplifying Security Management in the Virtual Data CenterAlgoSec
 
SAP Application Access with Instasafe Zero Trust
SAP Application Access with Instasafe Zero TrustSAP Application Access with Instasafe Zero Trust
SAP Application Access with Instasafe Zero TrustInstaSafe Technologies
 

Similar to Cloud Application Discovery (20)

BATbern48_How Zero Trust can help your organisation keep safe.pdf
BATbern48_How Zero Trust can help your organisation keep safe.pdfBATbern48_How Zero Trust can help your organisation keep safe.pdf
BATbern48_How Zero Trust can help your organisation keep safe.pdf
 
Cloud App Security Customer Presentation.pdf
Cloud App Security Customer Presentation.pdfCloud App Security Customer Presentation.pdf
Cloud App Security Customer Presentation.pdf
 
Blocking Viral SaaS Adoption is Blocking Innovation - Novosco & Amplipahe
Blocking Viral SaaS Adoption is Blocking Innovation - Novosco & AmplipaheBlocking Viral SaaS Adoption is Blocking Innovation - Novosco & Amplipahe
Blocking Viral SaaS Adoption is Blocking Innovation - Novosco & Amplipahe
 
Migrating to the Cloud - From Preparation to Operation copy.pdf
Migrating to the Cloud - From Preparation to Operation copy.pdfMigrating to the Cloud - From Preparation to Operation copy.pdf
Migrating to the Cloud - From Preparation to Operation copy.pdf
 
How to Overcome Network Access Control Limitations for Better Network Security
How to Overcome Network Access Control Limitations for Better Network SecurityHow to Overcome Network Access Control Limitations for Better Network Security
How to Overcome Network Access Control Limitations for Better Network Security
 
The System Administrator Role in the Cloud Era: Better Than Ever (ENT212) | A...
The System Administrator Role in the Cloud Era: Better Than Ever (ENT212) | A...The System Administrator Role in the Cloud Era: Better Than Ever (ENT212) | A...
The System Administrator Role in the Cloud Era: Better Than Ever (ENT212) | A...
 
Empired Convergence 2017 - Keeping Pace, Staying Safe in the Digital World
Empired Convergence 2017 - Keeping Pace, Staying Safe in the Digital WorldEmpired Convergence 2017 - Keeping Pace, Staying Safe in the Digital World
Empired Convergence 2017 - Keeping Pace, Staying Safe in the Digital World
 
Improve_Application_Availability_and_Performance_Sales_Crib_Sheet.pdf
Improve_Application_Availability_and_Performance_Sales_Crib_Sheet.pdfImprove_Application_Availability_and_Performance_Sales_Crib_Sheet.pdf
Improve_Application_Availability_and_Performance_Sales_Crib_Sheet.pdf
 
Moving Beyond Remote Access: Discover the Power of Zero Trust Network Access
Moving Beyond Remote Access: Discover the Power of Zero Trust Network AccessMoving Beyond Remote Access: Discover the Power of Zero Trust Network Access
Moving Beyond Remote Access: Discover the Power of Zero Trust Network Access
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
cloud Resilience
cloud Resilience cloud Resilience
cloud Resilience
 
Auditing in the Cloud
Auditing in the CloudAuditing in the Cloud
Auditing in the Cloud
 
How Zero Trust Changes Identity & Access
How Zero Trust Changes Identity & AccessHow Zero Trust Changes Identity & Access
How Zero Trust Changes Identity & Access
 
Zero Trust and Data Security
Zero Trust and Data SecurityZero Trust and Data Security
Zero Trust and Data Security
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT Stack
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT Stack
 
How it pros buy cloud servers
How it pros buy cloud serversHow it pros buy cloud servers
How it pros buy cloud servers
 
Simplifying Security Management in the Virtual Data Center
Simplifying Security Management in the Virtual Data CenterSimplifying Security Management in the Virtual Data Center
Simplifying Security Management in the Virtual Data Center
 
SAP Application Access with Instasafe Zero Trust
SAP Application Access with Instasafe Zero TrustSAP Application Access with Instasafe Zero Trust
SAP Application Access with Instasafe Zero Trust
 
Fy17 sec shadow_it-e_book_final_032417
Fy17 sec shadow_it-e_book_final_032417Fy17 sec shadow_it-e_book_final_032417
Fy17 sec shadow_it-e_book_final_032417
 

More from Novosco

Novosco Zero day protection webinar
Novosco Zero day protection webinarNovosco Zero day protection webinar
Novosco Zero day protection webinarNovosco
 
Novosco: Citrix tips and best practices
Novosco: Citrix tips and best practicesNovosco: Citrix tips and best practices
Novosco: Citrix tips and best practicesNovosco
 
