Cloud Service Management | Cloud industry forum

Cloud Service Management

This section focuses on how managing IT services and IT operations have been effected by new cloud environments. Including how data governance, regulatory & compliance obligations, security and quality of service goals can be managed.

Resources found: 39
Spending money on cyber security, we are told, has become the most important investment a company can make. It is said that companies large and small are not investing the right amount or, indeed, in the right things.
Access level: 
Public
For customers procuring cloud services, it is essential to understand fully the impact of data protection and privacy on the process. The areas of greatest concern are focused specifically on how a customer selects a supplier who is compliant with all the necessary legal obligations that affect it, how to identify and mitigate service risk, and how to allocate liability for the service between a customer and supplier according to the price of the service and risk the supplier accepts. How that liability is effectively allocated and how it impacts sub-contractors in the supply chain is also an issue.
Author: 
Access level: 
Member only
Historically, cloud technology has made reference to the potential benefits of transferring costs from the balance sheet (capex) to the income statement (opex). However, an unintended consequence has been that few, if any, cloud related costs could be capitalised. This may not be the desired outcome for all organisations and the capitalisation of certain types of cloud technology may be preferred, or even required by accounting standards. In this paper Deloitte explore this area and what key considerations can be given to the capitalisation of cloud.
Author: 
Access level: 
Subscriber & Member
Today's technology systems must be built for resilience. They must be engineered to survive natural disasters such as storms, power outages, and water damage—as well as human error, hardware malfunctions, and software failures. In this year’s report, we examine the ability of businesses to maintain service even in the face of threats and challenges.
Author: 
Access level: 
Public
Demand for cloud-based applications is growing in both the consumer and business spheres. Hybrid cloud computing combines private and public cloud resources. This model will radically change the design and management of corporate networks – as hybrid cloud computing also requires a hybrid network infrastructure.
Author: 
Access level: 
Public
This paper from Atos describes the structural challenges enterprises are facing when establishing an outsourced SIaM function. Several Best Practices such as a functional blueprint, tooling considerations and partner alignment prerequisites (Commonly Shared KPIs, a SIaM Information model and the Service Catalogue) provide guidance for anyone on the SIaM journey. Finally the Outlook chapter explains the evolution of Service Integration towards Business Process Agility and links this capability to underlying technical capabilities such as Service Brokerage, Cloud Orchestration and Cloud Messaging. The Conclusions chapter lists a set of key take-away.
Author: 
Access level: 
Subscriber & Member
A recent roundtable event, organised by the Cloud Industry Forum, and sponsored by Dell, brought together a range of Cloud security experts, all happy to share their views on the topic, providing fascinating insight into the disconnect that often exists between vendors and their customers.
Author: 
Access level: 
Public
Are you heading for a Cloud thunderstorm? Having a QA and testing framework while selecting and implementing a cloud service can help you avoid a lightning strike
Author: 
Access level: 
Public
Slides from Cloud Expo 2015 keynote presentations. Richard Munro CTO – vCloud Air EMEA
Author: 
Access level: 
Member only
Are cloud-managed applications in your future? The answer is almost certainly “yes.” Take advantage of this primer and learn the ins and outs of cloud managed applications including the 80/20 rule, the impact of Millennials, Big Data, security issues and more.
Author: 
Access level: 
Subscriber & Member
Today, cloud adoption is rapidly expanding its footprint and is no longer simply a theoretical or academic conversation that enterprise organizations are debating.
Author: 
Access level: 
Subscriber & Member
Outsourcing elements of your IT infrastructure to an external hosting provider necessarily demands a different approach to governance than with traditional dedicated environments. This paper maps out some high-level recommendations to common governance standards to ease their successful implementation in cloud environments
Author: 
Access level: 
Subscriber & Member
Inside this paper you will find an introduction to what the Cloud is about – and why you need to take it seriously, along with my four most recent columns that seek to address how the Board, together with the CIO, should give practical substance to their paranoid optimism!
Author: 
Access level: 
Subscriber & Member
As cloud computing becomes an increasingly important part of any IT organization’s delivery model, assessing and selecting the right cloud provider also becomes one of the most strategic decisions that business leaders undertake
Author: 
Access level: 
Subscriber & Member
“Shadow IT” presents significant threats to your information security and availability that can impact your customers, and in turn affect your revenue. In some cases, customers may leave if you have a sustained outage or loss of client data.
Author: 
Access level: 
Subscriber & Member
The predictions that many industry pundits have been making about the rise of Bring Your Own Device (BYOD) are coming to fruition. The surprise is that it is happening at a much-accelerated rate in businesses of all sizes, around the world.
Author: 
Access level: 
Subscriber & Member
As more organizations establish a goal of building out internal cloud services, it becomes the responsibility of IT departments to plan and implement this transition.
Author: 
Access level: 
Member only
The idea cloud can’t be used by regulated industries doesn’t stand up to scrutiny. Indeed, there are many ways in which the technology can be deployed…
Author: 
Access level: 
Subscriber & Member
Cloud Messaging will help enterprises to achieve seamless integration of business processes spanning multiple applications, clouds and smart devices. This Ascent White Paper explains the concept and describes the learnings from a Healthcare sector Proof-of-Concept.
Author: 
Access level: 
Subscriber & Member
We discuss cloud security concerns and why businesses needn’t worry so much with Peter Groucutt, managing director of Databarracks.
Author: 
Access level: 
Public
The Databarracks annual Data Health Check surveys hundreds of IT professionals across 19 different fields to capture a snapshot of the way businesses use and think about IT. Here are the highlights from 2014.
Author: 
Access level: 
Member only
This White Paper describes the technical challenges and potential solutions for preserving digital artifacts, for long intervals of time (several decades, centuries) in a new world of massive, distributed data.
Author: 
Access level: 
Member only
What should your first steps be when formulating a security policy for cloud use? Davey Winder has been talking to the experts about this very subject. Read on to find out more…
Author: 
Access level: 
Member only
Set of slides from the Cloud Expo 2014 exhibitions keynote presentations. Antonio Piraino, CTO ScienceLogic. Member, Cloud Industry Forum
Author: 
Access level: 
Member only
Businesses are beginning to make the most of their data, but they to need to ensure security issues are sorted out first...
Author: 
Access level: 
Subscriber & Member
Your business is ready to reap the rewards of the software defined cloud era. Is your IT organization ready to deliver?
Author: 
Access level: 
Member only
Penetration testing is a customer-sanctioned intrusion of a network or computing infrastructure by a specialist 3rd party.
Author: 
Access level: 
Member only
Is cloud the nirvana of IT deployment models? Will everything make the transition to the cloud? Are we facing the terminal demise of on-premise IT? This comprehensive e-book from CIF and CloudPro examines a broad section of topics related to the adoption of cloud in the enterprise. Advice, insight and guidance to help you make tomorrow’s tech decisions, today.
Author: 
Access level: 
Public

