On Trend - Hybrid Cloud Strategies

According to a recent study by Citrix, part of the Cloud Software Group, 25% of organisations surveyed in the UK have already moved half or more of their cloud based-workloads back to on-premises infrastructures, or are considering doing so, in a phenomenon known as cloud repatriation.

The survey, which questioned 350 IT leaders on their current hybrid cloud strategies, showed that 93% of respondents had been involved with a cloud repatriation project in the last three years.  Unexpected security issues and high project expectations, at 33%, were reported as the top drivers for moving some cloud-based workloads back to on-premises infrastructures. 

Another major driver was the failure to meet or properly set internal expectations, accounting for 24%. After reflecting on their experience, IT leaders found that the most common reasons for cloud repatriation projects were security concerns, unexpected costs, performance issues, compatibility problems, and service downtime.  

Over 43% of IT leaders found that moving projects from on-premises to the cloud was more expensive than expected, while 54% said it was financially predictable. The cost-benefit analysis of cloud versus on-premises infrastructure varies greatly depending on the organisation.  

Despite previously unsuccessful cloud projects, 67% of respondents are still encouraged to start new projects in the future. Instead of a complete cloud approach, IT leaders would recommend a mix of ‘mostly cloud and some on-premises’ to the CIO.  “Hybrid cloud infrastructures offer the best of both worlds across both public and private models. Organisations can optimise costs, seamlessly integrate systems, and experiment with innovation projects without compromising on agility or flexibility,” said Calvin Hsu, VP of Product Management at Citrix.  

As IT leaders consider utilising a hybrid strategy, a key consideration is whether cloud or on-premises is the most secure for safeguarding sensitive information. In Citrix’s study, 33% of respondents stated that they had fallen victim to the same number of cyberattacks regardless of whether data and applications were hosted on-premises or in a hybrid environment. The experience of security vulnerabilities varied among different organisations, with some reporting fewer incidents on-premises while others experienced more.  

Security is a top priority, and 77% of IT leaders agreed that cloud technologies can help prevent cybersecurity incidents. 

Moving workloads and cloud repatriation projects can pose a risk, and IT leaders are worried that these projects could make them vulnerable to a cyberattack. With benefits to both cloud and on-premises infrastructures, 35% of these IT leaders currently have projects in both cloud and on-premises.  “It’s clear that IT leaders are still trying to find the right balance between cloud and on-premises,” Hsu commented.

With evolving demands and unexpected changes to priorities, enterprises need a model that allows them to scale resources up or down as required while maintaining security, compliance, and business performance. 

Image: Unsplash

You Migh Also Read:

Navigating Cloud-Native Application Security With CWPP:

DIRECTORY OF SUPPLIERS - Cloud Security:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 

« The Data Privacy Risks Of Generative AI
Military Service Is An Ideal Background For A Cybersecurity Career »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

ON-DEMAND WEBINAR: Gen AI for Security: Adoption strategies with Amazon Bedrock

ON-DEMAND WEBINAR: Gen AI for Security: Adoption strategies with Amazon Bedrock

Watch this webinar and get a comprehensive roadmap for securely adopting generative AI using Amazon Bedrock, a fully managed service that offers a choice of high-performing foundation models (FMs).

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Information Risk Management (IRM)

Information Risk Management (IRM)

IRM is an international consultancy dedicated to helping organisations solve key business issues. We provide strategic cyber security advice across a wide range of sectors.

Wall Street Technology Association (WSTA)

Wall Street Technology Association (WSTA)

The Wall Street Technology Association (WSTA) provides financial industry technology professionals with forums to learn from and connect with each other.

IT GRC Forum

IT GRC Forum

The IT GRC Forum is an online resource and networking platform for the Governance, Risk Management, and Compliance (GRC) community

Kaymera Technologies

Kaymera Technologies

Kaymera’s comprehensive mobile enterprise security solution defends against all mobile threat and attack vectors.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Devel

Devel

Devel is a LATAM cybersecurity company specialized in providing red, blue and purple team services for the financial sector.

Sopher Networks

Sopher Networks

Sopher is a secure communication and collaboration platform for business and personal use.

DDOS-Guard

DDOS-Guard

DDoS-GUARD is one of the leading service providers on the global DDoS protection and content delivery markets.

SecZetta

SecZetta

SecZetta provides third-party identity risk solutions that are easy to use, and purpose built to help organizations execute risk-based identity access and lifecycle strategies.

MCPc

MCPc

MCPc improves the security and well-being of our clients. We protect data, manage the complexity and sustainability of technology, empower employee performance, and ultimately reduce business risk.

Dashlane

Dashlane

Dashlane puts all your passwords, payments, and personal info in one place that only you control. So you can use them instantly. Securely. Exactly when you need them.

Dhound

Dhound

Dhound is a cybersecurity company providing web application penetration testing.

Etisalat and (e&)

Etisalat and (e&)

Etisalat Group is one of the world’s leading telecom groups in emerging markets.

Silent Quadrant

Silent Quadrant

Silent Quadrant delivers incomparable cybersecurity consulting, digital transformation, and risk management within our purpose-driven clients - empowering them to be the most resilient entities.

The IoT Academy

The IoT Academy

The IoT Academy is a reputed Ed-Tech Institute that provides training in emerging technologies such as embedded systems, the Internet of Things (IoT), Data Science and many more.

TriCIS

TriCIS

TriCIS design and engineer highly secure integrated solutions that meet the highest government and military security standards, providing information assurance to organisations across the globe.