SlideShare a Scribd company logo
1 of 5
Download to read offline
CLOUD COMPUTING: A FUTURE PREROGATIVE
Businesses are constantly looking for ways to improve efficiencies,
avoiding unnecessary costs; doing more with less, and ultimately
improve the bottom line. Stakeholders on the other hand are
becoming more impatient and expectations are forever increasing.
The business competitive environment is becoming fiercer and
revenue growth is becoming a difficult hurdle to achieve during these
trying times. As the business environment evolves and businesses
attempt to adapt, dependency on technology has become more and
more important. Technology has become an integral part of decision
making initiatives and both business and government have realised
that investment into information technology has become a necessity.
Failure to move quickly could spell long term economic difficulties
and declining profitability. In this business world of constant change
and resource limitation, how best do businesses adapt from a
technology perspective? Is cloud computing a possible answer?
What is Cloud Computing?
Cloud computing in simple terms can be defined as a big pool of
shared resources including hardware, software and other services
that can be accessed in the “cloud” whenever necessary. It is a
technology that is internet based and used as a mechanism for
accessing computer facilities. For application and IT users cloud
computing is the provision of applications, storage and computing
services over the internet from centralized databases; for application
developers it is a software development platform and for
administrators and IT infrastructure providers it is data centre
infrastructure. Cloud computing is seen and used in different ways all
with the aim of benefitting IT efficacies.
Cloud computing may be hosted in different ways depending on the
need: Main cloud computing deployment models include:
Deployment Model Description
Public Cloud The cloud infrastructure is made available to the general
public or a large industry group and is owned by a cloud
service provider, which sells these cloud services.
Private Cloud The cloud infrastructure is operated solely for a single cloud
service consumer enterprise. It may be managed by the
enterprise or a third party and may exist on or off the
consumer premises.
Community Cloud The cloud infrastructure is shared by several cloud service
consumer enterprises and supports a specific community that
has shared concerns (e.g. mission, security requirements,
policy, compliance considerations etc.). It may be managed
by the enterprises or a third party and may exist on or off the
community premises.
Hybrid Cloud The cloud infrastructure is a composition of two or more
clouds (private, community or public) that remain unique
entities, but are bound together by standardised or propriety
technology that enables data and application portability.
2
Cloud providers have different service models focusing on one type
of functionality provisioning. These may include:
Service Model Description Benefits
Cloud infrastructure as a
Service
(IaaS)
The IT capability is that of
processing, storage, network and
other computer hardware-related
capabilities. The consumer can run
their own software (including
operating systems) on the computer
hardware-related capability.
Lower IT
infrastructure,
administrative and
maintenance costs.
Cloud platform as a
Service
(PaaS)
The IT capability provided is that of a
computing platform on which to run
the software of the consumer, which
was created using the programming
languages and protocols supported
by the specific platform.
Cost reduction,
especially in ensuring
security, and
scalability.
Cloud software as a
Service
(SaaS
The IT capability provided is that of
software applications for use by the
consumer. The software would be
run on cloud infrastructure (either
that of the SaaS provider or possibly
that of another IaaS and/or PaaS
provider), and be accessible by
means of a network accessing
device.
Low initiating costs,
painless upgrades,
seamless integration,
and easy
customization and
managed service-level
agreements.
These type of setups will have huge implications on cost structures
of those organizations using hardware and software as a key driver
to their business strategy. Similarly to the way electricity is
consumed, in Cloud computing we pay for what is consumed.
Is Cloud Computing becoming a Global Phenomenon
Tremendous growth in technology poses enormous challenges on
companies if they intend being relevant and competitive. They have
to continuously incur huge financial outlays on the latest technology
trends. As a result, companies are attracted to the concept of cloud
computing where upfront costs are minimal and access to IT
resources are not limited. The value proposition of cloud computing
is that organizations do not have to make huge upfront investments
for computer infrastructure, hardware, software and training. Instead,
organizations can use the resources provided by a cloud computing
service provider who would also take care of IT downtime and
support. The cloud computing model will transform the IT industry in
the next few years as it has experienced phenomenal growth and
remains attractive and cost efficient to small and medium sized firms.
IT Outsourcing verses Cloud Computing
Typically, IT outsourcing assist management with the offloading of
legacy systems that may be outdated and allows management to
focus on their key strategic initiatives. The benefits of IT outsourcing
include lower costs, higher performance assurance and quality,
professional and geographically dispersed services and creative and
structured leases to suite the client. Organizations would normally
outsource their IT function if the benefits outweigh the risks. IT
outsourcing and cloud computing has numerous similarities but also
have differences that may or may not be valuable to the client.
3
Typical similarities include reduced costs, global scale, risk
minimization and quick time to market. However, notable differences
include:
 High upfront costs regarding IT outsourcing as compared to cloud
computing where no or minimal upfront costs are needed;
 Services are not necessary on demand in IT outsourcing whereas
cloud computing delivery structures are based on demand
services;
 Cost is more transparent when it comes to cloud computing
whereas there tend to be lots of hidden costs in IT outsourcing.
Although similarities may not really cause clients to change; the
differences play a huge role on how buying decisions for IT
infrastructure and related resources are made within organizations.
Risks
The process of managing a secure cloud space can be more
challenging than creating a secure classical IT environment. The
main risks of adopting cloud computing are:
 Misunderstanding responsibilities – in a traditional IT scenario
the security of data is entirely the burden of the company;
however, in a cloud computing setup the responsibilities are
divided between both the cloud provider and the client depending
on the cloud services adopted.
 Data security and confidentiality issues – the biggest security
concerns with companies moving to cloud computing relates to
