IT Experts Weigh in on the Four Steps to Choosing a Cloud Services Vendor

IT Experts Weigh in on the Four Steps to Choosing a Cloud Services Vendor

IT Experts Weigh in on the Four Steps to Choosing a Cloud Services VendorWith so much attention paid to cloud services, you might be surprised to know that only 5 percent of the senior IT professionals we recently polled currently use cloud services for storage, and nearly half have no plans to migrate this year.

With so many practitioners still uncertain and weighing their cloud services options, our team at Wisegate got a roundtable together with senior IT practitioners in medium and large companies who have been through the selection process. Whether your organization is planning a full-scale migration or just moving in that direction with small amounts of data, here are four steps that your peers say should be taken to streamline the process of choosing a vendor.

Step 1: Determine clearly stated objectives for your organization.

There are an overwhelming amount of options when looking for cloud service providers. Having a well-scoped plan in place before you start your search will make it much more efficient. Part of this plan must include clearly-stated objectives outlining what purpose(s) your organization wants to use the cloud. Do you want to use the cloud for storage, development, disaster recovery, backup or testing? Some vendors are stronger than others in these areas and the cloud should not be used as a Band-Aid solution.  Your best bet may end up being a combination of several vendors; however, having your objectives clearly stated will ensure that you find the right cloud vendor.

Step 2: Cast a wide net, and include contractors in your search.

Don’t feel that you have to limit yourself to any certain vendor. Seeking multiple bids is vital to the search process. You may find it helpful to break up your RFPs by objective and seek bids from a wider pool of experts.

While Amazon Web Services is on everyone’s tongues of late, it is not the only option to consider. In addition to Amazon, Wisegate members identified Microsoft, Google and Rackspace as private cloud vendors with whom they are considering contracting. If you run a Microsoft-centric environment, for example, our experts advise you to consider Azure over AWS as a solution.

Once you’ve chosen your vendor, you’ll also want to identify a contractor to operate through. Our members recommend value-added resellers, like Smartronix and DLT Solutions, as valuable tools. Most vendors are generally hands-off when it comes to customer support and having a contractor can make a world of difference. While this may add an extra step to the cloud transition, it may well protect you later on down the line when your organization is actually using the vendor.

Step 3: Plan, plan, plan.

If we’ve found one thing from surveying our members about cloud computing and beyond, it’s that planning is key. Once you’ve chosen your vendor, be prepared to pump the breaks on migration while you re-architect applications. Forklifting large amounts of data into the cloud will only create more work and potential problems for you later. Realistically, you should budget at least a year for migration, and all applications need to be cloud ready before the move. Sensitive data should always be moved last in order to avoid potential security breaches doing major damage.

As any security expert knows, it all comes down to good planning. The cloud is no exception to this rule, and a good plan will help protect your organization.

Step 4: Run your own audits.

The services that are most commonly chosen have their own internal auditing systems. For example, AWS auditing is done through Cloud Trail that records API activity and provides customers log files, including the source IP address of the API caller, the request parameters and the response elements returned by Amazon. Many customers are satisfied with these results; however, the jury is still out on whether they are truly reliable.

Once your organization migrates their most sensitive data, you should be sure to run your own audits on a regular basis using your own PaaS tools. This reiterates the importance of putting sensitive data on the cloud last. Once you know your service is secure, you’ll feel better about moving your most sensitive data onto the cloud, and you’ll feel a greater sense of control over the security of your organization’s data.

Cloud computing should not be discounted as a possibility in your organization. It can be a valuable solution and doesn’t need to be a headache for you, nor does it have to jeopardize your information’s security. With careful planning and a hands-on approach to the search and migration processes, moving to the cloud is not an impossible task. One of the best ways to avoid the pitfalls and learn the real practices that work is to talk to peers who have been through what you are now going through. Our research shows that peers are the #1 most trusted source of information – so start there.

About the Author

Sara Gates is the CEO of Wisegate.

Featured

  • Freedom of Choice

    In today's security landscape, we are witnessing a fundamental transformation in how organizations manage digital evidence. Law enforcement agencies, campus security teams, and large facility operators face increasingly complex challenges with expanding video data, tightening budget constraints and inflexible systems that limit innovation. Read Now

  • Accelerating a Pathway

    There is a new trend touting the transformational qualities of AI’s ability to deliver actionable data and predictive analysis that in many instances, seems to be a bit of an overpromise. The reality is that very few solutions in the cyber-physical security (CPS) space live up to this high expectation with the one exception being the new generation of Physical Identity and Access Management (PIAM) software – herein recategorized as PIAM+. Read Now

  • Protecting Your Zones

    It is game day. You can feel the crowd’s energy. In the parking lot. At the gate. In the stadium. On the concourse. Fans are eager to party. Food and merchandise vendors ready themselves for the rush. Read Now

  • Street Smarts

    The ongoing acceptance of AI and advanced data analytics has allowed surveillance camera technology to shift from being a tactical tool to a strategic business solution. Combining traditional surveillance technology with AI-based data-driven insights can streamline transportation systems, enhance traffic management, improve situational awareness, optimize resource allocation and streamline emergency response procedures. Read Now

  • Midtown Manhattan Shooting Kills 4, Including NYPD Officer

    Four people were killed, including a NYPD officer, in a midtown Manhattan shooting on Monday. That’s according to CNN. Read Now

New Products

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame.

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.