There was a time when we questioned the viability, if not the necessity of investing in cloud computing. Yet over the last couple years, that question has been answered with a definitive yes.
Today, the subsequent debate has turned to benefits of the private cloud over the public cloud. With pundits on both sides still weighing in, this is a discussion that still rage in many quarters.
Protecting your company’s data is critical. Cloud storage with automated backup is scalable, flexible and provides peace of mind. Cobalt Iron’s enterprise-grade backup and recovery solution is known for its hands-free automation and reliability, at a lower cost. Cloud backup that just works.
Many organizations, citing concerns around security, have been less than enthusiastic about the idea of turning over sensitive customer information and company intellectual property to a 3rd party. They point to breaches such as those experienced by Amazon EC2 and RSA Verisign as evidence that public cloud vendors are less than capable of properly security their data.
For these organizations, the private cloud is the answer.
Yet while it may seem the private cloud is the best compromise – providing the virtualization benefits, cost savings on server hardware, and more security, this is a decision that is still wrought with its own set of perils. It is imperative that organizations understand that housing data internally still requires careful evaluation and planning.
So before you set up a private cloud, here are six things to consider.
The first and most widely publicized concern is security. The private cloud is not inherently more secure.
In fact, a study conducted by Forrester concluded that over half of the companies surveyed had experienced a security breach in the last 18 months. These were private, application development companies, which confirms the fact that security is no less an issue for the private cloud.
In enterprises both large and small, there exists a system of data segmentation that dictates who has access to what information. In essence, security access is handled on a need- to-know basis.
This might imply that there is a lack of trust between business units, but it is a basic tenet of security that the less people that have access to sensitive data, the better.
What this means is that internal network and security staff must be well versed in securing both hosted and bare-metal virtualization. Concerns include locking down the console, controlling software installation, and robust monitoring.
The challenge here is that even companies with mature security departments haven’t gone so far as to have a defined cloud security policy.
Certain industries and business sectors, particularly in healthcare, data storage and financial operations, have a wide and often confusing array of regulatory requirements.
Examples include the Health Insurance Portability and Accountability Act (HIPPA) and the American and EU Data Privacy Directives – each with stiff legal penalties for non-compliance. Among other things, these directives dictate data access, storage and retention requirements.
Factor in the multi-national nature of many of today’s enterprises, and the challenges of managing regulatory and legal requirements go up exponentially. This issue is further complicated by the fact that requirements differ depending on the country in which business is conducted. And conflicting regulations are not uncommon.
Before implementing a private cloud, it is imperative that an assessment of regulatory requirements be performed and that a plan is developed that addresses how to implement the cloud infrastructure accordingly.
Similar to what you might find in terms of agreements between an organization and a public cloud vendor, there are also often agreements set up between business units and IT departments internally. This exists not only in the cloud space, but sometimes in the provisioning of hard disk space, bandwidth or other network resources.
So in order to ensure a set level of service, various types of service level agreements (SLAs) are implemented. This will ensure that expectations for service delivery are established and agreed to by all involved parties.
The SLA simply outlines security and risks. There is also an Operating Level Agreement or OLA, which helps lay out relationships between groups and identifies who does what in terms of support. This is essentially a responsibilities document.
And there are other documents, including the Terms of Usage or User License agreements. These documents also often outline penalties if terms are not met. Company size and needs are determining factors of which agreements are signed.
This next concern should actually be included in the initial planning, prior even to security. Organizations have a myriad of applications, some better suited to the cloud environment than others. Some applications, because of the way they are architected, are not suited to run in a virtualized environment.
Evaluating criteria could include technical requirements of the app, cost savings, and how critical it is to the company mission.
Take, for example, an internally developed legacy application currently running on a Unix-based system. Though there may be benefits to porting to a private cloud architecture, it is highly likely that it may not be technically capable of operating in a virtualized environment. In this case, one would have to consider a complete application rewrite or purchasing a commercial product.
The one constant in technology is change. Consequently, even this initial analysis should continue periodically as technologies, application and organizational requirements change.
Depending on where data resides — on a virtualized server in Europe, versus one in the U.S., for instance — end users will experience different application performance levels. So before implementing a private cloud, an organization must decide on the best location for the data.