data security and confidentiality. In particular, concerns arise
around the data security lifecycle e.g. creation, storing,
accessing, modifying and transferring of data.
 Lack of standards – the immaturity of this technology makes it
difficult to develop comprehensive and commonly accepted set
of standards. The excitement around cloud has created a flurry
of standards and open source activity for different aspects of
cloud computing thereby leading to market confusion.
 Interoperability issues – when companies decide to move their
services to another cloud service provider for whatever reasons,
the lack of interoperability between service providers may block
or raise heavy obstacles to such a process.
 Reliability breakdowns – the availability of services for cloud
clients can be severely impacted if connectivity problems arise or
if a service provider goes out of business.
 Hacking and intrusion risks – security risks pose major threats
in a cloud environment
 Malicious insider – information confidentiality, integrity and/or
availability can be compromised by a cloud service provider’s
employee who has reasons or is motivated to create a bad
impression on the service provider.
4
Benefits of Cloud Computing
 Saves money and time; it is efficient and collaborative;
 Faster and more reliable than traditional IT;
 It facilitates the sharing of applications, networks, software and
other IT related resources;
 Businesses are able to scale up without any major upfront IT
infrastructure costs;
 Scalability, simplicity and cost efficiencies; and
 Enhancement of competitiveness.
Developing a holistic cyber cloud strategy
The following considerations of assessment areas should be
embarked upon when selecting an appropriate Cloud Service
Provider:
 Organizational security – The vendor must have adequate
information system governance procedures specified in the
service level agreements.
 Effective security controls – The service provider must outline
how data would be stored and retained and the existing security
should be highlighted to ensure data integrity and confidentiality.
The security policies should be comprehensive and included in
the service level agreement.
 Access control – Vendors must have ways to detect
unauthorized activities and provide security for remote access of
data.
 Legal implications – Discussions around the legal obligations
in terms of storing data offshore in other countries should be
carried out with the vendor if the organization has branches in
other countries or if the vendor stores the data in other
countries.
 Exit clause – One of the common mistakes organizations make
are to ignore the “exit clause” when evaluating service
providers. In the event of failure of the cloud, steps need to be
highlighted at how to regain ownership and control of data.
 Vendor lock-in – Organizations should be weary of lock-in
clauses of service providers. In the event of lock-in clauses or
service provider closures, data import and data moving
becomes more difficult and business clients can face serious
repercussions for data migration.
Typical questions to ask before signing a Service Level Agreement:
 Do 3rd
party applications which the cloud provider access to
support business applications have access to client’s sensitive
data?
 Is there any system testing and audit trial strategy?
 Are patch management strategies defined and in place?
 What security training is provided to the employees?
 In case of data and power outages do the Service Provider have
appropriate backup strategies?
 What is the staff hiring policy? i.e. vetting procedures.
 What is the appropriate reimbursement cost in case of data loss
or damage? i.e. time scales, data retrieval process.
 What is the level of certification achieved in terms of quality and
security compliance?
 What are your management and reporting policies?
5
Conclusion
Cloud computing is a technology that has the potential of changing
the way organizations do business in the future. As a result of its
sudden emergence, a large amount of research ranging from opinion
pieces on technical details, cloud computing advantages and
disadvantages, cloud computing risks as well as opinion pieces on
the potential impact of cloud computing on business, have been
written. With all the benefits and advantages that cloud computing
brings, it would probably make business sense to adopt this new
technology. However, before moving over to this new IT innovation,
companies need to understand the risks and value it would bring to
the organization in order to make an informed decision.
Cloud computing generally have different advantages uniquely suited
for different organizations but requires organizations to delft into the
concept of cloud computing so as to gain an appropriate
understanding in order for them to appropriately identify the exact
benefits. Organizations should clearly understand their reasoning for
moving to cloud computing in order to maximize the opportunity.
It is difficult to read business or information technology magazines or
articles without coming across the concept of cloud computing. The
current sluggish economic environment will force organizations to
consider cloud computing as an alternative as it will soon change the
way business is approached. It will force organizations to relook at
their IT strategies and the way they embark on their IT spend.
Although this new IT paradigm comes with risks and challenges,
there is a strong indication by experts that advantages and benefits
far outweighs the risks. Even though the understanding of cloud
computing may be limited, it is clear that top management need to
further educate themselves on the topic and will need to re-strategize
on ways of creating efficiencies, cost savings and business value.
Wayne Poggenpoel
Wayne is currently at the Human Science Research Council (HSRC) within the Enterprise Risk
Management Unit as the Compliance and Business Analysis Manager. His current responsibilities
include regulatory compliance for the entire organization as well providing various business intelligence
information in pursue of company strategy. Prior to the amalgamation of the Africa Institute of SA
(AISA) and HSRC, Wayne headed up the internal audit function of AISA, responsible for all internal
audit related responsibilities.
Wayne has Master’s Degree in Internal Audit coupled with a National and National Higher Diploma in
Internal Auditing as well as with international certifications in internal audit, control self-assessments
and government auditing (CIA, CCSA, CGAP). He has in excess of 17 years internal audit, risk
management and management consulting experience which crosses both private and public sectors. He
is a current member of the Technical Committee of the IIASA as well as a Member of an Audit
Committee Cluster of Gauteng Treasury responsible for the Departments of Agriculture, Human
Settlements, Infrastructure and Development, Roads and Transport and Cooperative Governance and
Traditional Affairs. Wayne has presented on various topics including internal audit at several
conferences and forums and have written articles for different magazines including the IIA Advisor.

