Dangers Of Betting On Hybrid Cloud

Hybrid cloud architectures are currently very popular as a way for enterprises to move to the cloud without abandoning their existing data centre investments.

At first glance, the strategy makes sense, but there’s a very real danger that the hybrid cloud’s popularity will turn out to be little more than a transitional stage, potentially distracting companies from optimising either their on-premise data centers or their migration to the cloud.

The many meanings of ‘hybrid cloud’

Making things more complicated, the term “hybrid cloud” can have a number of meanings, but at the root it covers any combination of traditional and cloud architectures.

That can mean anything from a traditional data center shop running a couple of non-strategic, standalone applications in the cloud to complex architectures with some core applications residing on-premise and others in various cloud implementations.

The deep technological knowledge needed to run a modern data center may not overlap much with the brokering and management expertise needed to successfully work with cloud vendors, especially in multi-cloud environments.

Of course, all this doesn’t mean there’s no place for the hybrid cloud. The approach is pretty much necessary during the transition from legacy data centers to the public cloud. And some enterprises will always need to maintain a foot in both camps. But there’s a risk that thinking of the hybrid cloud as some idealized end-state for your infrastructure and applications could end up leaving you with the worst of both worlds.

Hybrid cloud: The worst of both worlds?

On one hand, you have the expense and capital investment of operating your own data centers, but without the complete control of your data and processes that is one of the key benefits of on-premise technology stacks. On the other hand, you’ll have to deal with the complexity and potential of working with third-party cloud providers, without gaining much of the cloud’s promised benefit of freeing your team to focus on innovation instead infrastructure.

In many instances, enterprises might be better served over the long term by emphasising one area or the other. Companies that really want to move to the cloud would be well served to move as much as possible, if not all, of their data center activities to the cloud as soon as practical. But, if for whatever reason they’re not ready to fully commit to the public cloud for the next few years, there’s a strong argument for doubling down on running their own data centers, and using the cloud only for simple, completely separate applications.

What’s in a name?

Heck, they can still call their approach “hybrid cloud” if they want, while avoiding as much of the potential complications as possible. And then, at some later date, if and when they are ready to go all in on the cloud, the path could be simpler and more straightforward than trying to get there one step at a time.

Network World:

 

Microsoft Cloud Earnings Beat Expectations:

Keeping The Cloud Safe: Exclusive Report:

 

« FBI Take Down Dark Web Drugs Traders
Who Is Responsible for Cloud Security? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Frazer-Nash Consultancy

Frazer-Nash Consultancy

Frazer-Nash is a leading engineering, systems and technology company. Areas of expertise include information security and cyber security.

Maureen Data Systems (MDS)

Maureen Data Systems (MDS)

Our mission at Maureen Data Systems is to digitally transform business environments with the use of cloud infrastructure, security and privacy controls, data analytics, and managed services.

Cyber Risk Policies

Cyber Risk Policies

CyberRiskPolicy.com is a joint venture between the Poindexter Surety Group of companies and Gibbs Cyber Security.

DCIT

DCIT

DCIT is a specialist in providing comprehensive consulting and auditing services in the field of information technology, PROVYS development software and security system AuditSquare.

National Center for Manufacturing Sciences (NCMS)

National Center for Manufacturing Sciences (NCMS)

NCMS is a cross-industry technology development consortium, dedicated to improving the competitiveness of the US industrial base. Strategic initiatives include industrial cyber security.

Ellipsis Technologies

Ellipsis Technologies

Ellipsis Technologies is a diversified technology company that develops innovative security software for websites and online applications.

MaskTech

MaskTech

MaskTech supplies highest security embedded chipsets, operating systems and related middleware for electronic identification cards, travel documents and authentication solutions.

Cyber Security Challenge UK

Cyber Security Challenge UK

Cyber Security Challenge UK is a series of national competitions, learning programmes, and networking initiatives designed to identify, inspire and enable more people to become cybersec professionals.

u-blox

u-blox

u-blox deliver leading wireless technology to reliably and securely locate and connect people and devices.

EPIC Insurance Brokers & Consultants

EPIC Insurance Brokers & Consultants

EPIC is an insuarnce broker and consultancy firm. Risk management services include risk consultancy and cybersecurity insurance.

Enet 1 Group1

Enet 1 Group1

Enet 1 Group audits, assesses, recommends, and delivers tested solutions for the ever-increasing threats to your critical systems and digital assets

689cloud

689cloud

689Cloud is a cloud content collaboration platform that allows users to protect, track, and control files AFTER they have been shared.

OnSecurity

OnSecurity

OnSecurity replaces the overhead of traditional penetration testing firms with a simple online interface, making it easy to book tests as and when needed.

CyberXpert

CyberXpert

CyberXpert is your cybersecurity partner for the public and private sector in Belgium.

TetherView

TetherView

TetherView provides leading virtual desktop and email security technology to help businesses stand up and manage digital workspaces.

Fingerprints

Fingerprints

Fingerprints is the world-leading biometrics company. Our solutions are found in millions of devices providing safe and convenient identification and authentication with a human touch.