Have You Gauged The Cost Of A Cloud Outage?

New findings from a study by Veritas Technologies, indicate that 60 percent of respondents have not fully evaluated the cost of a cloud outage to their business and are therefore ill prepared to deal with the impact of an outage.

While cloud service providers offer infrastructure-based service level objectives, the research indicates that many organisations fail to understand their own responsibility, in addition to that of the cloud service providers’, in ensuring that their critical business applications are adequately protected in the event of an outage.

Understanding Cloud Outages

The study surveyed 1,200 global business and IT decision makers. It revealed that 99 percent of IT decision makers reported that their organizations will move systems to the cloud in the next 12 to 24 months. 27 percent also expect to outsource all on-premises infrastructure to the public cloud.

While migration to the cloud continues to accelerate, it is imperative that customers understand how an outage could impact their business. 36 percent of respondents expect less than 15 minutes of downtime per month but the reality is that 31 percent have experienced downtime more than double that per month (31 minutes or more).

Who is responsible in the event of a cloud outage?

59 percent of respondents believe that dealing with cloud service interruptions is the primary responsibility of the cloud service provider.

Eighty-three percent of respondents also believe that their organisation’s cloud service provider is responsible for ensuring that their workloads and data in the cloud are protected against outages.

While cloud service providers have service level agreements in place, these are typically for the infrastructure layer and they hold the responsibility for restoring their infrastructure in the event of a cloud outage.

However, there are other key considerations customers should keep in mind that go beyond the actual infrastructure-level outage, such as bringing their applications back online, once the infrastructure is back online.

Depending on the complexity of application inter-dependencies during restart and the amount of data lost during the outage, the actual time of application recovery may be far longer than the time of infrastructure recovery.

An organisation may alternately decide to be more proactive and failover applications back to their on-premises data center or to another cloud. This would be the primary responsibility of the organisation, not the cloud service provider.

“Organisations are clearly lacking in understanding the anatomy of a cloud outage and that recovery is a joint responsibility between the cloud service provider and the business,” said Mike Palmer, executive vice president and chief product officer, Veritas.

“Immediate recovery from a cloud outage is absolutely within an organisation’s control and responsibility to perform if they take a proactive stance to application uptime in the cloud. Getting this right means less downtime, financial impact, loss of customers’ trust and damage to brand reputation.”

Maximizing the benefits of the cloud while minimising the risks

Not knowing the full extent of how a cloud outage could potentially impact business is a risk very few organisations can afford to take. But, the risks can be severely mitigated with the right business resiliency strategies in place to reap the benefits of embracing a multi-cloud world.

“At Veritas, we fully embrace a multi-cloud approach and partner with many leading cloud service providers to help customers easily migrate applications and data to, from and in-between clouds, all while offering maximum business uptime,” said Palmer.

“We work with the cloud service providers and our customers to help ensure that they are protected in the event of a cloud outage so they can keep their businesses flourishing.”

HelpNetSecurity:

You Might Also Read:

Five Steps To Keeping Your Cloud GDPR Compliant:

 

 

« Cybersecurity Incidents Are Major Business Disruptions
Self-driving Uber Vehicle Strikes & Kills »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

K7 Computing

K7 Computing

K7 provides antivirus and internet security products for business and home users.

PortSwigger

PortSwigger

PortSwigger's Burp Suite is an integrated platform for performing security testing of web applications.

InteliSecure

InteliSecure

InteliSecure offer Professional Services, Security Assessments and Managed Services for data and threat protection.

CyRise

CyRise

CyRise is a venture accelerator focused squarely on early stage cyber security startups.

Statice

Statice

Statice develops state-of-the-art data privacy technology that helps companies double-down on data-driven innovation while safeguarding the privacy of individuals.

iosiro

iosiro

iosiro was created to guide companies through securely using blockchain technologies. We help teams launch and manage ICOs, deploy secure dApps, and integrate private networks into business practices.

Duality Technologies

Duality Technologies

Duality Technologies combine Advanced Cryptography with Data Science to deliver High-Performance Privacy-Protecting Computing to Regulated Industries.

Atakama

Atakama

With Atakama, data remains encrypted until the very moment it is used, and the ability to decrypt is based on zero trust architecture.

VIRTIS

VIRTIS

VIRTIS' mission is to provide today's leading organizations peace of mind that their entire digital network perimeter is safe from hackers and data breach.

Synamic Technologies

Synamic Technologies

Synamic Technologies was founded in 2018 as a start-up to automate cyber security processes. Our CISOSCOPE product automates vulnerability management, risk management and compliance.

Lattice Semiconductor

Lattice Semiconductor

Lattice Semiconductor solves customer problems across the network, from the Edge to the Cloud, in the growing communications, computing, industrial, automotive and consumer markets.

Bores Security Consultancy

Bores Security Consultancy

Bores Security Consultancy are an established family-run business delivering expertise in security and technology.

Snare

Snare

Snare is a comprehensive set of event monitoring and analysis tools designed to address critical auditing and security requirements.

Somos

Somos

From voice to messaging to fraud prevention and beyond, Somos are committed to developing innovative solutions that ensure that our ability to maintain trustworthy connections never stops.

ZEST Security

ZEST Security

The ZEST platform natively integrates into your technology stack to make efficient risk remediation possible.

Xantaro

Xantaro

Xantaro specializes in technologies, software and services for Carriers, ISPs, Hosting and Cloud Providers as well as for Operators of Data Centres and Campus Networks.