Cloudy with a Chance of Failure - Novosco
Cloudy with a Chance of Failure - NovoscoCloudy with a Chance of Failure - Novosco
Cloudy with a Chance of Failure - NovoscoNovosco
 
Novosco Building IT Resilience Webinar
Novosco Building IT Resilience Webinar Novosco Building IT Resilience Webinar
Novosco Building IT Resilience Webinar Novosco
 
Lets talk data security
Lets talk data securityLets talk data security
Lets talk data securityNovosco
 
Let talk Citrix
Let talk CitrixLet talk Citrix
Let talk CitrixNovosco
 
Webinar: Lets talk Office 365
Webinar: Lets talk Office 365Webinar: Lets talk Office 365
Webinar: Lets talk Office 365Novosco
 
Software Defined Networking - Huawei, June 2017
Software Defined Networking - Huawei, June 2017Software Defined Networking - Huawei, June 2017
Software Defined Networking - Huawei, June 2017Novosco
 
VMware vSAN - Novosco, June 2017
VMware vSAN - Novosco, June 2017VMware vSAN - Novosco, June 2017
VMware vSAN - Novosco, June 2017Novosco
 
Network Security - Fortinet, Dublin June 2017
Network Security - Fortinet, Dublin June 2017Network Security - Fortinet, Dublin June 2017
Network Security - Fortinet, Dublin June 2017Novosco
 
Let's Talk Webinar - Disaster Recovery for Business
Let's Talk Webinar - Disaster Recovery for BusinessLet's Talk Webinar - Disaster Recovery for Business
Let's Talk Webinar - Disaster Recovery for BusinessNovosco
 
Novosco software defined storage webinar
Novosco software defined storage webinarNovosco software defined storage webinar
Novosco software defined storage webinarNovosco
 
Novosco ransomware webinar presentation
Novosco ransomware webinar presentationNovosco ransomware webinar presentation
Novosco ransomware webinar presentationNovosco
 
Prevention is not enough
Prevention is not enoughPrevention is not enough
Prevention is not enoughNovosco
 
The Trouble with Saas and Hybrid Cloud
The Trouble with Saas and Hybrid CloudThe Trouble with Saas and Hybrid Cloud
The Trouble with Saas and Hybrid CloudNovosco
 
Dell EMC Spanning
Dell EMC SpanningDell EMC Spanning
Dell EMC SpanningNovosco
 
Microsoft Azure
Microsoft AzureMicrosoft Azure
Microsoft AzureNovosco
 
Microsoft Office 365
Microsoft Office 365Microsoft Office 365
Microsoft Office 365Novosco
 
Novosco Hosted Skype for Business
Novosco Hosted Skype for BusinessNovosco Hosted Skype for Business
Novosco Hosted Skype for BusinessNovosco
 
Evolution of hybrid cloud
Evolution of hybrid cloudEvolution of hybrid cloud
Evolution of hybrid cloudNovosco
 

More from Novosco (20)

Novosco Zero day protection webinar
Novosco Zero day protection webinarNovosco Zero day protection webinar
Novosco Zero day protection webinar
 
Novosco: Citrix tips and best practices
Novosco: Citrix tips and best practicesNovosco: Citrix tips and best practices
Novosco: Citrix tips and best practices
 
Cloudy with a Chance of Failure - Novosco
Cloudy with a Chance of Failure - NovoscoCloudy with a Chance of Failure - Novosco
Cloudy with a Chance of Failure - Novosco
 
Novosco Building IT Resilience Webinar
Novosco Building IT Resilience Webinar Novosco Building IT Resilience Webinar
Novosco Building IT Resilience Webinar
 
Lets talk data security
Lets talk data securityLets talk data security
Lets talk data security
 
Let talk Citrix
Let talk CitrixLet talk Citrix
Let talk Citrix
 
Webinar: Lets talk Office 365
Webinar: Lets talk Office 365Webinar: Lets talk Office 365
Webinar: Lets talk Office 365
 
Software Defined Networking - Huawei, June 2017
Software Defined Networking - Huawei, June 2017Software Defined Networking - Huawei, June 2017
Software Defined Networking - Huawei, June 2017
 
VMware vSAN - Novosco, June 2017
VMware vSAN - Novosco, June 2017VMware vSAN - Novosco, June 2017
VMware vSAN - Novosco, June 2017
 
Network Security - Fortinet, Dublin June 2017
Network Security - Fortinet, Dublin June 2017Network Security - Fortinet, Dublin June 2017
Network Security - Fortinet, Dublin June 2017
 
Let's Talk Webinar - Disaster Recovery for Business
Let's Talk Webinar - Disaster Recovery for BusinessLet's Talk Webinar - Disaster Recovery for Business
Let's Talk Webinar - Disaster Recovery for Business
 
