On Trend - Hybrid Cloud Strategies

According to a recent study by Citrix, part of the Cloud Software Group, 25% of organisations surveyed in the UK have already moved half or more of their cloud based-workloads back to on-premises infrastructures, or are considering doing so, in a phenomenon known as cloud repatriation.

The survey, which questioned 350 IT leaders on their current hybrid cloud strategies, showed that 93% of respondents had been involved with a cloud repatriation project in the last three years.  Unexpected security issues and high project expectations, at 33%, were reported as the top drivers for moving some cloud-based workloads back to on-premises infrastructures. 

Another major driver was the failure to meet or properly set internal expectations, accounting for 24%. After reflecting on their experience, IT leaders found that the most common reasons for cloud repatriation projects were security concerns, unexpected costs, performance issues, compatibility problems, and service downtime.  

Over 43% of IT leaders found that moving projects from on-premises to the cloud was more expensive than expected, while 54% said it was financially predictable. The cost-benefit analysis of cloud versus on-premises infrastructure varies greatly depending on the organisation.  

Despite previously unsuccessful cloud projects, 67% of respondents are still encouraged to start new projects in the future. Instead of a complete cloud approach, IT leaders would recommend a mix of ‘mostly cloud and some on-premises’ to the CIO.  “Hybrid cloud infrastructures offer the best of both worlds across both public and private models. Organisations can optimise costs, seamlessly integrate systems, and experiment with innovation projects without compromising on agility or flexibility,” said Calvin Hsu, VP of Product Management at Citrix.  

As IT leaders consider utilising a hybrid strategy, a key consideration is whether cloud or on-premises is the most secure for safeguarding sensitive information. In Citrix’s study, 33% of respondents stated that they had fallen victim to the same number of cyberattacks regardless of whether data and applications were hosted on-premises or in a hybrid environment. The experience of security vulnerabilities varied among different organisations, with some reporting fewer incidents on-premises while others experienced more.  

Security is a top priority, and 77% of IT leaders agreed that cloud technologies can help prevent cybersecurity incidents. 

Moving workloads and cloud repatriation projects can pose a risk, and IT leaders are worried that these projects could make them vulnerable to a cyberattack. With benefits to both cloud and on-premises infrastructures, 35% of these IT leaders currently have projects in both cloud and on-premises.  “It’s clear that IT leaders are still trying to find the right balance between cloud and on-premises,” Hsu commented.

With evolving demands and unexpected changes to priorities, enterprises need a model that allows them to scale resources up or down as required while maintaining security, compliance, and business performance. 

Image: Unsplash

You Migh Also Read:

Navigating Cloud-Native Application Security With CWPP:

DIRECTORY OF SUPPLIERS - Cloud Security:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 

« The Data Privacy Risks Of Generative AI
Military Service Is An Ideal Background For A Cybersecurity Career »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Computing Technology Industry Association (CompTIA)

Computing Technology Industry Association (CompTIA)

CompTIA is dedicated to advancing industry growth through its educational programs, market research, networking events, professional certifications, and public policy advocacy.

DynaRisk

DynaRisk

DynaRisk helps companies protect their staff, clients and supply chain from cyber threats by enabling people to take action for themselves.

Codeproof Technologies

Codeproof Technologies

The Codeproof enterprise mobility solution empowers your business to secure, deploy and manage mobile applications and data on smartphones, tablets, IoT devices and more.

Eskive

Eskive

Eskive is a Brazilian cyber security awareness and education platform that empowers users and strengthens their company in the face of cyber threats.

DeuZert

DeuZert

DeuZert is an accredited German certification body in accordance with ISO/IEC 27001 (Information Security Management).

Tier1Asset (T1A)

Tier1Asset (T1A)

T1A is Europe’s leading IT refurbisher. We offer certified data erasure using blancco on site and at our facilities, providing environmentally sound disposal of your used equipment.

SynerLeap

SynerLeap

SynerLeap is ABB's innovation growth hub. Our aim is to help startups accelerate and expand across industries, ranging from industrial automation and robotics to grid technologies and smart cities.

RISE

RISE

RISE is an independent, State-owned research institute, which offers unique expertise and over 100 testbeds and demonstration environments for future-proof technologies, products and services.

Clario Tech

Clario Tech

Clario is a simple, comprehensive, personalized protection app. It comes with a full suite of intelligent security software and intelligent people to help you live a better, safer digital life.

NetSPI

NetSPI

NetSPI is an information security penetration testing and vulnerability assessment management advisory firm.

EnigmaSoft

EnigmaSoft

EnigmaSoft is known for its PC anti-malware remediation utility and service under the tradename SpyHunter.

Stacklok

Stacklok

Stacklok are an Open Source first security company enabling safe Open Source Software consumption.

AuthX

AuthX

AuthX provides secure and seamless log-in capabilities through strong authentication and integrations.

VAST Data

VAST Data

The VAST Data Platform delivers scalable performance, radically simple data management and enhanced productivity for the AI-powered world.

Prizsm Technologies

Prizsm Technologies

Prizsm is a computational storage capability that provides flexible, easy-to-use, resilient solutions for quantum-resistant, hyper-secure cloud storage and communications.

Edera

Edera

Edera is changing the way containers are run and secured, making isolation a reality and fundamentally transforming computing in the process.