|By Kevin Nikkhoo||
|March 1, 2013 12:00 PM EST||
With all the talk of fiscal cliffs sequestrations, financial binds and “next year’s budget,” I started thinking about cloud security in more tangible ways. Specifically returns on investment, economic impact and total costs of ownership. Just like death and taxes, businesses can add intrusion and attack to the list of sureties. I can hear CFOs all over the world sigh in exasperation as they feel pressured to add another expense line item to minimize the building security threats to their enterprises.
Before you add another decimal place to security budgets, maybe it’s time you consider the how cloud-deployed security options can not only address the complexities of enterprise security ably, but do so at considerable savings.
Study after study promotes that a cloud computing model saves organization money. We know that more and more functionality is moving to the cloud. For things like CRM or other standard business applications, it simply makes sense. We recognize the limited time and funding to run and maintain enterprise applications and the cloud provides that great equalizer. This model extends itself to cloud security and security-as-a-service.
First there are the over-arching savings of cloud-computing in general:
- Elimination of CapEx costs: no hardware or software to buy (Any “cloud” company that asks you to install a server on your premises to monitor your enterprise isn’t cloud)
- Pay-as-you-go scalable: Most cloud providers can offer considerable cost savings through economies of scale. The ability to adjust the level of service necessary (elastic provisioning) creates flexibility for increased margins and cost-controls.
- Zero-day start/On demand delivery of service: no waiting time after the service has been purchased to develop and configure a complex system. This means no development hell or waiting for Phase 2 to be complete in order to start reaping benefits.
- Head count savings: included in most cloud services are the personnel costs (salary, benefits, overhead, churn/hiring costs) a company does not need to invest in more people and gains the benefit of the security expertise and tribal knowledge of the cloud security provider.
- Best-of breed resource/expertise expansion: Companies improve their overall business agility through proven technologies supported and updated by the core competencies of the developers. Meanwhile CIOs get to move more IT budget to innovation or enablement programs.
But where are the benefits of cloud security from an ROI perspective:
- 24/7 Availability: Cloud security is about continuous monitoring. To properly secure the expanding footprint of an enterprise’s IT landscape, there must be the vigilance to catch analyze and remediate issues as quickly as possible. Like a cancer, if security issues go undetected, they can metastasize and spread. Having a professional monitor a network 7/24/365 (in real time) seems like a luxury for Fortune 500 companies. Cloud security makes this option available for the most modest organizations. The holes in security that are created through intermittent monitoring, vague automation settings and periodic machine log reviews will cost an organization. But continuous monitoring isn’t a cost center. Preventive and proactive security creates reduced risk (without additional man hours) which allows for redeployed resources and a realignment based of business needs.
- Unification: The agility from the cloud allows companies to leverage the capabilities of various security solutions looking at multiple parts of the enterprise. This includes intrusion detection, credentialing, access, SSO, web authentication and compliance audits. It not only allows an enterprise to acquire more and greater functionality for virtually the same cost, but it also centralizes the collective intelligence and provides the advantage enhanced visibility through correlated and situational context. This, in turn, creates better and faster decisions which streamline resources and save money.
- Improved productivity Although there are many examples of this within cloud based security, I will point to one (and use future blogs to expound on others). Using identity management, companies can automatically provision and deprovision users. This service alone can save 75% of the requests across the enterprise. Imagine the additional savings when IT is not slogged down with forgotten password requests/resets along with managing credentials. There are studies that prove that this alone saves companies nearly $200K per year. Now with better employee productivity (because this helps solve BYOD issues) and certain portions of your network safe from data theft and leakage, IT can concentrate on business issues that drive revenue.
- Compliance: Dozens of man hours are typically needed each month to complete all the reports needed to satisfy a regulatory agency auditor; and for most companies, it’s not just one agency, but several. Through real time correlation, most of the work of identifying, capturing, encrypting and storing(or destroying) certain pieces of information and providing the proof your best practices are in line with internal and external policies is easier. Because of unification, multi-silo collection and security centralization, 75 hours per month becomes 10. And more importantly, the degree of accuracy of the reporting is significantly better. And with better reports, the threat of fines disappears.
Gartner estimates the annual cost to own and manage traditional on premise security software applications can be 4X the initial purchase. This is chiefly due to the need to acquire and maintain the resources to support the deployment. In many cases, for less than what a company pays for in support and maintenance of these on premise initiatives, they could have twice the capability from the cloud.
