On Trend - Hybrid Cloud Strategies

According to a recent study by Citrix, part of the Cloud Software Group, 25% of organisations surveyed in the UK have already moved half or more of their cloud based-workloads back to on-premises infrastructures, or are considering doing so, in a phenomenon known as cloud repatriation.

The survey, which questioned 350 IT leaders on their current hybrid cloud strategies, showed that 93% of respondents had been involved with a cloud repatriation project in the last three years.  Unexpected security issues and high project expectations, at 33%, were reported as the top drivers for moving some cloud-based workloads back to on-premises infrastructures. 

Another major driver was the failure to meet or properly set internal expectations, accounting for 24%. After reflecting on their experience, IT leaders found that the most common reasons for cloud repatriation projects were security concerns, unexpected costs, performance issues, compatibility problems, and service downtime.  

Over 43% of IT leaders found that moving projects from on-premises to the cloud was more expensive than expected, while 54% said it was financially predictable. The cost-benefit analysis of cloud versus on-premises infrastructure varies greatly depending on the organisation.  

Despite previously unsuccessful cloud projects, 67% of respondents are still encouraged to start new projects in the future. Instead of a complete cloud approach, IT leaders would recommend a mix of ‘mostly cloud and some on-premises’ to the CIO.  “Hybrid cloud infrastructures offer the best of both worlds across both public and private models. Organisations can optimise costs, seamlessly integrate systems, and experiment with innovation projects without compromising on agility or flexibility,” said Calvin Hsu, VP of Product Management at Citrix.  

As IT leaders consider utilising a hybrid strategy, a key consideration is whether cloud or on-premises is the most secure for safeguarding sensitive information. In Citrix’s study, 33% of respondents stated that they had fallen victim to the same number of cyberattacks regardless of whether data and applications were hosted on-premises or in a hybrid environment. The experience of security vulnerabilities varied among different organisations, with some reporting fewer incidents on-premises while others experienced more.  

Security is a top priority, and 77% of IT leaders agreed that cloud technologies can help prevent cybersecurity incidents. 

Moving workloads and cloud repatriation projects can pose a risk, and IT leaders are worried that these projects could make them vulnerable to a cyberattack. With benefits to both cloud and on-premises infrastructures, 35% of these IT leaders currently have projects in both cloud and on-premises.  “It’s clear that IT leaders are still trying to find the right balance between cloud and on-premises,” Hsu commented.

With evolving demands and unexpected changes to priorities, enterprises need a model that allows them to scale resources up or down as required while maintaining security, compliance, and business performance. 

Image: Unsplash

You Migh Also Read:

Navigating Cloud-Native Application Security With CWPP:

DIRECTORY OF SUPPLIERS - Cloud Security:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 

« The Data Privacy Risks Of Generative AI
Military Service Is An Ideal Background For A Cybersecurity Career »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Renaissance

Renaissance

Renaissance is Ireland's premier value added distributor of IT security solutions and a leading independent provider of business continuity consultancy.

rPeople Staffing

rPeople Staffing

rPeople provides direct placement in all areas of your organization, including and specializing in Technical and Executive hiring.

Vertical Structure

Vertical Structure

Vertical Structure services include Security & Penetration Testing, Information Assurance, Bespoke Training Programs and Secure Hosting.

Senetas

Senetas

Senetas is a leading developer and manufacturer of certified high-assurance encryption solutions, dedicated to protecting network transmitted data without compromising performance.

AEI Cybersecurity

AEI Cybersecurity

AEI brings together companies, Research Centres, Universities, and other organizations interested in promoting new cybersecurity technologies.

CryptoCodex

CryptoCodex

Cryptocodex has developed Counter-Fight, the most advanced, yet simple to implement, counterfeit detection system.

Merlin Cyber

Merlin Cyber

Merlin is a premier cybersecurity platform that leverages security technologies, trusted relationships, and capital to develop and deliver groundbreaking security solutions.

Computing Technology Industry Association (CompTIA)

Computing Technology Industry Association (CompTIA)

CompTIA is dedicated to advancing industry growth through its educational programs, market research, networking events, professional certifications, and public policy advocacy.

AAROH

AAROH

AAROH helps customers in Government, Law Enforcement, and Enterprises to identify, prevent, detect, resolve and protect from threats, crimes, breaches & fraud.

Apozy

Apozy

Apozy replaces a secure web gateway to nullify phishing, malware and impersonation attacks.

CPP Group UK

CPP Group UK

CPP Group UK develops products to help insurers add further value to their products and services through its innovative suite of new products in FinTech, InsurTech and cyber security.

Clear Skye

Clear Skye

Clear Skye, an Identity Access and Management (IAM) software company, reimagines enterprise identity access and risk management software to make a complicated problem easier to manage.

Evo Security

Evo Security

Evo Security is an Identity and Access Management company focused exclusively on serving MSPs, MSSPs and their SMB and Mid-Market customers.

DataGuard

DataGuard

DataGuard is a security and compliance software company trusted by organisations across the globe.

GlassHouse Technology

GlassHouse Technology

GlassHouse supports customers in their digitalization journey with our deep technical expertise in Managed Cloud and Security Services, SAP Infrastructure Service and Business Continuity Services.

SECQAI

SECQAI

At SECQAI we create dual-use hardware and software to enable the future of computing.