Latest from Network Transformation/Edge Compute/IoT/URLLC/Automation/M2M

1216 Shifting 1402x672

Shifting to the Cloud — And Doing It Right

Dec. 1, 2016
3 Steps to Guide Your Customers “Cloud” is no longer the technology buzzword it once was. AT&T research found that as many as 90% of tech professionals claim their companies […]

3 Steps to Guide Your Customers

"Cloud" is no longer the technology buzzword it once was. AT&T research found that as many as 90% of tech professionals claim their companies use some form of the Cloud. That same study also reports that 50% of IT spend will shift to the Cloud by 2020. This is not happening in a vacuum. Recent technology advances, such as IoT and data analytics, make Cloud solutions even more advantageous.

I am experiencing the shift firsthand.

AT&T is transitioning to next-generation technology like software-centric networks. The rising demand for high-speed connectivity and "always-on" networking placed the company at a crossroad. We saw that virtualized and SDN networks would help us improve our business operations, better serve our customers, and spur more innovation.

Many other organizations share our view of the Cloud. The hype is real. The benefits are myriad and attainable.

But this is where it gets a little tricky.

The Cloud is not an on/off switch. Businesses want to connect to public and private Clouds. They also want to make sure their workforce is secure, and that their data is secure wherever it resides. Failure to consider Cloud adoption’s real-world challenges could render any benefits moot.

For starters, as network professionals, we have to remember our clients’ priorities and pain points. If we put ourselves in their shoes, we know that effective data management should be our client’s top priority. When mapping out a Cloud strategy, assume that the network manager and his company’s data will often be in motion between multiple access points, Clouds, and applications. For every endpoint, there is at least one point of vulnerability. Emerging trends like the growth of BYOD policies further complicate matters.

Without controls, organizations will have to dedicate more and more resources to sufficiently track and monitor the data traffic for any suspicious activity. This is doubly important when storing sensitive or proprietary data. Inability to manage this risk could result in regulatory penalties, lawsuits, and, of course, a diminished reputation.

Our clients’ organizations need to identify where all critical data and applications live. Not all companies have the resources to house secure, on-premises servers. If they don’t, then we should coach them about how to use colocation data centers. Those can provide the security and performance that can match private servers, all while making applications easier to use and manage.

Relatedly, administrators should also examine application access and performance. Members of organizations can now exhibit more influence around a company’s IT strategy. The barriers that prevented them from doing so in the past no longer exist.

For example, think about your client and his sales manager’s needs. If he wants to start using a Customer Relationship Management application right away, he needs only to find a web-based tool that allows him to access it from anywhere. In today’s world, that can be done immediately. Ten years ago, it would have likely involved a complicated procurement process.

You also have to remember that our clients have employees who are looking for a simple solution to their needs. Absent that simple solution, employees could turn to unauthorized applications. Even if you ignore the obvious security issues, without sufficient planning, the wrong application could be detrimental to overall network and system performance. And as you know, it’s next to impossible to monitor and maintain Cloud traffic and performance when unauthorized applications are part of the equation.

The bottom line is this: it’s necessary to have your clients’ priorities in mind so you can help them create a strategic plan before they make the leap into the Cloud. Do your best to walk in their shoes so you can help alleviate potential problems before they go live. Coach them to build a Cloud strategy that does not ignore or forget key considerations that can make or break their success. Below are a few examples of some helpful, and often overlooked, steps to keep in mind when guiding your customer.

Step 1: Engage a partner to help your move to the Cloud.
Some organizations have the resources to have in-house Cloud specialists to help ensure Cloud applications and systems operate effectively. Many more do not.

An individual or company with expertise in the Cloud and how to connect to the Cloud in a highly secure manner will be able to take inventory of all network assets to determine its readiness for Cloud applications and functionality. They will also be able to reconcile that with Cloud objectives, and provide recommendations regarding platforms and applications to help meet those goals.

Having the "big picture" is essential to Cloud planning, and enlisting a partner can help an organization see it more clearly. Investments in public, private, or hybrid Cloud infrastructure could have a lasting impact, so having the best information on hand is a must.

Step 2: Keep security top-of-mind with every step — in every decision.
Nearly every company I encounter tells me security is a priority. Yet, missteps during the Cloud transition are still incredibly common.

Cloud inherently complicates security because it often requires data to be in motion. Once you take the steps to secure the data in transit, you then have to consider the security at each endpoint. Whether it’s a mobile device or computer, a lot of variables come into play.

Tools like malware protection, intrusion detection, firewalls, and web filtering should be on the checklist for most Cloud adoption scenarios. Using a Cloud access security broker (CASB) should be as well.

A CASB provides an additional level of specialized, security expertise. They can add protections by enforcing security policies tailored to the user organization’s specific needs, industry and regulatory requirements, and access policies.

Step 3: Use Cloud networking and management solutions.
According to RightScale’s 2016 State of the Cloud ReportTM, more than 70% of enterprises use multiple Clouds. The inherent complexity of a multi-Cloud environment can intimidate many network managers. (For more information, please visit https://www.rightscale.com/lp/state-of-the-Cloud.)

The right tool can unify Cloud control for all your applications in a single interface, and simplify network management so managers can redirect resources elsewhere. They can also do this while maintaining high levels of security and performance across the network.

For example, AT&T’s NetBond solution provides users with the ability to easily provision and manage connections to multiple Cloud services. That kind of flexibility can help organizations avoid making costly infrastructure investments in the future.

Mistakes in Cloud adoption are nearly as common as Cloud adoption itself. Whether you are taking it one step at a time or going all in, growing pains are expected. However, many of those issues are avoidable with a little planning and by using readily available resources.

About the Author

Mo Katibeh

Mo Katibeh is SVP, Advanced Solutions, AT&T Business Solutions. He has 15 years of experience in network solutions development and marketing. For more information, please visit www.att.com/security.