Welcome!

Containers Expo Blog Authors: Yeshim Deniz, AppDynamics Blog, Pat Romanski, David Paquette, Flint Brenton

Related Topics: @CloudExpo, Java IoT, Microservices Expo, Containers Expo Blog, Cloud Security, @BigDataExpo

@CloudExpo: Article

It’s Money That Matters in the Cloud… Well, At Least ROI

Cloud security closes the risk versus reward gap

With all the talk of fiscal cliffs sequestrations, financial binds and “next year’s budget,” I started thinking about cloud security in more tangible ways. Specifically returns on investment, economic impact and total costs of ownership. Just like death and taxes, businesses can add intrusion and attack to the list of sureties. I can hear CFOs all over the world sigh in exasperation as they feel pressured to add another expense line item to minimize the building security threats to their enterprises.

Before you add another decimal place to security budgets, maybe it’s time you consider the how cloud-deployed security options can not only address the complexities of enterprise security ably, but do so at considerable savings.

Study after study promotes that a cloud computing model saves organization money. We know that more and more functionality is moving to the cloud. For things like CRM or other standard business applications, it simply makes sense. We recognize the limited time and funding to run and maintain enterprise applications and the cloud provides that great equalizer. This model extends itself to cloud security and security-as-a-service.

First there are the over-arching savings of cloud-computing in general:

  • Elimination of CapEx costs: no hardware or software to buy (Any “cloud” company that asks you to install a server on your premises to monitor your enterprise isn’t cloud)
  • Pay-as-you-go scalable: Most cloud providers can offer considerable cost savings through economies of scale. The ability to adjust the level of service necessary (elastic provisioning) creates flexibility for increased margins and cost-controls.
  • Zero-day start/On demand delivery of service: no waiting time after the service has been purchased to develop and configure a complex system. This means no development hell or waiting for Phase 2 to be complete in order to start reaping benefits.
  • Head count savings: included in most cloud services are the personnel costs (salary, benefits, overhead, churn/hiring costs) a company does not need to invest in more people and gains the benefit of the security expertise and tribal knowledge of the cloud security provider.
  • Best-of breed resource/expertise expansion: Companies improve their overall business agility through proven technologies supported and updated by the core competencies of the developers. Meanwhile CIOs get to move more IT budget to innovation or enablement programs.

But where are the benefits of cloud security from an ROI perspective:

  • 24/7 Availability: Cloud security is about continuous monitoring.  To properly secure the expanding footprint of an enterprise’s IT landscape, there must be the vigilance to catch analyze and remediate issues as quickly as possible. Like a cancer, if security issues go undetected, they can metastasize and spread. Having a professional monitor a network 7/24/365 (in real time) seems like a luxury for Fortune 500 companies. Cloud security makes this option available for the most modest organizations. The holes in security that are created through intermittent monitoring, vague automation settings and periodic machine log reviews will cost an organization.  But continuous monitoring isn’t a cost center. Preventive and proactive security creates reduced risk (without additional man hours) which allows for redeployed resources and a realignment based of business needs.
  • Unification: The agility from the cloud allows companies to leverage the capabilities of various security solutions looking at multiple parts of the enterprise. This includes intrusion detection, credentialing, access, SSO, web authentication and compliance audits. It not only allows an enterprise to acquire more and greater functionality for virtually the same cost, but it also centralizes the collective intelligence and provides the advantage enhanced visibility through correlated and situational context. This, in turn, creates better and faster decisions which streamline resources and save money.
  • Improved productivity Although there are many examples of this within cloud based security, I will point to one (and use future blogs to expound on others). Using identity management, companies can automatically provision and deprovision users. This service alone can save 75% of the requests across the enterprise. Imagine the additional savings when IT is not slogged down with forgotten password requests/resets along with managing credentials. There are studies that prove that this alone saves companies nearly $200K per year. Now with better employee productivity (because this helps solve BYOD issues) and certain portions of your network safe from data theft and leakage, IT can concentrate on business issues that drive revenue.
  • Compliance: Dozens of man hours are typically needed each month to complete all the reports needed to satisfy a regulatory agency auditor; and for most companies, it’s not just one agency, but several. Through real time correlation, most of the work of identifying, capturing, encrypting and storing(or destroying) certain pieces of information and providing the proof  your best practices are in line with internal and external policies is easier. Because of unification, multi-silo collection and security centralization, 75 hours per month becomes 10. And more importantly, the degree of accuracy of the reporting is significantly better.  And with better reports, the threat of fines disappears.

