News
1/9/2013
00:00 AM
Bill Kleyman
Bill Kleyman
Commentary
Connect Directly
Facebook
Twitter
LinkedIn
Google+
RSS
E-Mail
50%
50%

When Cloud Computing Is The Wrong Fit

ROI is the first question to answer when deciding if cloud computing is a good platform for your enterprise. Three others involve compliance, infrastructure, and a strong business case.

I’m a big fan of cloud computing and always enjoy seeing it done right. This means good planning, a solid infrastructure, and a use-case that directly fits what the cloud can deliver.

Today, almost every organization that uses the Internet is utilizing some element of cloud computing. The differentiator is the cloud model and the extent to which that model is deployed. In my experience there are instances where a particular cloud platform is a great fit. On the other hand, some companies absolutely do not need this type of solution.

One of the most important first steps to take when you are deciding whether or not to adopt a cloud platform is to establish a solid use-case that can generate ROI. From there, you should look at the investment your company will need to make. In some cases, migrating to the cloud just won’t make sense. Here are three examples.

1. Compliance and regulations
Unless you are planning a very secure private cloud solution, many cloud computing platforms will leverage some element of a public Internet infrastructure. This might mean sharing bandwidth or utilizing a datacenter to host your solution.

Think twice about the cloud if you’re in an industry heavily monitored by compliance rules and regulations. Only a handful of enterprise datacenters are able to manage PCI compliance for organizations that use them as hosts. Also, PCI compliance may come at a high cost. Remember to always take regulations into account prior to committing to a cloud provider.

2. Infrastructure
In some cases, the business plan is there, but the environment is not. A good cloud solution often means using pieces from storage, LAN/WAN, servers, virtualization, user control, and putting them all together. If some part isn’t there or something isn’t ready to handle this type of new load, there’s a good chance you’ll experience some performance degradation.

This situation is where analyzing ROI and the actual business investment is critical. Be sure to ask key questions like how much additional hardware will you need to buy and whether it actually makes sense to host infrastructure off site. What’s more, having infrastructure doesn’t only limit you to hardware. You also have to have the right people to support your cloud environment. This means employing engineers who are cloud-ready and managers who understand the vision of their cloud model.

3. Poor business-case
Developing a strong business case means identifying a set of challenges and finding a way to overcome problems with an intelligent piece of technology. Unfortunately, unexpected events can slow down the cloud migration process and cost companies a lot of money.

To avoid a cloud budget-buster, it’s important to develop a business-case that utilizes technology that will perform for current and future needs. That means that datacenter managers and architects have to consider how their business will evolve and be flexible and forward-thinking in developing a cloud strategy. For example, if administrators provision hardware that can’t support users after a year or so, it’s quite possible that the initial planning was flawed, and the results will be disastrous.

Like any technology, cloud computing starts with a well-conceived plan and an infrastructure that will endure. Processes like testing, maintenance, business continuity, and even personnel training are all very important to weigh when considering the pluses and minuses of migrating to the cloud. With the right model in place and a good infrastructure, the cloud can be a powerful platform to leverage. However, with the wrong mindset and a poorly planned deployment, a cloud model can quickly become a cash-drain.

This article originally appeared in The Transformed Datacenter on 1/9/2013.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
DevOps’ Impact on Application Security
DevOps’ Impact on Application Security
Managing the interdependency between software and infrastructure is a thorny challenge. Often, it’s a “developers are from Mars, systems engineers are from Venus” situation.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-4734
Published: 2014-07-21
Cross-site scripting (XSS) vulnerability in e107_admin/db.php in e107 2.0 alpha2 and earlier allows remote attackers to inject arbitrary web script or HTML via the type parameter.

CVE-2014-4960
Published: 2014-07-21
Multiple SQL injection vulnerabilities in models\gallery.php in Youtube Gallery (com_youtubegallery) component 4.x through 4.1.7, and possibly 3.x, for Joomla! allow remote attackers to execute arbitrary SQL commands via the (1) listid or (2) themeid parameter to index.php.

CVE-2014-5016
Published: 2014-07-21
Multiple cross-site scripting (XSS) vulnerabilities in LimeSurvey 2.05+ Build 140618 allow remote attackers to inject arbitrary web script or HTML via (1) the pid attribute to the getAttribute_json function to application/controllers/admin/participantsaction.php in CPDB, (2) the sa parameter to appl...

CVE-2014-5017
Published: 2014-07-21
SQL injection vulnerability in CPDB in application/controllers/admin/participantsaction.php in LimeSurvey 2.05+ Build 140618 allows remote attackers to execute arbitrary SQL commands via the sidx parameter in a JSON request to admin/participants/sa/getParticipants_json, related to a search parameter...

CVE-2014-5018
Published: 2014-07-21
Incomplete blacklist vulnerability in the autoEscape function in common_helper.php in LimeSurvey 2.05+ Build 140618 allows remote attackers to conduct cross-site scripting (XSS) attacks via the GBK charset in the loadname parameter to index.php, related to the survey resume.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Where do information security startups come from? More important, how can I tell a good one from a flash in the pan? Learn how to separate ITSec wheat from chaff in this episode.