Multicloud - The Next Step In Cloud Computing

We live in a world where we like to name things. In the case of cloud computing, the names revolve around patterns of use: public cloud, private cloud, and hybrid cloud.

Now there’s a new term, Multicloud, for an emerging pattern of use for cloud computing.

Terms and Definitions

Multicloud means using more than a single public cloud. That usage pattern arose when enterprises tried to avoid dependence on a single public cloud provider, when they chose specific services from each public cloud to get the best of each, or when they wanted both benefits.

Defined: Multicloud vs. Hybrid Cloud

So, how does Multicloud relate to hybrid cloud? Some people use them interchangeably, but they do have distinct meanings.

A hybrid cloud is the pairing of a private cloud (an on-premises datacenter built on cloud technologies) and a public cloud.

If you use multiple public clouds with a private cloud, that is still a Multicloud.

Pragmatic Hybrid Cloud defined

There’s also a beast called a pragmatic hybrid cloud, which is the pairing of a traditional enterprise datacenter with a public cloud; these exist because many enterprises have been disappointed with private clouds and so sought a way to combine what they already had with the public cloud.

By contrast, a Multicloud architecture uses two or more public clouds.

What’s behind the Multicloud trend

As a trend, cloud computing is getting more complex. The vision a few years ago was of placing workloads on a single cloud, whether public or private. But then the hybrid cloud architecture became a more attractive option because it gave enterprises more choice.

Enterprise IT wanted that choice because both Google and Microsoft developed compelling pubic cloud platforms, providing alternatives to Amazon Web Services, which had started the public cloud business. Other enterprise providers, including IBM, HP Enterprise, and more recently Oracle, jumped into the fray as well, though with considerably less success.

Because these are all viable public cloud options, enterprises began to mix them together, both through formal architectural processes and through “shadow IT,” where groups in companies that used a public cloud without the knowledge of enterprise IT. Various shadow IT efforts often picked different public clouds and then wanted those cloud operations to be managed by enterprise IT.

No matter how you got there, most enterprises now manage a Multicloud infrastructure.

Although many IT organisations simply manage these complex Multicloud environments using the native tools and services from each cloud, a few are getting smart and abstracting themselves away from the complexity.

By using tools such as cloud management platforms (CMPs) and cloud service brokers (CSBs), enterprises can manage multiple clouds as if they were a single cloud. However, the trade-off is that you can only use a subset of features from each cloud; that is, take the “least common denominator” approach.

Advice: Focus on what cloud technologies do, not what they are called. Public cloud, private cloud, hybrid cloud, pragmatic hybrid cloud, Multicloud: semantic overload? Indeed.

Infoworld:

You Might Also Read:

In The House Or In The Cloud: Which Is More Secure?:

Cyber Security Risks Of Cloud Computing:

« What is Big Data? - Everything You Need To Know
Nuclear Missiles Are Not N.Korea’s Only Threat »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Wisegate

Wisegate

Wisegate is a community of IT experts providing advisory services on all areas of IT including security.

MIIS Cyber Initiative

MIIS Cyber Initiative

The Cyber Initiative's mission is to assess the impact of the information age on security, peace and communications.

Promon

Promon

Promon is an application security vendor providing Self-Protection abilities to Mobile apps and Desktop applications.

SERMA Safety & Security (S3)

SERMA Safety & Security (S3)

SERMA Safety & Security provides a comprehensive cybersecurity offering incorporating Expertise, Evaluation, Consultancy and Training, covering hardware, software and information systems.

NetDiligence

NetDiligence

NetDiligence is a privately-held cyber risk assessment and data breach services company.

Golden Frog

Golden Frog

Golden Frog is a Virtual Private Network services provider offering secure encrypted access to the internet.

Cog Systems

Cog Systems

Cog Systems offer an embedded solution built on modularity, proactive security, trustworthiness, and adaptability to enable highly secure connected devices.

CYE

CYE

Utilizing data, numbers, and facts, CYE helps security leaders know what business assets are at risk and execute cost-effective remediation projects for optimal risk prevention.

BetaDen

BetaDen

BetaDen provides a revolutionary platform for businesses to develop next-generation technology, such as the internet of things and industry 4.0.

Lewis Brisbois

Lewis Brisbois

Lewis Brisbois offers legal practice in more than 40 specialties, and a multitude of sub-specialties including Data Privacy & Cybersecurity.

Police CyberAlarm

Police CyberAlarm

Police CyberAlarm is a free tool to help members understand and monitor malicious cyber activity. This service is made up of two parts; monitoring and vulnerability scanning.

Fluid Attacks

Fluid Attacks

Fluid Attacks specialize in red team operations as well as technology development that continuously enhance our security testing services.

Kirk ISS

Kirk ISS

Kirk ISS are the leading provider of IT services in the Cayman Islands. We offer best-in class hardware, software, communications and cloud computing, all backed by professional services support.

ASRC Federal

ASRC Federal

ASRC Federal’s mission is to help federal civilian, intelligence and defense agencies achieve successful outcomes and elevate their mission performance.

ExactTrak

ExactTrak

ExactTrak provide embedded cyber security solutions for your digital devices – whenever and wherever you need them.

Cyber Grant

Cyber Grant

Cyber Grant excel in designing cybersecurity solutions for data protection. Our approach and vision, centered on ease-of-use, establish us as a benchmark in the industry for safeguarding information.