Novosco software defined storage webinar
Novosco software defined storage webinarNovosco software defined storage webinar
Novosco software defined storage webinar
 
Novosco ransomware webinar presentation
Novosco ransomware webinar presentationNovosco ransomware webinar presentation
Novosco ransomware webinar presentation
 
Prevention is not enough
Prevention is not enoughPrevention is not enough
Prevention is not enough
 
The Trouble with Saas and Hybrid Cloud
The Trouble with Saas and Hybrid CloudThe Trouble with Saas and Hybrid Cloud
The Trouble with Saas and Hybrid Cloud
 
Dell EMC Spanning
Dell EMC SpanningDell EMC Spanning
Dell EMC Spanning
 
Microsoft Azure
Microsoft AzureMicrosoft Azure
Microsoft Azure
 
Microsoft Office 365
Microsoft Office 365Microsoft Office 365
Microsoft Office 365
 
Novosco Hosted Skype for Business
Novosco Hosted Skype for BusinessNovosco Hosted Skype for Business
Novosco Hosted Skype for Business
 
Evolution of hybrid cloud
Evolution of hybrid cloudEvolution of hybrid cloud
Evolution of hybrid cloud
 

Recently uploaded

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 

Recently uploaded (20)

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

Cloud Application Discovery

  • 1.
  • 2. Application Ecosystem Application ecosystems are growing in size, scope and complexity…… SaaS
  • 3.
  • 4. Lift and shift Rearchitect Innovation Shifting Landscape ‘Vendors are shifting their business models from on- premises licensed software to public cloud-based offerings, this trend will continue.’ - Gartner Applications that are lifted and shifted to the cloud can't take full advantage of native cloud features - may not be cost-effective.SaaSification
  • 5. The SaaS Challenge ▪ Loss of Authority ▪ SaaS providers market direct to consumers ▪ Self selection – Consumerisation of IT ▪ Decentralised decision making ▪ Loss of Control ▪ Vendors define the architecture and deployment ▪ All that’s required is a browser and connectivity! ▪ Your data is managed by the vendor ▪ But IT retain Accountability ▪ Risk of security and regulatory infringement ▪ Fewer control points, reduced visibility ▪ Total dependence on many more vendors
  • 6. Privacy Rectification Erasure Access Location Is the data adequately secured and encrypted in transit and at rest? Who can access the data, who stores the data, can the cloud provider access it? Is it easy to change customer data on request, do you know where it is located? Can a customer’s data be completely deleted under your control? Is the data stored in an approved country with adequate security and privacy laws Compliance Can you prove that the SaaS applications your employees have signed up to provide appropriate GDPR regulatory compliance ? GDPR and SaaS
  • 7. Criticality Threshold Irreversibility Threshold Discovery Rejection Withdrawn Uncontrolled Adoption Understanding Retirement Unplanned Commitment Adoption Institutional Lingering Planned Commitment Niche Planned Decline Conscious Uncoupling Discovery Threshold Cloud Adoption Lifecycle: Managed Adoption Discovery: Evaluated by IT department as they test configurations, deployment, support processes Understanding: Pilot with selected users who put the solution through it’s paces Adoption: Controlled roll-out to departments and teams Planned Commitment: In use across the organisation Pilot Rollout Evaluation
  • 8. Criticality Threshold Irreversibility Threshold Discovery Rejection Withdrawn Uncontrolled Adoption Understanding Retirement Unplanned Commitment Adoption Institutional Lingering Planned Commitment Niche Planned Decline Conscious Uncoupling Discovery Threshold Cloud Adoption Lifecycle: Viral Adoption Discovery: Adopted by a single user, who immediately invites their colleagues to join Uncontrolled Adoption: Makes the team’s life easier, they enthusiastically adopt it Unplanned Commitment: Integral to the business, it’s impossible to imagine life without it Network Effects Viral Adoption Independent Discovery
  • 10. Ampliphae Cloud Analytics Overview Identify all the Cloud Applications in use within your organisation. Understand who uses each application, when, where and why. Discovery Highlight security, regulatory and commercial considerations for each Cloud Application, and make an appropriate decision. Governance Block or optimise access to individual Cloud Applications. Give your people the information they need to make informed decisions. Control Continuously monitor for new Cloud Applications, and audit cost and risk. Cost and compliance reporting Audit Analyse ✓ Discover which applications your people are using ✓ Know where your data is stored ✓ Understand how secure it is and who can access it ✓ Govern and manage the vendors ✓ Control applications and activities in the Cloud ✓ Manage your risks and exposures Deep insights into the usage and adoption of cloud applications. Predict application growth, identify security threats and anomalies