Gartner estimates the annual cost to own and manage traditional on premise security software applications can be 4X the initial purchase. This is chiefly due to the need to acquire and maintain the resources to support the deployment. In many cases, for less than what a company pays for in support and maintenance of these on premise initiatives, they could have twice the capability from the cloud.

When it’s money that matters, the bottom line should be as much about saving as it is spending; as long as the result is a positive return on the investment. Enterprise security is not different. For years seen as a cost center, through cloud-based solutions it can now be redefined as a revenue enablement mechanism. Certainly there are costs involved in a maintaining a safe network perimeter, protecting and securing data and compliance auditing. However, by exploiting the benefits and strengths provided by cloud based security, you can prudently and effectively contain the issues with plentiful resources to reinvest in your core competencies and focus on driving business forward. Security issues will not go away, but you can direct less at them and in return, receive more greater results.

When looking at the cloud in term of security…sometimes you can have your cake and eat it too.

 

Kevin Nikkhoo
www.cloudaccess.com

More Stories By Kevin Nikkhoo

With more than 32 years of experience in information technology, and an extensive and successful entrepreneurial background, Kevin Nikkhoo is the CEO of the dynamic security-as-a-service startup Cloud Access. CloudAccess is at the forefront of the latest evolution of IT asset protection--the cloud.

Kevin holds a Bachelor of Science in Computer Engineering from McGill University, Master of Computer Engineering at California State University, Los Angeles, and an MBA from the University of Southern California with emphasis in entrepreneurial studies.

