On Trend - Hybrid Cloud Strategies

According to a recent study by Citrix, part of the Cloud Software Group, 25% of organisations surveyed in the UK have already moved half or more of their cloud based-workloads back to on-premises infrastructures, or are considering doing so, in a phenomenon known as cloud repatriation.

The survey, which questioned 350 IT leaders on their current hybrid cloud strategies, showed that 93% of respondents had been involved with a cloud repatriation project in the last three years.  Unexpected security issues and high project expectations, at 33%, were reported as the top drivers for moving some cloud-based workloads back to on-premises infrastructures. 

Another major driver was the failure to meet or properly set internal expectations, accounting for 24%. After reflecting on their experience, IT leaders found that the most common reasons for cloud repatriation projects were security concerns, unexpected costs, performance issues, compatibility problems, and service downtime.  

Over 43% of IT leaders found that moving projects from on-premises to the cloud was more expensive than expected, while 54% said it was financially predictable. The cost-benefit analysis of cloud versus on-premises infrastructure varies greatly depending on the organisation.  

Despite previously unsuccessful cloud projects, 67% of respondents are still encouraged to start new projects in the future. Instead of a complete cloud approach, IT leaders would recommend a mix of ‘mostly cloud and some on-premises’ to the CIO.  “Hybrid cloud infrastructures offer the best of both worlds across both public and private models. Organisations can optimise costs, seamlessly integrate systems, and experiment with innovation projects without compromising on agility or flexibility,” said Calvin Hsu, VP of Product Management at Citrix.  

As IT leaders consider utilising a hybrid strategy, a key consideration is whether cloud or on-premises is the most secure for safeguarding sensitive information. In Citrix’s study, 33% of respondents stated that they had fallen victim to the same number of cyberattacks regardless of whether data and applications were hosted on-premises or in a hybrid environment. The experience of security vulnerabilities varied among different organisations, with some reporting fewer incidents on-premises while others experienced more.  

Security is a top priority, and 77% of IT leaders agreed that cloud technologies can help prevent cybersecurity incidents. 

Moving workloads and cloud repatriation projects can pose a risk, and IT leaders are worried that these projects could make them vulnerable to a cyberattack. With benefits to both cloud and on-premises infrastructures, 35% of these IT leaders currently have projects in both cloud and on-premises.  “It’s clear that IT leaders are still trying to find the right balance between cloud and on-premises,” Hsu commented.

With evolving demands and unexpected changes to priorities, enterprises need a model that allows them to scale resources up or down as required while maintaining security, compliance, and business performance. 

Image: Unsplash

You Migh Also Read:

Navigating Cloud-Native Application Security With CWPP:

DIRECTORY OF SUPPLIERS - Cloud Security:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 

« The Data Privacy Risks Of Generative AI
Military Service Is An Ideal Background For A Cybersecurity Career »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

PubNub

PubNub

PubNub enables developers to build secure realtime Mobile, Web, and IoT Apps.

Keyfactor

Keyfactor

Keyfactor is a leader in cloud-first PKI as-a-Service and crypto-agility solutions. Our Crypto-Agility Platform seamlessly orchestrates every key and certificate across the enterprise.

Cyber Triage

Cyber Triage

Cyber Triage is an automated incident response software any company can use to investigate their network alerts.

Flexential

Flexential

Flexential helps organizations optimize their journey of IT transformation while simultaneously balancing cost, scalability, compliance and security.

SIGA

SIGA

SIGA provides cyber security solutions for Industrial Control Systems SCADA systems used in critical infrastructures and industrial processes.

e-Crime Bureau

e-Crime Bureau

e-Crime Bureau is a specialized company offering cyber/computer forensics, cyber security consulting services, forensic audit and investigations services and training to clients across Africa.

CRYPTTECH

CRYPTTECH

CRYPTTECH specializes in Information Security and Intelligence, Risk Evaluation and Vulnerability Recognition against Cyber-Attacks and APTs.

jobsDB.com

jobsDB.com

jobsDB Singapore is a search engine for jobs throughout Singapore.

DeVry University - Cyber Security Degree

DeVry University - Cyber Security Degree

Explore the dynamic world of data protection with a hybrid or online cyber security degree specialization with DeVry's IT & Networking Bachelor's Degree.

Baxter Clewis Consulting

Baxter Clewis Consulting

Baxter Clewis are cyber security and compliance experts. We provide Security Consulting, IT Assurance, and Technical Security services.

Intaso

Intaso

Intaso are a boutique head hunting and talent solution firm with specialist Cyber and Information Security expertise.

Verica

Verica

Verica uses chaos engineering to make systems more secure and less vulnerable to costly incidents.

RKVST

RKVST

RKVST is a powerful tool that builds trust in multi-party processes when it’s critical to have high assurance in data for confident decisions.

Deutsche Gesellschaft für Cybersicherheit (DGC)

Deutsche Gesellschaft für Cybersicherheit (DGC)

As a leading provider of cyber security, DGC supports companies in taking advantage of the opportunities offered by the digital transformation – and in minimizing the associated risks.

Obsidian Security

Obsidian Security

Protect your business-critical applications by mitigating threats and reducing risk with Obsidian, the first truly comprehensive security solution for SaaS.

Unified Solutions

Unified Solutions

Unified Solutions provide a full continuum of cyber security services, compliance, and technology solutions.

Allstate Identity Protection

Allstate Identity Protection

Allstate make it easy to provide complete identity protection, so everyone can live more confidently online.

OneCollab

OneCollab

OneCollab, your unwavering ally in the dynamic landscape of IT services and cybersecurity.