In addition, tools or technologies (like caching and packet manipulation) that help deal with performance issues can be evaluated.
All of the considerations mentioned above really point to one glaring issue. Whether it is security, regulatory compliance, performance planning or other tasks, an organization must have the skills, in-house, to support the private cloud implementation.
Cloud vendors often have the advantage here, and lack of skills in-house is often cited as a reason that many enterprises select to go with a public cloud. Third party vendors often have the specific skills needed to perform the evaluation, implementation, maintenance and ongoing support. In contrast, smaller companies and even some larger ones do not.
Let’s look at some of the necessary skills:
• IT Security Project/Program Manager
• IT Application & Network Security Analyst
• Network Performance Analyst
• IT Regulatory Compliance and Assessment
• Virtualization Experts
In addition to these skills, there may be a need to have certain staff available on-call on a 24-hour basis. And as cloud vendors are able to provide more perks in the way of education, focus on technology, and room for growth, companies that have a different business core may not be able to offer the same benefits and enticements. And there are also the issues of budget and learning curve for retraining existing staff.
In the end, despite all the challenges, the private cloud may still the best option for many organizations. And this is not an attempt to persuade them otherwise. The key takeaway is that planning from technical, human resources, and regulatory perspectives is essential to a successful private cloud deployment.
Huawei’s AI Update: Things Are Moving Faster Than We Think
FEATURE | By Rob Enderle,
December 04, 2020
Keeping Machine Learning Algorithms Honest in the ‘Ethics-First’ Era
ARTIFICIAL INTELLIGENCE | By Guest Author,
November 18, 2020
Key Trends in Chatbots and RPA
FEATURE | By Guest Author,
November 10, 2020
FEATURE | By Samuel Greengard,
November 05, 2020
ARTIFICIAL INTELLIGENCE | By Guest Author,
November 02, 2020
How Intel’s Work With Autonomous Cars Could Redefine General Purpose AI
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
October 29, 2020
Dell Technologies World: Weaving Together Human And Machine Interaction For AI And Robotics
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
October 23, 2020
The Super Moderator, or How IBM Project Debater Could Save Social Media
FEATURE | By Rob Enderle,
October 16, 2020
FEATURE | By Cynthia Harvey,
October 07, 2020
ARTIFICIAL INTELLIGENCE | By Guest Author,
October 05, 2020
CIOs Discuss the Promise of AI and Data Science
FEATURE | By Guest Author,
September 25, 2020
Microsoft Is Building An AI Product That Could Predict The Future
FEATURE | By Rob Enderle,
September 25, 2020
Top 10 Machine Learning Companies 2020
FEATURE | By Cynthia Harvey,
September 22, 2020
NVIDIA and ARM: Massively Changing The AI Landscape
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
September 18, 2020
Continuous Intelligence: Expert Discussion [Video and Podcast]
ARTIFICIAL INTELLIGENCE | By James Maguire,
September 14, 2020
Artificial Intelligence: Governance and Ethics [Video]
ARTIFICIAL INTELLIGENCE | By James Maguire,
September 13, 2020
IBM Watson At The US Open: Showcasing The Power Of A Mature Enterprise-Class AI
FEATURE | By Rob Enderle,
September 11, 2020
Artificial Intelligence: Perception vs. Reality
FEATURE | By James Maguire,
September 09, 2020
Anticipating The Coming Wave Of AI Enhanced PCs
FEATURE | By Rob Enderle,
September 05, 2020
The Critical Nature Of IBM’s NLP (Natural Language Processing) Effort
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
August 14, 2020
Datamation is the leading industry resource for B2B data professionals and technology buyers. Datamation's focus is on providing insight into the latest trends and innovation in AI, data security, big data, and more, along with in-depth product recommendations and comparisons. More than 1.7M users gain insight and guidance from Datamation every year.
Advertise with TechnologyAdvice on Datamation and our other data and technology-focused platforms.
Advertise with Us
Property of TechnologyAdvice.
© 2025 TechnologyAdvice. All Rights Reserved
Advertiser Disclosure: Some of the products that appear on this
site are from companies from which TechnologyAdvice receives
compensation. This compensation may impact how and where products
appear on this site including, for example, the order in which
they appear. TechnologyAdvice does not include all companies
or all types of products available in the marketplace.