News
1/9/2013
00:00 AM
Bill Kleyman
Bill Kleyman
Commentary
Connect Directly
Facebook
Twitter
LinkedIn
Google+
RSS
E-Mail
50%
50%

When Cloud Computing Is The Wrong Fit

ROI is the first question to answer when deciding if cloud computing is a good platform for your enterprise. Three others involve compliance, infrastructure, and a strong business case.

I’m a big fan of cloud computing and always enjoy seeing it done right. This means good planning, a solid infrastructure, and a use-case that directly fits what the cloud can deliver.

Today, almost every organization that uses the Internet is utilizing some element of cloud computing. The differentiator is the cloud model and the extent to which that model is deployed. In my experience there are instances where a particular cloud platform is a great fit. On the other hand, some companies absolutely do not need this type of solution.

One of the most important first steps to take when you are deciding whether or not to adopt a cloud platform is to establish a solid use-case that can generate ROI. From there, you should look at the investment your company will need to make. In some cases, migrating to the cloud just won’t make sense. Here are three examples.

1. Compliance and regulations
Unless you are planning a very secure private cloud solution, many cloud computing platforms will leverage some element of a public Internet infrastructure. This might mean sharing bandwidth or utilizing a datacenter to host your solution.

Think twice about the cloud if you’re in an industry heavily monitored by compliance rules and regulations. Only a handful of enterprise datacenters are able to manage PCI compliance for organizations that use them as hosts. Also, PCI compliance may come at a high cost. Remember to always take regulations into account prior to committing to a cloud provider.

2. Infrastructure
In some cases, the business plan is there, but the environment is not. A good cloud solution often means using pieces from storage, LAN/WAN, servers, virtualization, user control, and putting them all together. If some part isn’t there or something isn’t ready to handle this type of new load, there’s a good chance you’ll experience some performance degradation.

This situation is where analyzing ROI and the actual business investment is critical. Be sure to ask key questions like how much additional hardware will you need to buy and whether it actually makes sense to host infrastructure off site. What’s more, having infrastructure doesn’t only limit you to hardware. You also have to have the right people to support your cloud environment. This means employing engineers who are cloud-ready and managers who understand the vision of their cloud model.

3. Poor business-case
Developing a strong business case means identifying a set of challenges and finding a way to overcome problems with an intelligent piece of technology. Unfortunately, unexpected events can slow down the cloud migration process and cost companies a lot of money.

To avoid a cloud budget-buster, it’s important to develop a business-case that utilizes technology that will perform for current and future needs. That means that datacenter managers and architects have to consider how their business will evolve and be flexible and forward-thinking in developing a cloud strategy. For example, if administrators provision hardware that can’t support users after a year or so, it’s quite possible that the initial planning was flawed, and the results will be disastrous.

Like any technology, cloud computing starts with a well-conceived plan and an infrastructure that will endure. Processes like testing, maintenance, business continuity, and even personnel training are all very important to weigh when considering the pluses and minuses of migrating to the cloud. With the right model in place and a good infrastructure, the cloud can be a powerful platform to leverage. However, with the wrong mindset and a poorly planned deployment, a cloud model can quickly become a cash-drain.

This article originally appeared in The Transformed Datacenter on 1/9/2013.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-2413
Published: 2014-10-20
Cross-site scripting (XSS) vulnerability in the ja_purity template for Joomla! 1.5.26 and earlier allows remote attackers to inject arbitrary web script or HTML via the Mod* cookie parameter to html/modules.php.

CVE-2012-5244
Published: 2014-10-20
Multiple SQL injection vulnerabilities in Banana Dance B.2.6 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) return, (2) display, (3) table, or (4) search parameter to functions/suggest.php; (5) the id parameter to functions/widgets.php, (6) the category parameter to...

CVE-2012-5694
Published: 2014-10-20
Multiple SQL injection vulnerabilities in Bulb Security Smartphone Pentest Framework (SPF) before 0.1.3 allow remote attackers to execute arbitrary SQL commands via the (1) agentPhNo, (2) controlPhNo, (3) agentURLPath, (4) agentControlKey, or (5) platformDD1 parameter to frameworkgui/attach2Agents.p...

CVE-2012-5695
Published: 2014-10-20
Multiple cross-site request forgery (CSRF) vulnerabilities in Bulb Security Smartphone Pentest Framework (SPF) 0.1.2 through 0.1.4 allow remote attackers to hijack the authentication of administrators for requests that conduct (1) shell metacharacter or (2) SQL injection attacks or (3) send an SMS m...

CVE-2012-5696
Published: 2014-10-20
Bulb Security Smartphone Pentest Framework (SPF) before 0.1.3 does not properly restrict access to frameworkgui/config, which allows remote attackers to obtain the plaintext database password via a direct request.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.