Cloud Adoption & Migration | Cloud industry forum

Cloud Adoption & Migration

This section focuses on the key factors organisations need to address in the design, migration and cloud adoption process.

Resources found: 63
We are delighted to present the latest Cloud Industry Forum research paper, entitled “Cloud – the next generation”. This paper is free of charge to download, (just subscribe to our news services) and you will have access to the latest news and views from the Forum in relation to what’s happening in...
Author: 
Access level: 
Subscriber & Member
How the CIO can adjust to the new realities of digital transformation and accelerate business change
Author: 
Access level: 
Subscriber & Member
With data traffic exploding, customer expectations rising, disruptive competitors emerging and cost pressures intensifying, the move to cloud is critical for achieving the agility and pace of innovation required to be successful in today’s changing market. The Cloud Industry Forum commissioned this...
Author: 
Access level: 
Subscriber & Member
Olusola Akinrolabu, of the Centre for Doctoral Training (CDT) in Cyber Security at the University of Oxford has conducted a series of studies in relation to cloud risk assessment and have introduced several novel concepts for assessing cloud provider risks. The team have identified a significant...
Author: 
Access level: 
Public
TM_logo_red_2c_rgb.jpg In 2018, digital extortion will be at the core of most cybercriminals’ business model and will propel them into other schemes that will get their hands on potentially hefty payouts. Vulnerabilities in IoT devices will expand the attack surface as devices get further woven...
Author: 
Access level: 
Public
Spending money on cyber security, we are told, has become the most important investment a company can make. It is said that companies large and small are not investing the right amount or, indeed, in the right things.
Access level: 
Public
This guidance has been published by the Information Commissioners office in March 2017 to help organisations to prepare for the introduction of the General Data Protection Regulation which takes effect in the UK in May 2018.
Author: 
Access level: 
Public
Organisations all over EMEA are waking up to the transformative possibilities offered by public cloud computing deployments. The drive for greater IT efficiency, business agility, and productivity has become an increasingly urgent one—especially since those businesses that tap the cloud effectively begin to pull ahead of their rivals. Yet, anecdotal evidence and quantitative surveys tell us that security is still a major barrier to greater cloud adoption.
Author: 
Access level: 
Subscriber & Member
For customers procuring cloud services, it is essential to understand fully the impact of data protection and privacy on the process. The areas of greatest concern are focused specifically on how a customer selects a supplier who is compliant with all the necessary legal obligations that affect it, how to identify and mitigate service risk, and how to allocate liability for the service between a customer and supplier according to the price of the service and risk the supplier accepts. How that liability is effectively allocated and how it impacts sub-contractors in the supply chain is also an issue.
Author: 
Access level: 
Member only
Despite Britain voting to leave the EU, little in reality will change from a data protection and privacy perspective. In order to trade freely with the world’s largest single market, the UK government will have to enforce regulations on a par with the forthcoming regulation. The message is clear for UK IT security professionals: stay on the path towards GDPR compliance.
Author: 
Access level: 
Public
Today's technology systems must be built for resilience. They must be engineered to survive natural disasters such as storms, power outages, and water damage—as well as human error, hardware malfunctions, and software failures. In this year’s report, we examine the ability of businesses to maintain service even in the face of threats and challenges.
Author: 
Access level: 
Public
Demand for cloud-based applications is growing in both the consumer and business spheres. Hybrid cloud computing combines private and public cloud resources. This model will radically change the design and management of corporate networks – as hybrid cloud computing also requires a hybrid network infrastructure.
Author: 
Access level: 
Public
This paper from Zynstra tackles the challenge of delivering modern IT services in multisite organisations. It identifies the key issues and looks to address the difficulties of branch IT service delivery.
Author: 
Access level: 
Public
This paper from Atos describes the structural challenges enterprises are facing when establishing an outsourced SIaM function. Several Best Practices such as a functional blueprint, tooling considerations and partner alignment prerequisites (Commonly Shared KPIs, a SIaM Information model and the Service Catalogue) provide guidance for anyone on the SIaM journey. Finally the Outlook chapter explains the evolution of Service Integration towards Business Process Agility and links this capability to underlying technical capabilities such as Service Brokerage, Cloud Orchestration and Cloud Messaging. The Conclusions chapter lists a set of key take-away.
Author: 
Access level: 
Subscriber & Member
A recent roundtable event, organised by the Cloud Industry Forum, and sponsored by Dell, brought together a range of Cloud security experts, all happy to share their views on the topic, providing fascinating insight into the disconnect that often exists between vendors and their customers.
Author: 
Access level: 
Public
As with all IT implementations a cloud migration needs to meet the business goals and the best way to measure whether the business goals have been satisfied is to have a clear quality assurance delivery programme. The focus of this guide is to ensure the delivery is fit for purpose and works for your organisation.
Author: 
Access level: 
Member only

This is not a paper about why or if you should migrate to a cloud environment, whether for one particular application or for your entire infrastructure, or for something in-between. Nor is it a paper about which provider of cloud infrastructure, applications or services you should choose to partner with. What this paper is about are the technical considerations that you should bear in mind during the process of moving to, or implementing, products or solutions that are cloud based. Note that we are specifically concerned with technical issues rather than with any personal, political or other concerns that may arise. In other words, we are principally concerned with "what" and "how": what issues you need to think about and, how, in general terms, these can be resolved.

