Tag Archives: Hybrid Cloud

Management Oversight—Cloud Tools

There was a felt need for standardised practices in cloud management as public, private and hybrid clouds gained popularity.  Over the decades, a few standards have emerged and there are many more in the pipeline.  Reputed cloud service developers and enablers like Asigra constantly update their software to include new tools that help IT managers and CIOs retain control over their data, maintain security of the systems, and manage their users efficiently.  Here are a few cloud tools that help IT managers in their quest for data control.

The cloud democratises computing. While this is good for business, it creates a few headaches for the management. For instance, mobile and remote users can upload or download data from wherever they are, with whatever device they have on hand without obtaining permissions from the IT Administrator.  The security of the information, the type of applications in use on the connecting device, and so forth, can create security problems that the Administrator must anticipate and provide for. It follows that there is an urgent need for policies and procedures that enforce access boundaries and user permissions, and for tools that enable the Administrator implement these policies and procedures.

A number of cloud service providers use software agents with administrative dashboards that equip the manager with the necessary tools for creating and managing users, who have the necessary company-defined rights and permissions to access the network, and perform some or all operations on the data that they access.

The cloud entrusts data to third party servers.  As a consequence, IT managers worry about security.  The cloud addresses a few of these issues by provisioning for layered data security.  Most cloud service providers use third party (FIPS-140-2) certified cryptographic algorithms to encrypt data. These algorithms are often described as bank grade or military grade and generally use AES 128,192 or 256 or Blowfish that have proven to be impregnable to date.  The symmetric keys that are used are often user defined and private keys that can remain secure with the data owner.

The third party service provider does not have access to the content of the data store that is hosted on their cloud server as a result of the encryption.  Security and availability of data is further strengthened with the institution of “as is” replication and disaster recovery systems and guarantees that the information will not be accessed by the service provider or their associates at any time.  Managers can recover or purge the information contained in the cloud service stores at any time they wish to rescind from the contract using tools provided for the purpose.

Flexible Computing—Cloud Advantages

The cloud adopts a consumption service approach to computing. The cloud separates the application layer from the underlying resource layer and introduces an extraordinary level of flexibility to computing.  Resources can be requisitioned on the fly and resource utilisation can be maximised. Resource capacity levels can be set to meet aggregate needs and utilisation levels can be maximised to reduce the cost of infrastructure deployment. Business users can ask for and use the right amount of technology at the right time for the right activity.

This is true irrespective of the fact that, cloud computing is delivered through a variety of configurations on demand.  The cloud can be a private cloud that resides inside a firewall.  The cloud can be a public cloud that is hosted on infrastructures owned and managed by the service provider and used by multiple enterprises collectively. Hybrid clouds are clouds that bridge public and private resources and use resources that exist inside and outside the enterprise firewall.  Each of these models allow users acquire or discard additional resources on demand.

However, this promised flexibility has not been achieved overnight. It has evolved gradually, with a lot of interaction between the provider and the end user and an extraordinary understanding of the needs of the other.  Three decades of intense efforts that have paid off.  Organisations and cloud vendors that were initially focused on cost efficiency moved on to focus their attention on quality and then on to business agility and further reduction of operating and capital costs.  Vitalisation has enabled the aggregation and consolidation of data centres and promoted the creation of large elastic pools of computing resources.

Standardisation and automation of applications and services have given the users freedom to deploy or use applications when wanted.  Simplification and centralisation have freed administrators from repetitive troubleshooting, patching, and change management.  Policy based workflows empower the workforce access and use information from wherever they are , and on whatever device they may choose to use. All this translates into cost savings on an extraordinary scale and opportunities for businesses by reducing time to service.

In short, the flexible computing paradigm will create a revolution in the way people work.  The cloud may enforce standardisation, pre-packaging of services and evolution of “no-touch” concepts. Management will no longer avoid change, but embrace it and work with it, so that business flexibility and agility is exploited effectively and efficiently.

Our Customers

  • ATOS
  • Age UK
  • Alliance Pharma
  • Liverpool Football Club
  • CSC
  • Centrica
  • Citizens Advice
  • City of London
  • Fujitsu
  • Government Offices
  • HCL
  • LK Bennett
  • Lambretta Clothing
  • Leicester City
  • Lloyds Register
  • Logica
  • Meadowvale
  • National Farmers Union
  • Network Rail
  • PKR

Sales question? Need support? Start a chat session with one of our experts!

For support, call the 24-hour hotline:

UK: 0800 999 3600
US: 800-220-7013

Or, if you've been given a screen sharing code:

Existing customer?

Click below to login to our secure enterprise Portal and view the real-time status of your data protection.

Login to Portal