When it’s money that matters, the bottom line should be as much about saving as it is spending; as long as the result is a positive return on the investment. Enterprise security is not different. For years seen as a cost center, through cloud-based solutions it can now be redefined as a revenue enablement mechanism. Certainly there are costs involved in a maintaining a safe network perimeter, protecting and securing data and compliance auditing. However, by exploiting the benefits and strengths provided by cloud based security, you can prudently and effectively contain the issues with plentiful resources to reinvest in your core competencies and focus on driving business forward. Security issues will not go away, but you can direct less at them and in return, receive more greater results.
When looking at the cloud in term of security…sometimes you can have your cake and eat it too.
Cloud computing is unquestionably one of the driving forces of DevOps, as the automation of operations transforms enterprise software development. DevOps, however, is more than a technology trend, as it represents a move toward silo-busting, self-organizing horizontal teams that drive business velocity. At the same time, enterprise Digital Transformation represents an upheaval across the enterprise, as customer preferences and behavior drive enterprise technology decisions. This transformation ...
Dec. 1, 2015 12:35 PM EST
SYS-CON Events announced today that Catchpoint, a global leader in monitoring, and testing the performance of online applications, has been named "Silver Sponsor" of DevOps Summit New York, which will take place on June 7-9, 2016 at the Javits Center in New York City. Catchpoint radically transforms the way businesses manage, monitor, and test the performance of online applications. Truly understand and improve user experience with clear visibility into complex, distributed online systems.Founde...
Dec. 1, 2015 12:15 PM EST
The annual holiday shopping season, which started on Thanksgiving weekend and runs through the end of December, is undoubtedly the most crucial time of the year for many eCommerce websites, with sales from this period having a dramatic effect on the year-end bottom line. Web performance – or, the overall speed and availability of a website or mobile site – is an issue year-round, but it takes on increased importance during the holidays. Ironically, it is at this time of year that networks and i...
Dec. 1, 2015 11:15 AM EST Reads: 164
Most of the IoT Gateway scenarios involve collecting data from machines/processing and pushing data upstream to cloud for further analytics. The gateway hardware varies from Raspberry Pi to Industrial PCs. The document states the process of allowing deploying polyglot data pipelining software with the clear notion of supporting immutability. In his session at @ThingsExpo, Shashank Jain, a development architect for SAP Labs, discussed the objective, which is to automate the IoT deployment proces...
Dec. 1, 2015 11:00 AM EST Reads: 138
Countless business models have spawned from the IaaS industry – resell Web hosting, blogs, public cloud, and on and on. With the overwhelming amount of tools available to us, it's sometimes easy to overlook that many of them are just new skins of resources we've had for a long time. In his general session at 17th Cloud Expo, Harold Hannon, Sr. Software Architect at SoftLayer, an IBM Company, broke down what we have to work with, discussed the benefits and pitfalls and how we can best use them ...
Dec. 1, 2015 10:45 AM EST Reads: 131
Discussions of cloud computing have evolved in recent years from a focus on specific types of cloud, to a world of hybrid cloud, and to a world dominated by the APIs that make today's multi-cloud environments and hybrid clouds possible. In this Power Panel at 17th Cloud Expo, moderated by Conference Chair Roger Strukhoff, panelists addressed the importance of customers being able to use the specific technologies they need, through environments and ecosystems that expose their APIs to make true ...
Dec. 1, 2015 10:00 AM EST Reads: 577
It's been a busy time for tech's ongoing infatuation with containers. Amazon just announced EC2 Container Registry to simply container management. The new Azure container service taps into Microsoft's partnership with Docker and Mesosphere. You know when there's a standard for containers on the table there's money on the table, too. Everyone is talking containers because they reduce a ton of development-related challenges and make it much easier to move across production and testing environm...
Dec. 1, 2015 10:00 AM EST Reads: 658
DevOps is an organizational and cultural rethink of how software-driven organizations can become organizations at velocity – agile enough to innovate and fast enough to deal with any change that comes their way. Information technology is a central enabler of DevOps, but today’s better-faster-cheaper technology is not the whole story, as tools are only as good as the people wielding them. The more fundamental story here is the organizational and cultural transformation necessary to take full adv...
Dec. 1, 2015 10:00 AM EST
ThoughtWorks has issued the latest Technology Radar, an assessment of trends significantly impacting software development and business strategy. The Technology Radar sets out the current changes in software development - things in motion to pay attention to based upon ThoughtWorks' day-to-day work and experience solving their clients' toughest challenges. "With the threat landscape still evolving, our latest edition of Technology Radar continues to focus on security and innovative approaches,...