More Related Content

What's hot

Manage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usageManage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usageCitrix
 
Comparing traditional workspaces to digital workspaces
Comparing traditional workspaces to digital workspacesComparing traditional workspaces to digital workspaces
Comparing traditional workspaces to digital workspacesCitrix
 
How Secure Is Cloud
How Secure Is CloudHow Secure Is Cloud
How Secure Is CloudWilliam Lam
 
Dispelling the Vapour around Cloud for Financial services
Dispelling the Vapour around Cloud for Financial servicesDispelling the Vapour around Cloud for Financial services
Dispelling the Vapour around Cloud for Financial servicesIBM India Smarter Computing
 
The data center impact of cloud, analytics, mobile, social and security rlw03...
The data center impact of cloud, analytics, mobile, social and security rlw03...The data center impact of cloud, analytics, mobile, social and security rlw03...
The data center impact of cloud, analytics, mobile, social and security rlw03...Diego Alberto Tamayo
 
Vendor classification & rating
Vendor classification & ratingVendor classification & rating
Vendor classification & ratingAmit Puri
 
Risk management for cloud computing hb final
Risk management for cloud computing hb finalRisk management for cloud computing hb final
Risk management for cloud computing hb finalChristophe Monnier
 
Migrating apps-to-the-cloud-final
Migrating apps-to-the-cloud-finalMigrating apps-to-the-cloud-final
Migrating apps-to-the-cloud-finaleng999
 
The Future of Convergence Paper
The Future of Convergence PaperThe Future of Convergence Paper
The Future of Convergence PaperHitachi Vantara
 
Barriers to government cloud adoption
Barriers to government cloud adoptionBarriers to government cloud adoption
Barriers to government cloud adoptionIJMIT JOURNAL
 
Cloud Adoption in Capital Markets: A Perspective
Cloud Adoption in Capital Markets: A PerspectiveCloud Adoption in Capital Markets: A Perspective
Cloud Adoption in Capital Markets: A PerspectiveCognizant
 
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009 Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009 EuroCloud
 
IDC: Selecting the Optimal Path to Private Cloud
IDC: Selecting the Optimal Path to Private CloudIDC: Selecting the Optimal Path to Private Cloud
IDC: Selecting the Optimal Path to Private CloudEMC
 
