Multicloud - The Next Step In Cloud Computing

We live in a world where we like to name things. In the case of cloud computing, the names revolve around patterns of use: public cloud, private cloud, and hybrid cloud.

Now there’s a new term, Multicloud, for an emerging pattern of use for cloud computing.

Terms and Definitions

Multicloud means using more than a single public cloud. That usage pattern arose when enterprises tried to avoid dependence on a single public cloud provider, when they chose specific services from each public cloud to get the best of each, or when they wanted both benefits.

Defined: Multicloud vs. Hybrid Cloud

So, how does Multicloud relate to hybrid cloud? Some people use them interchangeably, but they do have distinct meanings.

A hybrid cloud is the pairing of a private cloud (an on-premises datacenter built on cloud technologies) and a public cloud.

If you use multiple public clouds with a private cloud, that is still a Multicloud.

Pragmatic Hybrid Cloud defined

There’s also a beast called a pragmatic hybrid cloud, which is the pairing of a traditional enterprise datacenter with a public cloud; these exist because many enterprises have been disappointed with private clouds and so sought a way to combine what they already had with the public cloud.

By contrast, a Multicloud architecture uses two or more public clouds.

What’s behind the Multicloud trend

As a trend, cloud computing is getting more complex. The vision a few years ago was of placing workloads on a single cloud, whether public or private. But then the hybrid cloud architecture became a more attractive option because it gave enterprises more choice.

Enterprise IT wanted that choice because both Google and Microsoft developed compelling pubic cloud platforms, providing alternatives to Amazon Web Services, which had started the public cloud business. Other enterprise providers, including IBM, HP Enterprise, and more recently Oracle, jumped into the fray as well, though with considerably less success.

Because these are all viable public cloud options, enterprises began to mix them together, both through formal architectural processes and through “shadow IT,” where groups in companies that used a public cloud without the knowledge of enterprise IT. Various shadow IT efforts often picked different public clouds and then wanted those cloud operations to be managed by enterprise IT.

No matter how you got there, most enterprises now manage a Multicloud infrastructure.

Although many IT organisations simply manage these complex Multicloud environments using the native tools and services from each cloud, a few are getting smart and abstracting themselves away from the complexity.

By using tools such as cloud management platforms (CMPs) and cloud service brokers (CSBs), enterprises can manage multiple clouds as if they were a single cloud. However, the trade-off is that you can only use a subset of features from each cloud; that is, take the “least common denominator” approach.

Advice: Focus on what cloud technologies do, not what they are called. Public cloud, private cloud, hybrid cloud, pragmatic hybrid cloud, Multicloud: semantic overload? Indeed.

Infoworld:

You Might Also Read:

In The House Or In The Cloud: Which Is More Secure?:

Cyber Security Risks Of Cloud Computing:

« What is Big Data? - Everything You Need To Know
Nuclear Missiles Are Not N.Korea’s Only Threat »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Black Hat Briefings

Black Hat Briefings

The Black Hat Briefings are a series of highly technical information security conferences that bring together thought leaders from all facets of the infosec world.

Tevora

Tevora

Tevora is a specialized management consultancy focused on cyber security, risk, and compliance services.

ThreatSTOP

ThreatSTOP

ThreatSTOP is a cloud-based automated threat intelligence platform that converts the latest threat data into enforcement policies to stop attacks before they become breaches.

Pentest People

Pentest People

Pentest People are a UK-based security consultancy focussing on bringing the benefits of Pentesting as a Service (PTaaS) to all its clients.

NETRIO

NETRIO

If you are looking for a highly mature, exceptionally competent Managed Service Provider, NETRIO has solutions to keep your business running at warp speed with zero disruptions.

Edgile

Edgile

Edgile is the trusted cyber risk and regulatory compliance partner to the world’s leading organizations, providing consulting, managed services, and harmonized regulatory content.

Debevoise & Plimpton

Debevoise & Plimpton

Debevoise & Plimpton LLP is a premier law firm with market-leading practices in areas including Data Strategy & Security.

NXM Labs

NXM Labs

NXM is a leader in a leader in advanced cybersecurity software for connected devices.

Otava

Otava

Otava is a global leader of secure, compliant hybrid cloud and IT solutions for service providers, channel partners and enterprise clients.

Protelion

Protelion

The Protelion Security Platform is uniquely architected to deliver security solutions that combine greater protection, flexibility, and performance.

SE Ventures

SE Ventures

SE Ventures provides capital to big ideas and bold entrepreneurs who can benefit from Schneider Electric's deep domain expertise, R&D assets, and global customer base.

Casepoint

Casepoint

Casepoint is the legal technology platform of choice for corporations, government agencies, and law firms to meet their complex eDiscovery, investigations, and compliance needs.

Opal Security

Opal Security

Opal is an identity and access management platform that offers a consolidated view and control of your whole ecosystem from on-prem to cloud and SaaS.

Attestiv

Attestiv

Attestiv puts authenticity into photos, videos and documents by utilizing advanced technologies in AI and tamper-proofing.

Standard Notes

Standard Notes

Standard Notes is a secure digital notes app that protects your notes and files with audited, industry-leading end-to-end encryption.

Scalarr

Scalarr

Scalarr is an innovative, next-generation cyber security firm focused on automation and AI to detect and prevent threats in mobile and Edge/IoT infrastructures.