@ThingsExpo Stories
Complete Internet of Things (IoT) embedded device security is not just about the device but involves the entire product’s identity, data and control integrity, and services traversing the cloud. A device can no longer be looked at as an island; it is a part of a system. In fact, given the cross-domain interactions enabled by IoT it could be a part of many systems. Also, depending on where the device is deployed, for example, in the office building versus a factory floor or oil field, security ha...
24Notion is full-service global creative digital marketing, technology and lifestyle agency that combines strategic ideas with customized tactical execution. With a broad understand of the art of traditional marketing, new media, communications and social influence, 24Notion uniquely understands how to connect your brand strategy with the right consumer. 24Notion ranked #12 on Corporate Social Responsibility - Book of List.
Fact is, enterprises have significant legacy voice infrastructure that’s costly to replace with pure IP solutions. How can we bring this analog infrastructure into our shiny new cloud applications? There are proven methods to bind both legacy voice applications and traditional PSTN audio into cloud-based applications and services at a carrier scale. Some of the most successful implementations leverage WebRTC, WebSockets, SIP and other open source technologies. In his session at @ThingsExpo, Da...
Businesses are struggling to manage the information flow and interactions between all of these new devices and things jumping on their network, and the apps and IT systems they control. The data businesses gather is only helpful if they can do something with it. In his session at @ThingsExpo, Chris Witeck, Principal Technology Strategist at Citrix, will discuss how different the impact of IoT will be for large businesses, expanding how IoT will allow large organizations to make their legacy ap...
What happens when the different parts of a vehicle become smarter than the vehicle itself? As we move toward the era of smart everything, hundreds of entities in a vehicle that communicate with each other, the vehicle and external systems create a need for identity orchestration so that all entities work as a conglomerate. Much like an orchestra without a conductor, without the ability to secure, control, and connect the link between a vehicle’s head unit, devices, and systems and to manage the ...
What does it look like when you have access to cloud infrastructure and platform under the same roof? Let’s talk about the different layers of Technology as a Service: who cares, what runs where, and how does it all fit together. In his session at 18th Cloud Expo, Phil Jackson, Lead Technology Evangelist at SoftLayer, an IBM company, spoke about the picture being painted by IBM Cloud and how the tools being crafted can help fill the gaps in your IT infrastructure.
For basic one-to-one voice or video calling solutions, WebRTC has proven to be a very powerful technology. Although WebRTC’s core functionality is to provide secure, real-time p2p media streaming, leveraging native platform features and server-side components brings up new communication capabilities for web and native mobile applications, allowing for advanced multi-user use cases such as video broadcasting, conferencing, and media recording.
In this strange new world where more and more power is drawn from business technology, companies are effectively straddling two paths on the road to innovation and transformation into digital enterprises. The first path is the heritage trail – with “legacy” technology forming the background. Here, extant technologies are transformed by core IT teams to provide more API-driven approaches. Legacy systems can restrict companies that are transitioning into digital enterprises. To truly become a lea...
In his session at @ThingsExpo, Kausik Sridharabalan, founder and CTO of Pulzze Systems, Inc., will focus on key challenges in building an Internet of Things solution infrastructure. He will shed light on efficient ways of defining interactions within IoT solutions, leading to cost and time reduction. He will also introduce ways to handle data and how one can develop IoT solutions that are lean, flexible and configurable, thus making IoT infrastructure agile and scalable.
SYS-CON Events announced today that Sheng Liang to Keynote at SYS-CON's 19th Cloud Expo, which will take place on November 1-3, 2016 at the Santa Clara Convention Center in Santa Clara, California.
Just over a week ago I received a long and loud sustained applause for a presentation I delivered at this year’s Cloud Expo in Santa Clara. I was extremely pleased with the turnout and had some very good conversations with many of the attendees. Over the next few days I had many more meaningful conversations and was not only happy with the results but also learned a few new things. Here is everything I learned in those three days distilled into three short points.
Cognitive Computing is becoming the foundation for a new generation of solutions that have the potential to transform business. Unlike traditional approaches to building solutions, a cognitive computing approach allows the data to help determine the way applications are designed. This contrasts with conventional software development that begins with defining logic based on the current way a business operates. In her session at 18th Cloud Expo, Judith S. Hurwitz, President and CEO of Hurwitz & ...
So, you bought into the current machine learning craze and went on to collect millions/billions of records from this promising new data source. Now, what do you do with them? Too often, the abundance of data quickly turns into an abundance of problems. How do you extract that "magic essence" from your data without falling into the common pitfalls? In her session at @ThingsExpo, Natalia Ponomareva, Software Engineer at Google, provided tips on how to be successful in large scale machine learning...
An IoT product’s log files speak volumes about what’s happening with your products in the field, pinpointing current and potential issues, and enabling you to predict failures and save millions of dollars in inventory. But until recently, no one knew how to listen. In his session at @ThingsExpo, Dan Gettens, Chief Research Officer at OnProcess, will discuss recent research by Massachusetts Institute of Technology and OnProcess Technology, where MIT created a new, breakthrough analytics model f...
The Transparent Cloud-computing Consortium (abbreviation: T-Cloud Consortium) will conduct research activities into changes in the computing model as a result of collaboration between "device" and "cloud" and the creation of new value and markets through organic data processing High speed and high quality networks, and dramatic improvements in computer processing capabilities, have greatly changed the nature of applications and made the storing and processing of data on the network commonplace.
The Internet of Things can drive efficiency for airlines and airports. In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect with GE, and Sudip Majumder, senior director of development at Oracle, will discuss the technical details of the connected airline baggage and related social media solutions. These IoT applications will enhance travelers' journey experience and drive efficiency for the airlines and the airports. The session will include a working demo and a technical d...
Almost two-thirds of companies either have or soon will have IoT as the backbone of their business in 2016. However, IoT is far more complex than most firms expected. How can you not get trapped in the pitfalls? In his session at @ThingsExpo, Tony Shan, a renowned visionary and thought leader, will introduce a holistic method of IoTification, which is the process of IoTifying the existing technology and business models to adopt and leverage IoT. He will drill down to the components in this fra...
Digital transformation is too big and important for our future success to not understand the rules that apply to it. The first three rules for winning in this age of hyper-digital transformation are: Advantages in speed, analytics and operational tempos must be captured by implementing an optimized information logistics system (OILS) Real-time operational tempos (IT, people and business processes) must be achieved Businesses that can "analyze data and act and with speed" will dominate those t...
If you had a chance to enter on the ground level of the largest e-commerce market in the world – would you? China is the world’s most populated country with the second largest economy and the world’s fastest growing market. It is estimated that by 2018 the Chinese market will be reaching over $30 billion in gaming revenue alone. Admittedly for a foreign company, doing business in China can be challenging. Often changing laws, administrative regulations and the often inscrutable Chinese Interne...
I'm a lonely sensor. I spend all day telling the world how I'm feeling, but none of the other sensors seem to care. I want to be connected. I want to build relationships with other sensors to be more useful for my human. I want my human to understand that when my friends next door are too hot for a while, I'll soon be flaming. And when all my friends go outside without me, I may be left behind. Don't just log my data; use the relationship graph. In his session at @ThingsExpo, Ryan Boyd, Engi...