On-premises, consumption-based private cloud creates opportunity for enterpri...
On-premises, consumption-based private cloud creates opportunity for enterpri...On-premises, consumption-based private cloud creates opportunity for enterpri...
On-premises, consumption-based private cloud creates opportunity for enterpri...Stanton Jones
 
Hybrid Cloud - Key Benefits & Must Have Requirements
Hybrid Cloud - Key Benefits & Must Have RequirementsHybrid Cloud - Key Benefits & Must Have Requirements
Hybrid Cloud - Key Benefits & Must Have RequirementsJamcracker Inc
 
Securing a mobile oriented enterprise
Securing a mobile oriented enterpriseSecuring a mobile oriented enterprise
Securing a mobile oriented enterpriseinfra-si
 

What's hot (20)

What the future holds for the hybrid cloud
What the future holds for the hybrid cloudWhat the future holds for the hybrid cloud
What the future holds for the hybrid cloud
 
Manage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usageManage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usage
 
Comparing traditional workspaces to digital workspaces
Comparing traditional workspaces to digital workspacesComparing traditional workspaces to digital workspaces
Comparing traditional workspaces to digital workspaces
 
How Secure Is Cloud
How Secure Is CloudHow Secure Is Cloud
How Secure Is Cloud
 
Dispelling the Vapour around Cloud for Financial services
Dispelling the Vapour around Cloud for Financial servicesDispelling the Vapour around Cloud for Financial services
Dispelling the Vapour around Cloud for Financial services
 
The data center impact of cloud, analytics, mobile, social and security rlw03...
The data center impact of cloud, analytics, mobile, social and security rlw03...The data center impact of cloud, analytics, mobile, social and security rlw03...
The data center impact of cloud, analytics, mobile, social and security rlw03...
 
Vendor classification & rating
Vendor classification & ratingVendor classification & rating
Vendor classification & rating
 
Risk management for cloud computing hb final
Risk management for cloud computing hb finalRisk management for cloud computing hb final
Risk management for cloud computing hb final
 
Migrating apps-to-the-cloud-final
Migrating apps-to-the-cloud-finalMigrating apps-to-the-cloud-final
Migrating apps-to-the-cloud-final
 
J3602068071
J3602068071J3602068071
J3602068071
 
The Future of Convergence Paper
The Future of Convergence PaperThe Future of Convergence Paper
The Future of Convergence Paper
 
Barriers to government cloud adoption
Barriers to government cloud adoptionBarriers to government cloud adoption
Barriers to government cloud adoption
 
Cloud Adoption in Capital Markets: A Perspective
Cloud Adoption in Capital Markets: A PerspectiveCloud Adoption in Capital Markets: A Perspective
Cloud Adoption in Capital Markets: A Perspective
 
Cloud
CloudCloud
Cloud
 
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009 Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
 
IDC: Selecting the Optimal Path to Private Cloud
IDC: Selecting the Optimal Path to Private CloudIDC: Selecting the Optimal Path to Private Cloud
IDC: Selecting the Optimal Path to Private Cloud
 
On-premises, consumption-based private cloud creates opportunity for enterpri...
On-premises, consumption-based private cloud creates opportunity for enterpri...On-premises, consumption-based private cloud creates opportunity for enterpri...
On-premises, consumption-based private cloud creates opportunity for enterpri...
 
Hybrid Cloud - Key Benefits & Must Have Requirements
Hybrid Cloud - Key Benefits & Must Have RequirementsHybrid Cloud - Key Benefits & Must Have Requirements
Hybrid Cloud - Key Benefits & Must Have Requirements
 
Cloud Brokering Brochure
Cloud Brokering BrochureCloud Brokering Brochure
Cloud Brokering Brochure
 
Securing a mobile oriented enterprise
Securing a mobile oriented enterpriseSecuring a mobile oriented enterprise
Securing a mobile oriented enterprise
 

Viewers also liked

Academic Corruption and Misconduct
Academic Corruption and MisconductAcademic Corruption and Misconduct
Academic Corruption and MisconductWayne Poggenpoel
 
randmap.enchant.js github公開
randmap.enchant.js github公開randmap.enchant.js github公開
randmap.enchant.js github公開shizuru123
 
randmap.enchant.jsの紹介
randmap.enchant.jsの紹介randmap.enchant.jsの紹介
randmap.enchant.jsの紹介shizuru123
 
Visual cv gaurav sharma
Visual cv gaurav sharmaVisual cv gaurav sharma
Visual cv gaurav sharmaKhalil Khan
 
Micro-Financing Innovation or Curse
Micro-Financing Innovation or CurseMicro-Financing Innovation or Curse
Micro-Financing Innovation or CurseWayne Poggenpoel
 