Author: 
Access level: 
Subscriber & Member
Are you heading for a Cloud thunderstorm? Having a QA and testing framework while selecting and implementing a cloud service can help you avoid a lightning strike
Author: 
Access level: 
Public
Slides from Cloud Expo 2015 keynote presentations. Richard Munro CTO – vCloud Air EMEA
Author: 
Access level: 
Member only
Slides from Cloud Expo 2015 keynote presentations. Johan Holder. Co-founder, Kazoop
Author: 
Access level: 
Member only
Slides from Cloud Expo 2015 keynote presentations. Antonio Piraino, CTO, ScienceLogic
Author: 
Access level: 
Member only
Slides from Cloud Expo 2015 keynote presentations. Doug Clark @cloudstuff, IBM
Author: 
Access level: 
Member only
Outsourcing elements of your IT infrastructure to an external hosting provider necessarily demands a different approach to governance than with traditional dedicated environments. This paper maps out some high-level recommendations to common governance standards to ease their successful implementation in cloud environments
Author: 
Access level: 
Subscriber & Member
Inside this paper you will find an introduction to what the Cloud is about – and why you need to take it seriously, along with my four most recent columns that seek to address how the Board, together with the CIO, should give practical substance to their paranoid optimism!
Author: 
Access level: 
Subscriber & Member
How are government departments planning to deliver transformative services, previously managed entirely by a small number of major suppliers? This paper discusses the best practice steps to achieve disaggregation and how to avoid the pitfalls associated with such a significant overhaul.
Access level: 
Subscriber & Member
“Shadow IT” presents significant threats to your information security and availability that can impact your customers, and in turn affect your revenue. In some cases, customers may leave if you have a sustained outage or loss of client data.
Author: 
Access level: 
Subscriber & Member
Companies and IT organizations are exploring migrating to a cloud architecture today in order to rein in IT costs, gain the flexibility and agility to deliver new and better services, and meet rapidly evolving business requirements.
Author: 
Access level: 
Public
The predictions that many industry pundits have been making about the rise of Bring Your Own Device (BYOD) are coming to fruition. The surprise is that it is happening at a much-accelerated rate in businesses of all sizes, around the world.
Author: 
Access level: 
Subscriber & Member
As more organizations establish a goal of building out internal cloud services, it becomes the responsibility of IT departments to plan and implement this transition.
Author: 
Access level: 
Member only
The idea cloud can’t be used by regulated industries doesn’t stand up to scrutiny. Indeed, there are many ways in which the technology can be deployed…
Author: 
Access level: 
Subscriber & Member
Cloud Messaging will help enterprises to achieve seamless integration of business processes spanning multiple applications, clouds and smart devices. This Ascent White Paper explains the concept and describes the learnings from a Healthcare sector Proof-of-Concept.
Author: 
Access level: 
Subscriber & Member
We discuss cloud security concerns and why businesses needn’t worry so much with Peter Groucutt, managing director of Databarracks.
Author: 
Access level: 
Public
The purpose of this paper is to provide a framework of understanding around the use of cloud computing technology, and suggest a process to create and implement your own enterprise cloud strategy for your organization.
Author: 
Access level: 
Subscriber & Member
Moving to the cloud has plenty of implications for the way that data governance is handled within organisations. How should firms approach this?
Author: 
Access level: 
Subscriber & Member
The Databarracks annual Data Health Check surveys hundreds of IT professionals across 19 different fields to capture a snapshot of the way businesses use and think about IT. Here are the highlights from 2014.
Author: 
Access level: 
Member only
The law around cloud has been confusing, particularly when national boundaries are taken into account. But that could be about to change...
Author: 
Access level: 
Member only
Set of slides from the Cloud Expo 2014 exhibitions keynote presentations. Martin Prendergast. Member, Cloud Industry Forum. CEO, Concorde Solutions
Author: 
Access level: 
Member only
This White Paper describes the technical challenges and potential solutions for preserving digital artifacts, for long intervals of time (several decades, centuries) in a new world of massive, distributed data.
Author: 
Access level: 
Member only
What should your first steps be when formulating a security policy for cloud use? Davey Winder has been talking to the experts about this very subject. Read on to find out more…
Author: 
Access level: 
Member only
Set of slides from the Cloud Expo 2014 exhibitions keynote presentations. Antonio Piraino, CTO ScienceLogic. Member, Cloud Industry Forum
Author: 
Access level: 
Member only
Gartner projects IaaS investments will continue to grow significantly through to 2017, seeing a compound annual growth rate of 37.3%.
Author: 
Access level: 
Member only
Businesses are beginning to make the most of their data, but they to need to ensure security issues are sorted out first...
Author: 
Access level: 
Subscriber & Member
We speak to Conor Ward, consultant with international law firm Hogan Lovells and chair of the CIF Legal Forum, about the current state of play.
Author: 
Access level: 
Public
Your business is ready to reap the rewards of the software defined cloud era. Is your IT organization ready to deliver?
Author: 
Access level: 
Member only
Penetration testing is a customer-sanctioned intrusion of a network or computing infrastructure by a specialist 3rd party.
Author: 
Access level: 
Member only
Migrating a data centre is too uncomfortably similar to childbirth many months of careful planning lead to 48 hours of sheer panic, a welcome burst of momentary relief and a few months more of anxiety attacks as you adjust to your new normal.
Author: 
Access level: 
Subscriber & Member
Virtualisation plays an important part in many IT transformation plans, but few organisations take the time to investigate the effects that this strategy has on their existing software estate, licensing deployment and behaviour in the virtualised world
Author: 
Access level: 
Member only
We speak to Martin Prendergast, CEO and co-founder of Concorde, about the changing nature of software asset management and the role cloud plays here
Author: 
Access level: 
Public
Is cloud the nirvana of IT deployment models? Will everything make the transition to the cloud? Are we facing the terminal demise of on-premise IT? This comprehensive e-book from CIF and CloudPro examines a broad section of topics related to the adoption of cloud in the enterprise. Advice, insight and guidance to help you make tomorrow’s tech decisions, today.
Author: 
Access level: 
Public

