Dangers Of Betting On Hybrid Cloud

Hybrid cloud architectures are currently very popular as a way for enterprises to move to the cloud without abandoning their existing data centre investments.

At first glance, the strategy makes sense, but there’s a very real danger that the hybrid cloud’s popularity will turn out to be little more than a transitional stage, potentially distracting companies from optimising either their on-premise data centers or their migration to the cloud.

The many meanings of ‘hybrid cloud’

Making things more complicated, the term “hybrid cloud” can have a number of meanings, but at the root it covers any combination of traditional and cloud architectures.

That can mean anything from a traditional data center shop running a couple of non-strategic, standalone applications in the cloud to complex architectures with some core applications residing on-premise and others in various cloud implementations.

The deep technological knowledge needed to run a modern data center may not overlap much with the brokering and management expertise needed to successfully work with cloud vendors, especially in multi-cloud environments.

Of course, all this doesn’t mean there’s no place for the hybrid cloud. The approach is pretty much necessary during the transition from legacy data centers to the public cloud. And some enterprises will always need to maintain a foot in both camps. But there’s a risk that thinking of the hybrid cloud as some idealized end-state for your infrastructure and applications could end up leaving you with the worst of both worlds.

Hybrid cloud: The worst of both worlds?

On one hand, you have the expense and capital investment of operating your own data centers, but without the complete control of your data and processes that is one of the key benefits of on-premise technology stacks. On the other hand, you’ll have to deal with the complexity and potential of working with third-party cloud providers, without gaining much of the cloud’s promised benefit of freeing your team to focus on innovation instead infrastructure.

In many instances, enterprises might be better served over the long term by emphasising one area or the other. Companies that really want to move to the cloud would be well served to move as much as possible, if not all, of their data center activities to the cloud as soon as practical. But, if for whatever reason they’re not ready to fully commit to the public cloud for the next few years, there’s a strong argument for doubling down on running their own data centers, and using the cloud only for simple, completely separate applications.

What’s in a name?

Heck, they can still call their approach “hybrid cloud” if they want, while avoiding as much of the potential complications as possible. And then, at some later date, if and when they are ready to go all in on the cloud, the path could be simpler and more straightforward than trying to get there one step at a time.

Network World:

 

Microsoft Cloud Earnings Beat Expectations:

Keeping The Cloud Safe: Exclusive Report:

 

« FBI Take Down Dark Web Drugs Traders
Who Is Responsible for Cloud Security? »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Information Security Systems (ISSCOM)

Information Security Systems (ISSCOM)

ISSCOM provide services to help companies implement Information Security Management Systems (ISMS) by providing consultancy and hands-on assistance.

Logz.io

Logz.io

Logz.io is an AI-powered log analysis platform that offers the open source ELK Stack as a enterprise-grade cloud service with machine learning technology.

Ubiq Security

Ubiq Security

Ubiq has developed a software solution that secures any type of data, on any device, anywhere, with nearly no impact to system performance or user experience.

BeDefended

BeDefended

BeDefended is an Italian company operating in IT Security and specialized in Cloud and Application Security with years of experience in penetration testing, consulting, training, and research.

STM

STM

STM provides system engineering, technical support, project management, technology transfer and logistics support services for the Turkish Armed Forces.

Johnson Controls International

Johnson Controls International

Johnson Controls is a global diversified technology company with a focus on smart cities, energy, infrastructure and transportation including the security of automation and control systems.

European Society of Criminology (ESC)

European Society of Criminology (ESC)

The ESC Working Group on Cybercrime is focused on cybercrime, its causes and offenders, impact on victims, and our response to it at the individual, corporate, and governmental levels.

Carve Systems

Carve Systems

Carve Systems was founded to bring enterprise level information security, training, and risk management services to organizations of any size and industry.

Sygnia

Sygnia

Sygnia is a cyber technology and services company, providing high-end consulting and incident response support for organizations worldwide.

r00tz Asylum

r00tz Asylum

r00tz Asylum is a nonprofit dedicated to teaching kids around the world how to love being white-hat hackers.

Support Link Technologies (SLT)

Support Link Technologies (SLT)

Support Link Technologies are an IT Solutions Company committed to achieving customer satisfaction through excellent customer service.

iSPIRAL IT Solutions

iSPIRAL IT Solutions

iSPIRAL is a leading regulatory technology software provider delivering state-of-art AML, KYC, Risk and Compliance solutions.

Suffescom Solutions

Suffescom Solutions

Suffescom Solutions is a leading blockchain development company, assisting businesses in harnessing the true potential of blockchain technology.

Cloudbrink

Cloudbrink

Cloudbrink is purpose-built to deliver the industry’s highest performance connectivity to remote and hybrid workers, anywhere in the world.

Pulsar Security

Pulsar Security

Pulsar Security is a team of highly skilled, offensive cybersecurity professionals with the industry's most esteemed credentials and advanced real-world experience.

CHERI Alliance

CHERI Alliance

CHERI Alliance is an industry initiative spearheading the global adoption of the Capability Hardware Enhanced RISC Instructions (CHERI) security technology across the computing industry.