Mech ci cadd presentation r19
Mech ci cadd presentation r19Mech ci cadd presentation r19
Mech ci cadd presentation r19trgmechci
 
Quality Assurance and Technical IA
Quality Assurance and Technical IAQuality Assurance and Technical IA
Quality Assurance and Technical IAWayne Poggenpoel
 

Viewers also liked (15)

Academic Corruption and Misconduct
Academic Corruption and MisconductAcademic Corruption and Misconduct
Academic Corruption and Misconduct
 
Town p.3
Town p.3Town p.3
Town p.3
 
randmap.enchant.js github公開
randmap.enchant.js github公開randmap.enchant.js github公開
randmap.enchant.js github公開
 
Elevating IA
Elevating IAElevating IA
Elevating IA
 
randmap.enchant.jsの紹介
randmap.enchant.jsの紹介randmap.enchant.jsの紹介
randmap.enchant.jsの紹介
 
Rishu
RishuRishu
Rishu
 
Visual cv gaurav sharma
Visual cv gaurav sharmaVisual cv gaurav sharma
Visual cv gaurav sharma
 
Infarto
InfartoInfarto
Infarto
 
Micro-Financing Innovation or Curse
Micro-Financing Innovation or CurseMicro-Financing Innovation or Curse
Micro-Financing Innovation or Curse
 
Cost Cutting Strategies
Cost Cutting StrategiesCost Cutting Strategies
Cost Cutting Strategies
 
Mech ci cadd presentation r19
Mech ci cadd presentation r19Mech ci cadd presentation r19
Mech ci cadd presentation r19
 
Quality Assurance and Technical IA
Quality Assurance and Technical IAQuality Assurance and Technical IA
Quality Assurance and Technical IA
 
Blogueros d
Blogueros dBlogueros d
Blogueros d
 
Recommendation Letter
Recommendation LetterRecommendation Letter
Recommendation Letter
 
Weblogging by Iranian Librarians
Weblogging by Iranian Librarians Weblogging by Iranian Librarians
Weblogging by Iranian Librarians
 

Similar to Cloud Computing - A future prerogative

New Era in Insurance - Cloud Computing
New Era in Insurance - Cloud ComputingNew Era in Insurance - Cloud Computing
New Era in Insurance - Cloud ComputingNIIT Technologies
 
Cloud computing Paper
Cloud computing Paper Cloud computing Paper
Cloud computing Paper Assem mousa
 
Cloud migration risks and challenges
Cloud migration risks and challengesCloud migration risks and challenges
Cloud migration risks and challengesPolestarsolutions
 
Cloud Computing – The Best Form of IT Delivery
Cloud Computing – The Best Form of IT DeliveryCloud Computing – The Best Form of IT Delivery
Cloud Computing – The Best Form of IT DeliverySoftweb Solutions
 
Cloud computing-overview
Cloud computing-overviewCloud computing-overview
Cloud computing-overviewshraddhaudage
 
Overcoming Operational & Financial Barriers to Cloud
Overcoming Operational & Financial Barriers to CloudOvercoming Operational & Financial Barriers to Cloud
Overcoming Operational & Financial Barriers to CloudTrustmarque
 
Cloud computing _ key the Ultimate future
Cloud computing _ key the Ultimate futureCloud computing _ key the Ultimate future
Cloud computing _ key the Ultimate futuredailytimeupdate.com
 
Migrating enterprise applications to cloud
Migrating enterprise applications to cloudMigrating enterprise applications to cloud
Migrating enterprise applications to cloudSougata Mitra
 
The cloud promises
The cloud promisesThe cloud promises
The cloud promisesGrand Crue
 
Cloud Myths and Realities: The Truth About Moving to the Cloud
Cloud Myths and Realities: The Truth About Moving to the CloudCloud Myths and Realities: The Truth About Moving to the Cloud
Cloud Myths and Realities: The Truth About Moving to the CloudEmbotics Corp.
 
