@CloudExpo Authors: Zakia Bouachraoui, Elizabeth White, Liz McMillan, Pat Romanski, Roger Strukhoff

Related Topics: Agile Computing, @CloudExpo

Agile Computing: Blog Post

Using the Cloud to Rein in Rogue IT

Five good reasons not to Go Rogue

Cloud services have opened up new opportunities for organizations to be more efficient and flexible and operate more competitively, but what happens when I.T. just isn’t moving quickly enough to meet the increasing infrastructure needs of various departments?

Well, often, they’ll go rogue. The advantage of being able to procure infrastructure in a utility model makes the cloud an attractive choice for departments wanting to sidestep corporate IT processes, controls, and timelines. At the same time, they can become a compounding collection of headaches for I.T. departments who have mandates not always understood by every department.

While, these out-of-band rogue deployments can bring to projects the enabling potential of the cloud, they also pose security and compliance concerns, and can miss not only the ongoing technology support and stewardship but the big picture strategic advantage an enterprise’s I.T. department bring to the organization.

According to Phil Shih, senior analyst focused on hosting at Teir1 Research, it’s an emerging issue, but one that has already started to show its face in enterprises.

“We’ve definitely seen this develop across large organizations and large enterprises,” Shih notes. “Development teams have work that requires infrastructure that I.T. is unable to meet in an efficient and cost-effective manner, so they’re turning to the cloud.”

Shih suggests that traditional infrastructure procurement through I.T. can take as much as six to nine months for some organizations and require a budget commitment of a year or more, making it hard for developers to resist the call of deploying something themselves by simply “pulling out a credit card and expensing it to their internal budget.”

And there are numerous advantages, Shih says, from the perspective of the rogue developers. Traditional infrastructure procurement can result in overspending, especially in a testing and training environments where need for I.T. ebbs and flows. Cloud instead gives elastically available infrastructure that is basically turned on when needed, scaled up or down, and turned off when it’s not. For that same reason, it creates flexible cost structures that are comfortable for a department that is ‘going it alone’ without I.T. support or approval.

Without I.T. support on a project, predicting the nature, scope, and duration of infrastructure needs can be even more daunting, further making cloud appealing. In fact, even with I.T. involvement planning infrastructure needs can be a serious challenge and a strong driver for cloud services.

Shih draws parallels between enterprise departments deploying rogue I.T. projects and small businesses, a segment he says has been a hungry early adopter of cloud.

“Smaller organizations are nimble enough and open enough to implement cloud,” Shih says. “With larger I.T. organizations, they often don’t work that way, so it’s a bigger transition for them.”

Of course, parallels also can exist in size and scope, but it all comes back to the single biggest factor: people who need infrastructure quickly.

So, with all this opportunity for efficiency and productivity, where is the problem?

The problem is I.T. is tasked with fulfilling a business’s infrastructure needs and tends to have a greater understanding of its regulatory requirements, processes, security controls and overall strategy.

Mitigating security risks can be a non-stop, full-time job for IT. Threats of losing or compromising corporate data come from all sides today, from hackers and criminal elements, to industrial espionage, to simple and unfortunate human errors. Does a department engaging in its own I.T. projects understand these risks? What steps are they able to take to ensure correct security protocols are deployed throughout the job?

And the risks are great. Besides meeting regulatory standards of security and privacy an organization has committed to, businesses today live and die on the faith their customers have in the protection of their data and information.

If a department uses the cloud to deploy a new application, for example, do its developers even know where any collected data resides? Many departments outside of I.T. might not recognize that knowing and controlling the location at which data resides can be a regulatory requirement for their business.

What about Sarbanes-Oxley, PCI-DSS (if in the payment card industry), HIPAA (if in healthcare), or PIPEDA (if in Canada)? Are rogue developers aware of the implications these (and other) acts and standards have on their applications and data? Quite possibly, not.

According to Teir1’s Shih, rogue IT deployments in larger enterprises today are often being used mainly as test or training environments and, as such, have little or less live data; however, the cloud provides easy scaling to a live application environments, and it’s safe to assume, businesses could ultimately be dealing with rogue customer-facing applications.

“It definitely complicates management and regulatory compliance. You have to understand where your data is stored and how it’s accessed and how it’s secured,” Shih says. “IT has to be involved. It’s a good idea for IT in large organizations to understand what their staff is doing in the cloud and to bring it in under the larger IT strategy of the organization.”

A management nightmare begins to emerge, unless, of course, IT can find a way to commit to a comparably quick response to departmental needs, while ensuring the oversight required for regulatory and security compliance.

The irony is that the cause for the symptoms can also be the cure: the cloud.

Through cloud services, IT departments can internally "sell" computing resources as utilities, providing the scalability and flexibility needed to have departments deploy the technologies they need, when they need them.