The results of this survey show that interest in the use of SaaS applications among organisations in Germany and the UK is increasing; with flexibility, access by mobile devices and always-on availability being the primary drivers. However, security is still seen as the greatest inhibitor, including the need to protect data from being accessed inappropriately. Identity and access management technologies play a key role in authenticating users according to the rights that they have been granted. Today, there are relatively new breeds of identity management services that extend identity and access management capabilities to externally provisioned applications as well as catering to the needs of both mobile and external users, such as customer and business partners. Such services provide an efficient means of assuaging some of the prime security concerns that organisations have in subscribing to SaaS services.

Author: 
Access level: 
Public
Cloud Computing does not scale well. Such a bold statement may seem incorrect given that according to accepted wisdom, scalability is one of the essential properties that make Cloud Computing so attractive to businesses. This Paper explores this apparent contradiction and proposes potential solutions based on research conducted by the Atos Scientific Community.
Author: 
Access level: 
Public
Big Data and Cloud, two of the trends that are defining the emerging Enterprise Computing, show a lot of potential for a new era of combined applications.
Author: 
Access level: 
Subscriber & Member
For law firms and corporate legal departments, the dynamics of a cloud delivery approach can be especially attractive—making it possible to increase staff productivity, deliver better client service, and improve business agility while reducing expense.
Author: 
Access level: 
Member only
A survey by IDG Research Services reveals that organizations face confusion in researching cloud options, forcing them to adjust goals and search for more flexible and open cloud solutions that can help them prevent vendor lock-in.
Author: 
Access level: 
Subscriber & Member

Cloud-based applications and services, and software-as-a-service applications in particular, are coming into widespread use by organisations of all sizes. Such applications are used to process and store sensitive information making it imperative that user access rights are tightly controlled to ensure that information is secure from loss or theft and remains private. This paper discusses recent developments in identity and access management technologies that aim to extend such controls to services provided from external sources.

Author: 
Access level: 
Public
In the UK today over 50 per cent of organisations have formally utilised at least one Cloud service and satisfaction levels relating to that experience grew to an astonishing 96 per cent by the end of 2011. Furthermore, 85 per cent of IT Executives stated that they now formally considered Cloud as a viable option for delivering new IT projects within their wider IT strategy, signaling that the technical model has established a mainstream status among the profession.
Author: 
Access level: 
Subscriber & Member
General Purpose PaaS would allow Cloud capabilities to be exploited to their full potential for applications. A General Purpose PaaS would be a comprehensive, open, flexible, and interoperable solution that simplifies the process of developing, deploying, integrating, and managing applications both in public and private Clouds
Author: 
Access level: 
Member only
Practical solutions for the digital age of Global Communications and Mass data exchange.
Author: 
Access level: 
Member only
Industry surveys consistently show that security is the number one concern when it comes to cloud adoption. In our related, previous report, "Secure your data - protect your business" we discussed best practice recommendations arising from interviews with a number of organisations and how they treat their data. In this follow up report, we answer key questions that people are asking us about cloud adoption and data management.
Author: 
Access level: 
Public
The research polled 450 senior IT and business decision makers in enterprises, small-to medium businesses (SMBs) and public sector organisations.
Author: 
Access level: 
Subscriber & Member