Transforming an organization to cloud
Transforming an organization to cloud Transforming an organization to cloud
Transforming an organization to cloud Ali Akbar
 
EMC Perspective: What Customers Seek from Cloud Services Providers
EMC Perspective: What Customers Seek from Cloud Services ProvidersEMC Perspective: What Customers Seek from Cloud Services Providers
EMC Perspective: What Customers Seek from Cloud Services ProvidersEMC
 
Cloud computing in Thailand
Cloud computing in ThailandCloud computing in Thailand
Cloud computing in ThailandValiente Veera
 

Similar to Cloud Computing - A future prerogative (20)

New Era in Insurance - Cloud Computing
New Era in Insurance - Cloud ComputingNew Era in Insurance - Cloud Computing
New Era in Insurance - Cloud Computing
 
Cloud
CloudCloud
Cloud
 
Dynamic network services whitepaper external final
Dynamic network services whitepaper external finalDynamic network services whitepaper external final
Dynamic network services whitepaper external final
 
Cloud computing Paper
Cloud computing Paper Cloud computing Paper
Cloud computing Paper
 
Cloud migration risks and challenges
Cloud migration risks and challengesCloud migration risks and challenges
Cloud migration risks and challenges
 
Cloud Computing – The Best Form of IT Delivery
Cloud Computing – The Best Form of IT DeliveryCloud Computing – The Best Form of IT Delivery
Cloud Computing – The Best Form of IT Delivery
 
Cloud computing-overview
Cloud computing-overviewCloud computing-overview
Cloud computing-overview
 
Cloud Computing Overview | Torry Harris Whitepaper
Cloud Computing Overview | Torry Harris WhitepaperCloud Computing Overview | Torry Harris Whitepaper
Cloud Computing Overview | Torry Harris Whitepaper
 
Overcoming Operational & Financial Barriers to Cloud
Overcoming Operational & Financial Barriers to CloudOvercoming Operational & Financial Barriers to Cloud
Overcoming Operational & Financial Barriers to Cloud
 
Cloud computing _ key the Ultimate future
Cloud computing _ key the Ultimate futureCloud computing _ key the Ultimate future
Cloud computing _ key the Ultimate future
 
Migrating enterprise applications to cloud
Migrating enterprise applications to cloudMigrating enterprise applications to cloud
Migrating enterprise applications to cloud
 
The cloud promises
The cloud promisesThe cloud promises
The cloud promises
 
Cloud Myths and Realities: The Truth About Moving to the Cloud
Cloud Myths and Realities: The Truth About Moving to the CloudCloud Myths and Realities: The Truth About Moving to the Cloud
Cloud Myths and Realities: The Truth About Moving to the Cloud
 
Transforming an organization to cloud
Transforming an organization to cloud Transforming an organization to cloud
Transforming an organization to cloud
 
EMC Perspective: What Customers Seek from Cloud Services Providers
EMC Perspective: What Customers Seek from Cloud Services ProvidersEMC Perspective: What Customers Seek from Cloud Services Providers
EMC Perspective: What Customers Seek from Cloud Services Providers
 
Cloud Computing Improving Organizational Agility
Cloud Computing Improving Organizational AgilityCloud Computing Improving Organizational Agility
Cloud Computing Improving Organizational Agility
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud computing in Thailand
Cloud computing in ThailandCloud computing in Thailand
Cloud computing in Thailand
 