The results of this survey show that interest in the use of SaaS applications among organisations in Germany and the UK is increasing; with flexibility, access by mobile devices and always-on availability being the primary drivers. However, security is still seen as the greatest inhibitor, including the need to protect data from being accessed inappropriately. Identity and access management technologies play a key role in authenticating users according to the rights that they have been granted. Today, there are relatively new breeds of identity management services that extend identity and access management capabilities to externally provisioned applications as well as catering to the needs of both mobile and external users, such as customer and business partners. Such services provide an efficient means of assuaging some of the prime security concerns that organisations have in subscribing to SaaS services.

Author: 
Access level: 
Public
Cloud Computing does not scale well. Such a bold statement may seem incorrect given that according to accepted wisdom, scalability is one of the essential properties that make Cloud Computing so attractive to businesses. This Paper explores this apparent contradiction and proposes potential solutions based on research conducted by the Atos Scientific Community.
Author: 
Access level: 
Public
Big Data and Cloud, two of the trends that are defining the emerging Enterprise Computing, show a lot of potential for a new era of combined applications.
Author: 
Access level: 
Subscriber & Member
For law firms and corporate legal departments, the dynamics of a cloud delivery approach can be especially attractive—making it possible to increase staff productivity, deliver better client service, and improve business agility while reducing expense.
Author: 
Access level: 
Member only
A survey by IDG Research Services reveals that organizations face confusion in researching cloud options, forcing them to adjust goals and search for more flexible and open cloud solutions that can help them prevent vendor lock-in.
Author: 
Access level: 
Subscriber & Member
A year is a long time in the cloud sector. Last year we wrote “The Real Challenges and Benefits of Cloud Computing to Law Firms”. In preparing that paper we interviewed a number of technology directors at law firms to gauge their attitudes to cloud computing, whether their firm had adopted cloud (or was looking to do so) and what type.
Author: 
Access level: 
Public

Cloud-based applications and services, and software-as-a-service applications in particular, are coming into widespread use by organisations of all sizes. Such applications are used to process and store sensitive information making it imperative that user access rights are tightly controlled to ensure that information is secure from loss or theft and remains private. This paper discusses recent developments in identity and access management technologies that aim to extend such controls to services provided from external sources.

Author: 
Access level: 
Public
In the UK today over 50 per cent of organisations have formally utilised at least one Cloud service and satisfaction levels relating to that experience grew to an astonishing 96 per cent by the end of 2011. Furthermore, 85 per cent of IT Executives stated that they now formally considered Cloud as a viable option for delivering new IT projects within their wider IT strategy, signaling that the technical model has established a mainstream status among the profession.
Author: 
Access level: 
Subscriber & Member
Software Value Management (SVM) is the practice of informed active governance over access, utilisation, licensing, and cost efficiency of software throughout its useful life within an enterprise regardless of the IT deployment models used or methods of access.
Author: 
Access level: 
Member only
General Purpose PaaS would allow Cloud capabilities to be exploited to their full potential for applications. A General Purpose PaaS would be a comprehensive, open, flexible, and interoperable solution that simplifies the process of developing, deploying, integrating, and managing applications both in public and private Clouds
Author: 
Access level: 
Member only
Practical solutions for the digital age of Global Communications and Mass data exchange.
Author: 
Access level: 
Member only
Industry surveys consistently show that security is the number one concern when it comes to cloud adoption. In our related, previous report, "Secure your data - protect your business" we discussed best practice recommendations arising from interviews with a number of organisations and how they treat their data. In this follow up report, we answer key questions that people are asking us about cloud adoption and data management.
Author: 
Access level: 
Public
The research polled 450 senior IT and business decision makers in enterprises, small-to medium businesses (SMBs) and public sector organisations.
Author: 
Access level: 
Subscriber & Member