This can either be done through the development of private Infrastructure-as-a-Service clouds with I.T. approved virtual machines doled out as a utility to their internal customers. These clouds could be built and managed internally, delivered through third-party cloud providers or as a hybrid solution, extending existing I.T. infrastructure to the providers’ cloud.

In simplest terms, I.T. becomes that formerly-rogue internal customer’s cloud services provider.

IT can turn to reliable third-party cloud providers where the can with confidence be certain of security control, service levels, and scalability. They know the questions to ask to ensure the business’s needs are met. Better still, the right provider will be as concerned with answering those questions of privacy and compliance as the I.T. department is with asking them.

IT oversight in cloud projects can also bring to bear a wealth of I.T. acumen, expertise in software licensing, and economies of scale by tying together projects across the enterprise.

As well, IT departments, with expertise in negotiating with outside technology suppliers and industry knowledge, are often best equipped to find a provider, such as CentriLogic, who can offer cloud services that meet enterprise requirements for power, security and scalability and provide a true virtual extension to an existing physical infrastructure.

Despite the challenges facing today’s IT departments, with the experience in negotiating with outside technology vendors and suppliers and industry knowledge, are often best equipped to find a service provider, like CentriLogic, who can offer cloud services that meet enterprise requirements for capacity, security and scalability and provide a true virtual extension to an existing physical infrastructure.

In fact, while some departments might be angered by corporate IT’s perceived inability to effectively keep up with the nimbleness they need, by offering infrastructure through cloud services I.T. departments can bring the speedy infrastructure deployment desired, coupled with its own expertise, to help ensure the project really works, meets standards of compliance, and guards the business’s intellectual property.

Five Reasons Not to Go Rogue

1. Failure to meet regulatory compliance
2. Placing corporate and customer data at risk
3. Poor link to overall corporate IT strategy
4. Waste of IT expertise and market insight
5. Lost advantage of economies of scale

More Stories By Jim Latimer

Jim Latimer is Vice President of Client Solutions for CentriLogic, a trusted provider of global data center solutions that delivers enterprise-class hosting, cloud computing and managed services, bringing advantage to businesses where the data center outsourcing is critical to their success. For more information, visit www.centrilogic.com.

CloudEXPO Stories
The precious oil is extracted from the seeds of prickly pear cactus plant. After taking out the seeds from the fruits, they are adequately dried and then cold pressed to obtain the oil. Indeed, the prickly seed oil is quite expensive. Well, that is understandable when you consider the fact that the seeds are really tiny and each seed contain only about 5% of oil in it at most, plus the seeds are usually handpicked from the fruits. This means it will take tons of these seeds to produce just one bottle of the oil for commercial purpose. But from its medical properties to its culinary importance, skin lightening, moisturizing, and protection abilities, down to its extraordinary hair care properties, prickly seed oil has got lots of excellent rewards for anyone who pays the price.
The platform combines the strengths of Singtel's extensive, intelligent network capabilities with Microsoft's cloud expertise to create a unique solution that sets new standards for IoT applications," said Mr Diomedes Kastanis, Head of IoT at Singtel. "Our solution provides speed, transparency and flexibility, paving the way for a more pervasive use of IoT to accelerate enterprises' digitalisation efforts. AI-powered intelligent connectivity over Microsoft Azure will be the fastest connected path for IoT innovators to scale globally, and the smartest path to cross-device synergy in an instrumented, connected world.
There are many examples of disruption in consumer space – Uber disrupting the cab industry, Airbnb disrupting the hospitality industry and so on; but have you wondered who is disrupting support and operations? AISERA helps make businesses and customers successful by offering consumer-like user experience for support and operations. We have built the world’s first AI-driven IT / HR / Cloud / Customer Support and Operations solution.
ScaleMP is presenting at CloudEXPO 2019, held June 24-26 in Santa Clara, and we’d love to see you there. At the conference, we’ll demonstrate how ScaleMP is solving one of the most vexing challenges for cloud — memory cost and limit of scale — and how our innovative vSMP MemoryONE solution provides affordable larger server memory for the private and public cloud. Please visit us at Booth No. 519 to connect with our experts and learn more about vSMP MemoryONE and how it is already serving some of the world’s largest data centers. Click here to schedule a meeting with our experts and executives.
Darktrace is the world's leading AI company for cyber security. Created by mathematicians from the University of Cambridge, Darktrace's Enterprise Immune System is the first non-consumer application of machine learning to work at scale, across all network types, from physical, virtualized, and cloud, through to IoT and industrial control systems. Installed as a self-configuring cyber defense platform, Darktrace continuously learns what is ‘normal' for all devices and users, updating its understanding as the environment changes.