ETCA_5
ETCA_5ETCA_5
ETCA_5
 
Chapter 1.pdf
Chapter 1.pdfChapter 1.pdf
Chapter 1.pdf
 

Cloud Computing - A future prerogative

  • 1. CLOUD COMPUTING: A FUTURE PREROGATIVE Businesses are constantly looking for ways to improve efficiencies, avoiding unnecessary costs; doing more with less, and ultimately improve the bottom line. Stakeholders on the other hand are becoming more impatient and expectations are forever increasing. The business competitive environment is becoming fiercer and revenue growth is becoming a difficult hurdle to achieve during these trying times. As the business environment evolves and businesses attempt to adapt, dependency on technology has become more and more important. Technology has become an integral part of decision making initiatives and both business and government have realised that investment into information technology has become a necessity. Failure to move quickly could spell long term economic difficulties and declining profitability. In this business world of constant change and resource limitation, how best do businesses adapt from a technology perspective? Is cloud computing a possible answer? What is Cloud Computing? Cloud computing in simple terms can be defined as a big pool of shared resources including hardware, software and other services that can be accessed in the “cloud” whenever necessary. It is a technology that is internet based and used as a mechanism for accessing computer facilities. For application and IT users cloud computing is the provision of applications, storage and computing services over the internet from centralized databases; for application developers it is a software development platform and for administrators and IT infrastructure providers it is data centre infrastructure. Cloud computing is seen and used in different ways all with the aim of benefitting IT efficacies. Cloud computing may be hosted in different ways depending on the need: Main cloud computing deployment models include: Deployment Model Description Public Cloud The cloud infrastructure is made available to the general public or a large industry group and is owned by a cloud service provider, which sells these cloud services. Private Cloud The cloud infrastructure is operated solely for a single cloud service consumer enterprise. It may be managed by the enterprise or a third party and may exist on or off the consumer premises. Community Cloud The cloud infrastructure is shared by several cloud service consumer enterprises and supports a specific community that has shared concerns (e.g. mission, security requirements, policy, compliance considerations etc.). It may be managed by the enterprises or a third party and may exist on or off the community premises. Hybrid Cloud The cloud infrastructure is a composition of two or more clouds (private, community or public) that remain unique entities, but are bound together by standardised or propriety technology that enables data and application portability.
  • 2. 2 Cloud providers have different service models focusing on one type of functionality provisioning. These may include: Service Model Description Benefits Cloud infrastructure as a Service (IaaS) The IT capability is that of processing, storage, network and other computer hardware-related capabilities. The consumer can run their own software (including operating systems) on the computer hardware-related capability. Lower IT infrastructure, administrative and maintenance costs. Cloud platform as a Service (PaaS) The IT capability provided is that of a computing platform on which to run the software of the consumer, which was created using the programming languages and protocols supported by the specific platform. Cost reduction, especially in ensuring security, and scalability. Cloud software as a Service (SaaS The IT capability provided is that of software applications for use by the consumer. The software would be run on cloud infrastructure (either that of the SaaS provider or possibly that of another IaaS and/or PaaS provider), and be accessible by means of a network accessing device. Low initiating costs, painless upgrades, seamless integration, and easy customization and managed service-level agreements. These type of setups will have huge implications on cost structures of those organizations using hardware and software as a key driver to their business strategy. Similarly to the way electricity is consumed, in Cloud computing we pay for what is consumed. Is Cloud Computing becoming a Global Phenomenon Tremendous growth in technology poses enormous challenges on companies if they intend being relevant and competitive. They have to continuously incur huge financial outlays on the latest technology trends. As a result, companies are attracted to the concept of cloud computing where upfront costs are minimal and access to IT resources are not limited. The value proposition of cloud computing is that organizations do not have to make huge upfront investments for computer infrastructure, hardware, software and training. Instead, organizations can use the resources provided by a cloud computing service provider who would also take care of IT downtime and support. The cloud computing model will transform the IT industry in the next few years as it has experienced phenomenal growth and remains attractive and cost efficient to small and medium sized firms. IT Outsourcing verses Cloud Computing Typically, IT outsourcing assist management with the offloading of legacy systems that may be outdated and allows management to focus on their key strategic initiatives. The benefits of IT outsourcing include lower costs, higher performance assurance and quality, professional and geographically dispersed services and creative and structured leases to suite the client. Organizations would normally outsource their IT function if the benefits outweigh the risks. IT outsourcing and cloud computing has numerous similarities but also have differences that may or may not be valuable to the client.
  • 3. 3 Typical similarities include reduced costs, global scale, risk minimization and quick time to market. However, notable differences include:  High upfront costs regarding IT outsourcing as compared to cloud computing where no or minimal upfront costs are needed;  Services are not necessary on demand in IT outsourcing whereas cloud computing delivery structures are based on demand services;  Cost is more transparent when it comes to cloud computing whereas there tend to be lots of hidden costs in IT outsourcing. Although similarities may not really cause clients to change; the differences play a huge role on how buying decisions for IT infrastructure and related resources are made within organizations. Risks The process of managing a secure cloud space can be more challenging than creating a secure classical IT environment. The main risks of adopting cloud computing are:  Misunderstanding responsibilities – in a traditional IT scenario the security of data is entirely the burden of the company; however, in a cloud computing setup the responsibilities are divided between both the cloud provider and the client depending on the cloud services adopted.  