Dec. 1, 2015 09:45 AM EST
Microservices are a very exciting architectural approach that many organizations are looking to as a way to accelerate innovation. Microservices promise to allow teams to move away from monolithic "ball of mud" systems, but the reality is that, in the vast majority of organizations, different projects and technologies will continue to be developed at different speeds. How to handle the dependencies between these disparate systems with different iteration cycles? Consider the "canoncial problem"...
Dec. 1, 2015 09:00 AM EST Reads: 482
The Internet of Things is clearly many things: data collection and analytics, wearables, Smart Grids and Smart Cities, the Industrial Internet, and more. Cool platforms like Arduino, Raspberry Pi, Intel's Galileo and Edison, and a diverse world of sensors are making the IoT a great toy box for developers in all these areas. In this Power Panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists discussed what things are the most important, which will have the most profound...
Dec. 1, 2015 06:30 AM EST Reads: 515
As organizations shift towards IT-as-a-service models, the need for managing & protecting data residing across physical, virtual, and now cloud environments grows with it. CommVault can ensure protection & E-Discovery of your data - whether in a private cloud, a Service Provider delivered public cloud, or a hybrid cloud environment – across the heterogeneous enterprise.
Dec. 1, 2015 06:00 AM EST Reads: 273
Growth hacking is common for startups to make unheard-of progress in building their business. Career Hacks can help Geek Girls and those who support them (yes, that's you too, Dad!) to excel in this typically male-dominated world. Get ready to learn the facts: Is there a bias against women in the tech / developer communities? Why are women 50% of the workforce, but hold only 24% of the STEM or IT positions? Some beginnings of what to do about it! In her Day 2 Keynote at 17th Cloud Expo, San...
Dec. 1, 2015 05:00 AM EST Reads: 622
PubNub has announced the release of BLOCKS, a set of customizable microservices that give developers a simple way to add code and deploy features for realtime apps.PubNub BLOCKS executes business logic directly on the data streaming through PubNub’s network without splitting it off to an intermediary server controlled by the customer. This revolutionary approach streamlines app development, reduces endpoint-to-endpoint latency, and allows apps to better leverage the enormous scalability of PubNu...
Dec. 1, 2015 05:00 AM EST Reads: 361
In today's enterprise, digital transformation represents organizational change even more so than technology change, as customer preferences and behavior drive end-to-end transformation across lines of business as well as IT. To capitalize on the ubiquitous disruption driving this transformation, companies must be able to innovate at an increasingly rapid pace. Traditional approaches for driving innovation are now woefully inadequate for keeping up with the breadth of disruption and change facin...
Dec. 1, 2015 03:30 AM EST Reads: 533
I recently attended and was a speaker at the 4th International Internet of @ThingsExpo at the Santa Clara Convention Center. I also had the opportunity to attend this event last year and I wrote a blog from that show talking about how the “Enterprise Impact of IoT” was a key theme of last year’s show. I was curious to see if the same theme would still resonate 365 days later and what, if any, changes I would see in the content presented.
Dec. 1, 2015 03:00 AM EST Reads: 470
You may have heard about the pets vs. cattle discussion – a reference to the way application servers are deployed in the cloud native world. If an application server goes down it can simply be dropped from the mix and a new server added in its place. The practice so far has mostly been applied to application deployments. Management software on the other hand is treated in a very special manner. Dedicated resources are set aside to run the management software components and several alerting syst...
Dec. 1, 2015 02:00 AM EST Reads: 254
Culture is the most important ingredient of DevOps. The challenge for most organizations is defining and communicating a vision of beneficial DevOps culture for their organizations, and then facilitating the changes needed to achieve that. Often this comes down to an ability to provide true leadership. As a CIO, are your direct reports IT managers or are they IT leaders? The hard truth is that many IT managers have risen through the ranks based on their technical skills, not their leadership ab...
Dec. 1, 2015 01:00 AM EST Reads: 437
Naturally, new and exciting technologies and trends like software defined networking, the Internet of Things and the cloud tend to get the lion’s share of attention these days, including when it comes to security. However, it’s important to never forget that at the center of it all is still the enterprise network. And as evidenced by the ever-expanding landslide of data breaches that could have been prevented or at least their impact lessened by better practicing network security basics, it’s ...
Dec. 1, 2015 12:45 AM EST Reads: 302
Put the word continuous in front of many things and we help define DevOps: continuous delivery, continuous testing, continuous assessment, and there is more. The next BriefingsDirect DevOps thought leadership discussion explores the concept of continuous processes around the development and deployment of applications and systems. Put the word continuous in front of many things and we help define DevOps: continuous delivery, continuous testing, continuous assessment, and there is more.
Dec. 1, 2015 12:30 AM EST Reads: 195