Have You Gauged The Cost Of A Cloud Outage?

New findings from a study by Veritas Technologies, indicate that 60 percent of respondents have not fully evaluated the cost of a cloud outage to their business and are therefore ill prepared to deal with the impact of an outage.

While cloud service providers offer infrastructure-based service level objectives, the research indicates that many organisations fail to understand their own responsibility, in addition to that of the cloud service providers’, in ensuring that their critical business applications are adequately protected in the event of an outage.

Understanding Cloud Outages

The study surveyed 1,200 global business and IT decision makers. It revealed that 99 percent of IT decision makers reported that their organizations will move systems to the cloud in the next 12 to 24 months. 27 percent also expect to outsource all on-premises infrastructure to the public cloud.

While migration to the cloud continues to accelerate, it is imperative that customers understand how an outage could impact their business. 36 percent of respondents expect less than 15 minutes of downtime per month but the reality is that 31 percent have experienced downtime more than double that per month (31 minutes or more).

Who is responsible in the event of a cloud outage?

59 percent of respondents believe that dealing with cloud service interruptions is the primary responsibility of the cloud service provider.

Eighty-three percent of respondents also believe that their organisation’s cloud service provider is responsible for ensuring that their workloads and data in the cloud are protected against outages.

While cloud service providers have service level agreements in place, these are typically for the infrastructure layer and they hold the responsibility for restoring their infrastructure in the event of a cloud outage.

However, there are other key considerations customers should keep in mind that go beyond the actual infrastructure-level outage, such as bringing their applications back online, once the infrastructure is back online.

Depending on the complexity of application inter-dependencies during restart and the amount of data lost during the outage, the actual time of application recovery may be far longer than the time of infrastructure recovery.

An organisation may alternately decide to be more proactive and failover applications back to their on-premises data center or to another cloud. This would be the primary responsibility of the organisation, not the cloud service provider.

“Organisations are clearly lacking in understanding the anatomy of a cloud outage and that recovery is a joint responsibility between the cloud service provider and the business,” said Mike Palmer, executive vice president and chief product officer, Veritas.

“Immediate recovery from a cloud outage is absolutely within an organisation’s control and responsibility to perform if they take a proactive stance to application uptime in the cloud. Getting this right means less downtime, financial impact, loss of customers’ trust and damage to brand reputation.”

Maximizing the benefits of the cloud while minimising the risks

Not knowing the full extent of how a cloud outage could potentially impact business is a risk very few organisations can afford to take. But, the risks can be severely mitigated with the right business resiliency strategies in place to reap the benefits of embracing a multi-cloud world.

“At Veritas, we fully embrace a multi-cloud approach and partner with many leading cloud service providers to help customers easily migrate applications and data to, from and in-between clouds, all while offering maximum business uptime,” said Palmer.

“We work with the cloud service providers and our customers to help ensure that they are protected in the event of a cloud outage so they can keep their businesses flourishing.”

HelpNetSecurity:

You Might Also Read:

Five Steps To Keeping Your Cloud GDPR Compliant:

 

 

« Cybersecurity Incidents Are Major Business Disruptions
Self-driving Uber Vehicle Strikes & Kills »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Ixia

Ixia

Ixia provides testing, visibility, and security solutions to strengthen applications across physical and virtual networks.

Cybernetica

Cybernetica

Cybernetica is an ICT company with activities in e-government, marine comms, data analysis and research in information security technologies.

BehavioSec

BehavioSec

BehavioSec uses the way your customers type, swipe, and hold their devices, and enables them to authenticate themselves through their own behavior patterns.

FTAPI Software

FTAPI Software

FTAPI SecuTransfer is a software solution for end-to-end encrypted data exchange of large and sensitive data with customers and partners.

IXDen

IXDen

IXDen provides a novel software-based approach to OT systems protection, covering Industrial IoT cybersecurity and sensor data integrity.

Liquid Technology

Liquid Technology

Liquid Technology provide DOD- and NIST-compliant data destruction and EPA-compliant e-waste disposal and recycling services throughout North America, Europe and Asia.

Pentera Security

Pentera Security

Pentera (formerly Pcysys) is focused on the inside threat. Our automated penetration-testing platform mimics the hacker's attack - automating the discovery of vulnerabilities.

FireCompass

FireCompass

FireCompass SAAS platform helps CISOs & Security Teams in continuous risk assessment by mapping your attack surface and knowing the “unknown unknowns”.

SecureWorx

SecureWorx

SecureWorx are a secure multi-cloud MSP, a provider of advanced IT security services and an independent cyber security advisory.

FDD Center on Cyber and Technology Innovation (CCTI)

FDD Center on Cyber and Technology Innovation (CCTI)

The Foundation for Defense of Democracies is a nonprofit research institute focusing on foreign policy and national security. Ares of focus include cyber security and technology innovation.

IoTeX

IoTeX

Building the connected world. IoTeX is a fast, secure, and decentralized platform that connects real world devices/data to the blockchain.

Fullstack Academy

Fullstack Academy

A trailblazer in bootcamp education, Fullstack Academy prepares students for fulfilling careers in tech through our NYC campus, online learning, and university partnerships.

Custodia Continuity

Custodia Continuity

Custodia Continuity manage your Security, Backup, Continuity and Compliance. You get on with your business.

SecureWeb3

SecureWeb3

SecureWeb3 helps businesses and brands to secure their Web3 presence by offering a full suite of security services including training, consultancy & brand protection solutions.

Hexagon

Hexagon

Hexagon is a global leader in digital reality solutions. We are putting data to work to boost efficiency, productivity, quality and safety.

Bearer

Bearer

Bearer helps modern teams ship trustworthy products with the help of our code security solution built for security, privacy and engineering teams.