Data security and confidentiality issues – the biggest security concerns with companies moving to cloud computing relates to data security and confidentiality. In particular, concerns arise around the data security lifecycle e.g. creation, storing, accessing, modifying and transferring of data.  Lack of standards – the immaturity of this technology makes it difficult to develop comprehensive and commonly accepted set of standards. The excitement around cloud has created a flurry of standards and open source activity for different aspects of cloud computing thereby leading to market confusion.  Interoperability issues – when companies decide to move their services to another cloud service provider for whatever reasons, the lack of interoperability between service providers may block or raise heavy obstacles to such a process.  Reliability breakdowns – the availability of services for cloud clients can be severely impacted if connectivity problems arise or if a service provider goes out of business.  Hacking and intrusion risks – security risks pose major threats in a cloud environment  Malicious insider – information confidentiality, integrity and/or availability can be compromised by a cloud service provider’s employee who has reasons or is motivated to create a bad impression on the service provider.
  • 4. 4 Benefits of Cloud Computing  Saves money and time; it is efficient and collaborative;  Faster and more reliable than traditional IT;  It facilitates the sharing of applications, networks, software and other IT related resources;  Businesses are able to scale up without any major upfront IT infrastructure costs;  Scalability, simplicity and cost efficiencies; and  Enhancement of competitiveness. Developing a holistic cyber cloud strategy The following considerations of assessment areas should be embarked upon when selecting an appropriate Cloud Service Provider:  Organizational security – The vendor must have adequate information system governance procedures specified in the service level agreements.  Effective security controls – The service provider must outline how data would be stored and retained and the existing security should be highlighted to ensure data integrity and confidentiality. The security policies should be comprehensive and included in the service level agreement.  Access control – Vendors must have ways to detect unauthorized activities and provide security for remote access of data.  Legal implications – Discussions around the legal obligations in terms of storing data offshore in other countries should be carried out with the vendor if the organization has branches in other countries or if the vendor stores the data in other countries.  Exit clause – One of the common mistakes organizations make are to ignore the “exit clause” when evaluating service providers. In the event of failure of the cloud, steps need to be highlighted at how to regain ownership and control of data.  Vendor lock-in – Organizations should be weary of lock-in clauses of service providers. In the event of lock-in clauses or service provider closures, data import and data moving becomes more difficult and business clients can face serious repercussions for data migration. Typical questions to ask before signing a Service Level Agreement:  Do 3rd party applications which the cloud provider access to support business applications have access to client’s sensitive data?  Is there any system testing and audit trial strategy?  Are patch management strategies defined and in place?  What security training is provided to the employees?  In case of data and power outages do the Service Provider have appropriate backup strategies?  What is the staff hiring policy? i.e. vetting procedures.  What is the appropriate reimbursement cost in case of data loss or damage? i.e. time scales, data retrieval process.  What is the level of certification achieved in terms of quality and security compliance?  What are your management and reporting policies?
  • 5. 5 Conclusion Cloud computing is a technology that has the potential of changing the way organizations do business in the future. As a result of its sudden emergence, a large amount of research ranging from opinion pieces on technical details, cloud computing advantages and disadvantages, cloud computing risks as well as opinion pieces on the potential impact of cloud computing on business, have been written. With all the benefits and advantages that cloud computing brings, it would probably make business sense to adopt this new technology. However, before moving over to this new IT innovation, companies need to understand the risks and value it would bring to the organization in order to make an informed decision. Cloud computing generally have different advantages uniquely suited for different organizations but requires organizations to delft into the concept of cloud computing so as to gain an appropriate understanding in order for them to appropriately identify the exact benefits. Organizations should clearly understand their reasoning for moving to cloud computing in order to maximize the opportunity. It is difficult to read business or information technology magazines or articles without coming across the concept of cloud computing. The current sluggish economic environment will force organizations to consider cloud computing as an alternative as it will soon change the way business is approached. It will force organizations to relook at their IT strategies and the way they embark on their IT spend. Although this new IT paradigm comes with risks and challenges, there is a strong indication by experts that advantages and benefits far outweighs the risks. Even though the understanding of cloud computing may be limited, it is clear that top management need to further educate themselves on the topic and will need to re-strategize on ways of creating efficiencies, cost savings and business value. Wayne Poggenpoel Wayne is currently at the Human Science Research Council (HSRC) within the Enterprise Risk Management Unit as the Compliance and Business Analysis Manager. His current responsibilities include regulatory compliance for the entire organization as well providing various business intelligence information in pursue of company strategy. Prior to the amalgamation of the Africa Institute of SA (AISA) and HSRC, Wayne headed up the internal audit function of AISA, responsible for all internal audit related responsibilities. Wayne has Master’s Degree in Internal Audit coupled with a National and National Higher Diploma in Internal Auditing as well as with international certifications in internal audit, control self-assessments and government auditing (CIA, CCSA, CGAP). He has in excess of 17 years internal audit, risk management and management consulting experience which crosses both private and public sectors. He is a current member of the Technical Committee of the IIASA as well as a Member of an Audit Committee Cluster of Gauteng Treasury responsible for the Departments of Agriculture, Human Settlements, Infrastructure and Development, Roads and Transport and Cooperative Governance and Traditional Affairs. Wayne has presented on various topics including internal audit at several conferences and forums and have written articles for different magazines including the IIA Advisor.