IT Experts Weigh in on the Four Steps to Choosing a Cloud Services Vendor

IT Experts Weigh in on the Four Steps to Choosing a Cloud Services Vendor

IT Experts Weigh in on the Four Steps to Choosing a Cloud Services VendorWith so much attention paid to cloud services, you might be surprised to know that only 5 percent of the senior IT professionals we recently polled currently use cloud services for storage, and nearly half have no plans to migrate this year.

With so many practitioners still uncertain and weighing their cloud services options, our team at Wisegate got a roundtable together with senior IT practitioners in medium and large companies who have been through the selection process. Whether your organization is planning a full-scale migration or just moving in that direction with small amounts of data, here are four steps that your peers say should be taken to streamline the process of choosing a vendor.

Step 1: Determine clearly stated objectives for your organization.

There are an overwhelming amount of options when looking for cloud service providers. Having a well-scoped plan in place before you start your search will make it much more efficient. Part of this plan must include clearly-stated objectives outlining what purpose(s) your organization wants to use the cloud. Do you want to use the cloud for storage, development, disaster recovery, backup or testing? Some vendors are stronger than others in these areas and the cloud should not be used as a Band-Aid solution.  Your best bet may end up being a combination of several vendors; however, having your objectives clearly stated will ensure that you find the right cloud vendor.

Step 2: Cast a wide net, and include contractors in your search.

Don’t feel that you have to limit yourself to any certain vendor. Seeking multiple bids is vital to the search process. You may find it helpful to break up your RFPs by objective and seek bids from a wider pool of experts.

While Amazon Web Services is on everyone’s tongues of late, it is not the only option to consider. In addition to Amazon, Wisegate members identified Microsoft, Google and Rackspace as private cloud vendors with whom they are considering contracting. If you run a Microsoft-centric environment, for example, our experts advise you to consider Azure over AWS as a solution.

Once you’ve chosen your vendor, you’ll also want to identify a contractor to operate through. Our members recommend value-added resellers, like Smartronix and DLT Solutions, as valuable tools. Most vendors are generally hands-off when it comes to customer support and having a contractor can make a world of difference. While this may add an extra step to the cloud transition, it may well protect you later on down the line when your organization is actually using the vendor.

Step 3: Plan, plan, plan.

If we’ve found one thing from surveying our members about cloud computing and beyond, it’s that planning is key. Once you’ve chosen your vendor, be prepared to pump the breaks on migration while you re-architect applications. Forklifting large amounts of data into the cloud will only create more work and potential problems for you later. Realistically, you should budget at least a year for migration, and all applications need to be cloud ready before the move. Sensitive data should always be moved last in order to avoid potential security breaches doing major damage.

As any security expert knows, it all comes down to good planning. The cloud is no exception to this rule, and a good plan will help protect your organization.

Step 4: Run your own audits.

The services that are most commonly chosen have their own internal auditing systems. For example, AWS auditing is done through Cloud Trail that records API activity and provides customers log files, including the source IP address of the API caller, the request parameters and the response elements returned by Amazon. Many customers are satisfied with these results; however, the jury is still out on whether they are truly reliable.

Once your organization migrates their most sensitive data, you should be sure to run your own audits on a regular basis using your own PaaS tools. This reiterates the importance of putting sensitive data on the cloud last. Once you know your service is secure, you’ll feel better about moving your most sensitive data onto the cloud, and you’ll feel a greater sense of control over the security of your organization’s data.

Cloud computing should not be discounted as a possibility in your organization. It can be a valuable solution and doesn’t need to be a headache for you, nor does it have to jeopardize your information’s security. With careful planning and a hands-on approach to the search and migration processes, moving to the cloud is not an impossible task. One of the best ways to avoid the pitfalls and learn the real practices that work is to talk to peers who have been through what you are now going through. Our research shows that peers are the #1 most trusted source of information – so start there.

About the Author

Sara Gates is the CEO of Wisegate.

Featured

  • The Key to Wellbeing in the Office

    A few years ago, all we saw in the news was the ‘great resignation.’ Now we have another ‘great’ to deal with. According to CBRE, 2023 was the start of the ‘great return’ as office workers returned to their normal offices after working from home. The data shows that two-thirds of all U.S office buildings were more than 90% leased as of Q2 2023. Read Now

  • Failed Cybersecurity Controls Costing U.S. Businesses $30 Billion Yearly

    Panaseer recently released ControlWatch and the Continuous Controls Battle: Panaseer 2025 Security Leaders Report examining the cost of cybersecurity control failures and the impact of growing personal liability for security failings on security leaders. The report analyzes the findings of a survey of 400 security decision makers (SDMs) across the US and UK. It shows that security leaders feel under increasing pressure to provide assurances around cybersecurity, exposing them to greater personal risk – yet many lack the data and resources to accurately report and close cybersecurity gaps. Read Now

  • The Business Case for Video Analytics: Understanding the Real ROI

    For security professionals who may be hesitant to invest in video analytics, now's the time to reconsider. In a newly released Omdia report commissioned by BriefCam (now Milestone Systems), the research firm uncovered a compelling story: more than 85% of North American and European organizations that use video analytics achieve a return on investment within just one year. The study, which surveyed 140 end users across multiple industries, demonstrates that security technology is no longer just for security — it's a cross-organizational tool that delivers measurable business value far beyond traditional safety applications. Read Now

  • Survey: 54% of Organizations Cite Technical Debt as Top Hurdle to Identity System Modernization

    Modernizing identity systems is proving difficult for organizations due to two key challenges: decades of accumulated Identity and Access Management (IAM) technical debt and the complexity of managing access across multiple identity providers (IDPs). These findings come from the new Strata Identity-commissioned report, State of Multi-Cloud Identity: Insights and Trends for 2025. The report, based on survey data from the Cloud Security Alliance (CSA), highlights trends and challenges in securing cloud environments. The CSA is the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment. Read Now

Featured Cybersecurity

Webinars

New Products

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening. 3