IT Experts Weigh in on the Four Steps to Choosing a Cloud Services Vendor

IT Experts Weigh in on the Four Steps to Choosing a Cloud Services Vendor

IT Experts Weigh in on the Four Steps to Choosing a Cloud Services VendorWith so much attention paid to cloud services, you might be surprised to know that only 5 percent of the senior IT professionals we recently polled currently use cloud services for storage, and nearly half have no plans to migrate this year.

With so many practitioners still uncertain and weighing their cloud services options, our team at Wisegate got a roundtable together with senior IT practitioners in medium and large companies who have been through the selection process. Whether your organization is planning a full-scale migration or just moving in that direction with small amounts of data, here are four steps that your peers say should be taken to streamline the process of choosing a vendor.

Step 1: Determine clearly stated objectives for your organization.

There are an overwhelming amount of options when looking for cloud service providers. Having a well-scoped plan in place before you start your search will make it much more efficient. Part of this plan must include clearly-stated objectives outlining what purpose(s) your organization wants to use the cloud. Do you want to use the cloud for storage, development, disaster recovery, backup or testing? Some vendors are stronger than others in these areas and the cloud should not be used as a Band-Aid solution.  Your best bet may end up being a combination of several vendors; however, having your objectives clearly stated will ensure that you find the right cloud vendor.

Step 2: Cast a wide net, and include contractors in your search.

Don’t feel that you have to limit yourself to any certain vendor. Seeking multiple bids is vital to the search process. You may find it helpful to break up your RFPs by objective and seek bids from a wider pool of experts.

While Amazon Web Services is on everyone’s tongues of late, it is not the only option to consider. In addition to Amazon, Wisegate members identified Microsoft, Google and Rackspace as private cloud vendors with whom they are considering contracting. If you run a Microsoft-centric environment, for example, our experts advise you to consider Azure over AWS as a solution.

Once you’ve chosen your vendor, you’ll also want to identify a contractor to operate through. Our members recommend value-added resellers, like Smartronix and DLT Solutions, as valuable tools. Most vendors are generally hands-off when it comes to customer support and having a contractor can make a world of difference. While this may add an extra step to the cloud transition, it may well protect you later on down the line when your organization is actually using the vendor.

Step 3: Plan, plan, plan.

If we’ve found one thing from surveying our members about cloud computing and beyond, it’s that planning is key. Once you’ve chosen your vendor, be prepared to pump the breaks on migration while you re-architect applications. Forklifting large amounts of data into the cloud will only create more work and potential problems for you later. Realistically, you should budget at least a year for migration, and all applications need to be cloud ready before the move. Sensitive data should always be moved last in order to avoid potential security breaches doing major damage.

As any security expert knows, it all comes down to good planning. The cloud is no exception to this rule, and a good plan will help protect your organization.

Step 4: Run your own audits.

The services that are most commonly chosen have their own internal auditing systems. For example, AWS auditing is done through Cloud Trail that records API activity and provides customers log files, including the source IP address of the API caller, the request parameters and the response elements returned by Amazon. Many customers are satisfied with these results; however, the jury is still out on whether they are truly reliable.

Once your organization migrates their most sensitive data, you should be sure to run your own audits on a regular basis using your own PaaS tools. This reiterates the importance of putting sensitive data on the cloud last. Once you know your service is secure, you’ll feel better about moving your most sensitive data onto the cloud, and you’ll feel a greater sense of control over the security of your organization’s data.

Cloud computing should not be discounted as a possibility in your organization. It can be a valuable solution and doesn’t need to be a headache for you, nor does it have to jeopardize your information’s security. With careful planning and a hands-on approach to the search and migration processes, moving to the cloud is not an impossible task. One of the best ways to avoid the pitfalls and learn the real practices that work is to talk to peers who have been through what you are now going through. Our research shows that peers are the #1 most trusted source of information – so start there.

About the Author

Sara Gates is the CEO of Wisegate.

Featured

  • Progressing in Capabilities

    Progressing in Capabilities

    Hazardous areas within industries like oil and gas, manufacturing, agriculture and the like, have long-sought reliable video surveillance cameras and equipment that can operate safely in these harsh and unpredictable environments. Read Now

  • A Comprehensive Nationwide Solution

    A Comprehensive Nationwide Solution

    Across the United States, manufacturing facilities, distribution centers, truck yards, parking lots and car dealerships all have a common concern. They are targets for catalytic converters. In nearly every region, cases of catalytic converter thefts have skyrocketed. Read Now

  • Planning for Your Perimeter

    Planning for Your Perimeter

    The perimeter is an organization’s first line of defense and a critical element of any security and surveillance program. Even if a building’s interior or exterior security is strong, without a solid perimeter surveillance approach any company or business is vulnerable. Read Now

  • The Key Issue

    The Key Issue

    It is February 2014. A woman is getting ready in her room on a cruise ship when she hears a knock on the door; it is a crewmember delivering breakfast. She is not presentable so she tells him to leave it by the door. Read Now

Featured Cybersecurity

New Products

  • Pivot3 Surety

    Pivot3 Surety

    Pivot3 has announced Surety, a new intelligent software framework to simplify the management and monitoring of physical security environments. 3

  • SAFR® from RealNetworks

    SAFR® from RealNetworks

    A unique feature in SAFR version 3.4 is its ability to automate alerts to security personnel when a spoofing attempt or a fraudulent attempt to gain access is detected. 3

  • Dahua 2-Wire IP Video Intercom System

    Dahua 2-Wire IP Video Intercom System

    Dahua Technology is introducing a new line of expandable 2-wire IP video intercom solutions for the North America market. The New 2-wire IP video intercom is more advanced, cost effective, and designed to help businesses increase their security. 3