Dangers Of Betting On Hybrid Cloud

Hybrid cloud architectures are currently very popular as a way for enterprises to move to the cloud without abandoning their existing data centre investments.

At first glance, the strategy makes sense, but there’s a very real danger that the hybrid cloud’s popularity will turn out to be little more than a transitional stage, potentially distracting companies from optimising either their on-premise data centers or their migration to the cloud.

The many meanings of ‘hybrid cloud’

Making things more complicated, the term “hybrid cloud” can have a number of meanings, but at the root it covers any combination of traditional and cloud architectures.

That can mean anything from a traditional data center shop running a couple of non-strategic, standalone applications in the cloud to complex architectures with some core applications residing on-premise and others in various cloud implementations.

The deep technological knowledge needed to run a modern data center may not overlap much with the brokering and management expertise needed to successfully work with cloud vendors, especially in multi-cloud environments.

Of course, all this doesn’t mean there’s no place for the hybrid cloud. The approach is pretty much necessary during the transition from legacy data centers to the public cloud. And some enterprises will always need to maintain a foot in both camps. But there’s a risk that thinking of the hybrid cloud as some idealized end-state for your infrastructure and applications could end up leaving you with the worst of both worlds.

Hybrid cloud: The worst of both worlds?

On one hand, you have the expense and capital investment of operating your own data centers, but without the complete control of your data and processes that is one of the key benefits of on-premise technology stacks. On the other hand, you’ll have to deal with the complexity and potential of working with third-party cloud providers, without gaining much of the cloud’s promised benefit of freeing your team to focus on innovation instead infrastructure.

In many instances, enterprises might be better served over the long term by emphasising one area or the other. Companies that really want to move to the cloud would be well served to move as much as possible, if not all, of their data center activities to the cloud as soon as practical. But, if for whatever reason they’re not ready to fully commit to the public cloud for the next few years, there’s a strong argument for doubling down on running their own data centers, and using the cloud only for simple, completely separate applications.

What’s in a name?

Heck, they can still call their approach “hybrid cloud” if they want, while avoiding as much of the potential complications as possible. And then, at some later date, if and when they are ready to go all in on the cloud, the path could be simpler and more straightforward than trying to get there one step at a time.

Network World:

 

Microsoft Cloud Earnings Beat Expectations:

Keeping The Cloud Safe: Exclusive Report:

 

« FBI Take Down Dark Web Drugs Traders
Who Is Responsible for Cloud Security? »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

authen2cate

authen2cate

Authen2cate offers a simple way to provide application access with our Identity and Access Management (IAM) solutions for enterprise, small business, and individual customers alike.

CFC Underwriting

CFC Underwriting

CFC is a specialist insurance provider and a pioneer in emerging risk, including cyber insurance.

Zimperium

Zimperium

Zimperium offers enterprise class protection for mobile devices against the next generation of advanced mobile attacks.

Ground Labs

Ground Labs

Ground Labs is a security software company dedicated to making sensitive data discovery products that help organisations prevent sensitive data loss.

KE-CIRT/CC

KE-CIRT/CC

KE-CIRT/CC is the national Computer Incident Response Team for Kenya.

Auth0

Auth0

Auth0 is a cloud service that provides a set of unified APIs and tools that instantly enables single sign-on and user management for any application, API or IoT device.

StrongKey

StrongKey

StrongKey (formerly StrongAuth) is a leader in Enterprise Key Management Infrastructure, bringing new levels of capability and data security at a price point significantly lower than other solutions.

DataProtect

DataProtect

DataProtect is a specialized information security company providing consultancy, information management, integration and training services.

IberLayer

IberLayer

IberLayer is the company behind the Email Guardian service, a cloud based Email Total Protection system that filters and blocks email threats.

ZEBOX

ZEBOX

ZEBOX is an international incubator & accelerator of innovative startups. Focus is on Transport/Logistics and Industry X.0 including technologies such as AI, Blockchain and Cybersecurity.

Deeper Network

Deeper Network

Deeper Network represents the world's first decentralized blockchain network for building a truly private, secure and fair Internet.

Gradient Cyber

Gradient Cyber

Gradient Cyber offer mid-market organizations enterprise-grade threat detection and response services at a fraction of the cost of an in-house SOC.

Avocado Consulting

Avocado Consulting

Avocado helps clients deliver with certainty on their complex IT change, with technology services that automate, monitor and optimise.

RiverSafe

RiverSafe

RiverSafe is a professional services provider specialising in Cyber Security, Data Operations and DevOps, putting security at the heart of everything we do.

Solvo

Solvo

Solvo enables security teams and other stakeholders to automatically uncover, prioritize, mitigate and remediate cloud infrastructure access risks.

Redcoat AI

Redcoat AI

Redcoat AI provide a comprehensive security platform that continuously evolves with the threats and opportunities presented by AI.