On Trend - Hybrid Cloud Strategies

According to a recent study by Citrix, part of the Cloud Software Group, 25% of organisations surveyed in the UK have already moved half or more of their cloud based-workloads back to on-premises infrastructures, or are considering doing so, in a phenomenon known as cloud repatriation.

The survey, which questioned 350 IT leaders on their current hybrid cloud strategies, showed that 93% of respondents had been involved with a cloud repatriation project in the last three years.  Unexpected security issues and high project expectations, at 33%, were reported as the top drivers for moving some cloud-based workloads back to on-premises infrastructures. 

Another major driver was the failure to meet or properly set internal expectations, accounting for 24%. After reflecting on their experience, IT leaders found that the most common reasons for cloud repatriation projects were security concerns, unexpected costs, performance issues, compatibility problems, and service downtime.  

Over 43% of IT leaders found that moving projects from on-premises to the cloud was more expensive than expected, while 54% said it was financially predictable. The cost-benefit analysis of cloud versus on-premises infrastructure varies greatly depending on the organisation.  

Despite previously unsuccessful cloud projects, 67% of respondents are still encouraged to start new projects in the future. Instead of a complete cloud approach, IT leaders would recommend a mix of ‘mostly cloud and some on-premises’ to the CIO.  “Hybrid cloud infrastructures offer the best of both worlds across both public and private models. Organisations can optimise costs, seamlessly integrate systems, and experiment with innovation projects without compromising on agility or flexibility,” said Calvin Hsu, VP of Product Management at Citrix.  

As IT leaders consider utilising a hybrid strategy, a key consideration is whether cloud or on-premises is the most secure for safeguarding sensitive information. In Citrix’s study, 33% of respondents stated that they had fallen victim to the same number of cyberattacks regardless of whether data and applications were hosted on-premises or in a hybrid environment. The experience of security vulnerabilities varied among different organisations, with some reporting fewer incidents on-premises while others experienced more.  

Security is a top priority, and 77% of IT leaders agreed that cloud technologies can help prevent cybersecurity incidents. 

Moving workloads and cloud repatriation projects can pose a risk, and IT leaders are worried that these projects could make them vulnerable to a cyberattack. With benefits to both cloud and on-premises infrastructures, 35% of these IT leaders currently have projects in both cloud and on-premises.  “It’s clear that IT leaders are still trying to find the right balance between cloud and on-premises,” Hsu commented.

With evolving demands and unexpected changes to priorities, enterprises need a model that allows them to scale resources up or down as required while maintaining security, compliance, and business performance. 

Image: Unsplash

You Migh Also Read:

Navigating Cloud-Native Application Security With CWPP:

DIRECTORY OF SUPPLIERS - Cloud Security:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 

« The Data Privacy Risks Of Generative AI
Military Service Is An Ideal Background For A Cybersecurity Career »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Zentek Digital Investigations

Zentek Digital Investigations

Zentek has been providing digital forensics services to the public and private sector for computers and mobile devices since 2004.

Brookings Institution

Brookings Institution

The Brookings Institution is a nonprofit public policy organization. Cyber security is covered within the various study areas.

Snort

Snort

Snort is an open source intrusion prevention system capable of real-time traffic analysis and packet logging.

FireMon

FireMon

FireMon is the only agile network security policy platform for firewalls and cloud security groups providing the fastest way to streamline network security policy management.

Taqnia Cyber

Taqnia Cyber

Taqnia Cyber specializes in the fields of cyber security, intelligence, operations, and training. It offers its services and consultations to both public and private sectors.

HCL Technologies

HCL Technologies

HCL offer an integrated portfolio of products, solutions and services built around Digital, IoT, Cloud, Automation, Cybersecurity, Analytics, Infrastructure Management and Engineering Services.

Excelsecu Data Technology

Excelsecu Data Technology

Excelsecu is a global solution provider of online identity authentication, widely applied in banks, government bodies and enterprises.

Accel

Accel

Accel is a leading venture capital firm that invests in people and their companies from the earliest days through all phases of private company growth. Areas of focus include cybersecurity.

GLESEC

GLESEC

GLESEC offer a complete range of Cyber Security services from Operations & Intelligence Services to Auditing & Compliance and Simulation and Training.

Billington CyberSecurity

Billington CyberSecurity

Billington CyberSecurity is a leading, independent education company with an exclusive focus on cybersecurity.

NodeSource

NodeSource

NodeSource helps organizations run production-ready Node.js applications with greater visibility into resource usage and enhanced awareness around application performance and security.

Cubro Network Visibility

Cubro Network Visibility

Cubro network visibility solutions remove network monitoring ‘blind spots’ to provide enhanced visibility and control of all data transiting a company’s network.

Intaso

Intaso

Intaso are a boutique head hunting and talent solution firm with specialist Cyber and Information Security expertise.

Kennedys

Kennedys

Kennedys is a global law firm with expertise in litigation/dispute resolution and advisory services, particularly in the insurance/reinsurance and liability sectors, including cyber risk.

Appalachia Technologies

Appalachia Technologies

Appalachia is a full service Managed Services Provider with a focus on cybersecurity, backed by the best engineers.

TetherView

TetherView

TetherView provides leading virtual desktop and email security technology to help businesses stand up and manage digital workspaces.