{"id":720,"date":"2014-09-26T22:48:56","date_gmt":"2014-09-26T22:48:56","guid":{"rendered":"http:\/\/www.coffeescroll.com\/?p=720"},"modified":"2014-09-28T22:54:02","modified_gmt":"2014-09-28T22:54:02","slug":"5-technologies-enterprise-must-nail-play-cloud","status":"publish","type":"post","link":"http:\/\/www.coffeescroll.com\/index.php\/5-technologies-enterprise-must-nail-play-cloud\/","title":{"rendered":"The big 5 areas to nail when moving to the cloud"},"content":{"rendered":"
Back when I worked\u00a0for a large bank my manager – a shrewd thinker – was asked what he would do to the IT infrastructure if he had infinite time and money. His answer was that he’d tear it all down and start again. When 9\/11 destroyed many buildings in lower Manhattan, some organisations had to do just this.<\/p>\n
It’s an interesting thought-exercise because you arrive at a different target state when you think this way, than when you start with an\u00a0existing set-up and incrementally change your environment.<\/p>\n
From what I’ve seen of cloud transformations across different organisations, I’ve found five\u00a0key areas you need to consider, that\u00a0are difficult, oft-neglected areas. The way you approach these five\u00a0depends very much on whether you are starting from scratch or not.<\/p>\n
I’ll deep-dive into them in future posts but for now a brief summary (with no particular priority):<\/p>\n
Now that platforms, systems, devices etc. are\u00a0outside your network, how do you identify and provisions users? How do you make sure it’s only Jim who is accessing his iPad and using\u00a0an approved SaaS provider that uses data from a core internal system? How do you deprovision him and his access when he leaves one Friday to go work at a competitor? The management of identity in the new era requires new platforms and skills. When this area is ignored you start to lose control pretty quickly.<\/p>\n
Networks used to be like medieval castles. There was a big wall with guards and a few entrances. Legacy networks were\u00a0built on this paradigm. But today your device could physically be on a public network whilst logically on a\u00a0companies network. You could be logically managing your network on someone else’s infrastructure (think AWS VPCs). Some applications will be hosted externally and require access to internal systems.<\/p>\n
The\u00a0medieval city has lost its walls and people are roaming freely. Your data assets need to be locked in suitable safes in different towers, with access by appointment only.<\/p>\n