Moving to Cloud computing is harder, costlier than originally envisioned
- 05 February, 2013 11:58
A substantial number of businesses say Cloud computing security challenges are daunting and the costs higher than they originally thought they would be, according to the Cloud Survey report published to by consultancy KPMG International.
The study indicates that one-half of the 650 respondents said their organizations already make use of the Cloud for business processes. Two of the main reasons given for moving to cloud-based services were to make it easier to enter new markets and drives process transformation. But one-third said the cost of moving to the cloud were higher than expected, mainly because they belatedly discovered that it involved more changes in their existing business and IT architectures than they'd originally recognized.
The problems they encountered included failure to address changes that were needed in business-process redesign, IT management capabilities, systems integration, infrastructure and various IT "configurations" involved in the transition process, the report notes. Many indicated their misconceptions about what adopting cloud-based services would mean arose due to vendor "hype" and confusion.
For one-quarter of the companies that participated in the survey, the security-related challenges were seen as "extensive" and in general an area where business executives and IT needed to work more closely together to create a cloud-security strategy. However, according to the report, regulation itself did not appear to be a major hindrance to cloud adoption in many cases.
Ellen Messmer is senior editor at Network World, an IDG publication and website, where she covers news and technology trends related to information security. Twitter: @MessmerE. Email: firstname.lastname@example.org.
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Trust issue looms large for tech companies capitalizing on personal data
5 women who've made it in IT
Five trends affecting legal CIOs
CIO Roundtable: The changing face of security
Bitcoin malware count soars as cryptocurrency value climbs
Case Study: Columbia Sportswear
With the agility and intelligence provided by their management tools, Columbia sportswear is transforming IT to be much more service oriented in fulfilling business requests and delivering resources as needed. It’s allowing IT to “never say no” with an infrastructure that can handle nearly any project that comes through the door.
Implementing an Effective Vulnerability Management Program
Your company's information is often not secured in a large safe which can be easily protected. Instead, information is spread across many systems, networks and devices exposing it to a higher possibility of it being compromised in some way. This paper discusses the challenges of vulnerability management - human, implementation, changes, and software and how to overcome these by implementing an effective vulnerability management program.
Bell Gully Law Firm Success
Read this whitepaper to find out how one of New Zealand’s oldest leading law firms was able to remove tangible risk to the business and enhance productivity by rapidly deploying an improved fundamental Unified Communication solution.