SYS-CON MEDIA Authors: Adine Deford, Cynthia Dunlop, Harry Trott, Xenia von Wedel, Peter Silva

Related Topics: Cloud Expo, SOA & WOA, Virtualization, Security, Big Data Journal, SDN Journal

Cloud Expo: Article

The Future of Cloud Computing

At the enterprise level, the use of public cloud applications will continue and increase across IaaS, Saas and PaaS

Cloud computing continues to transform the way organization are doing business, proving to be a transformative innovation for many enterprises. Considering how far the cloud has come in recent years spurs questions of what the future will look like and what types of changes we can expect. Many are speculating about the pace of cloud adoption and what services and capabilities will become available in the future.

Some believe recent reports of online surveillance and data breaches at popular cloud applications resulting from hacking could impede the growth rate of cloud adoption. But we believe recent events will lead to further innovations that will bolster security and corporate control and this will allow more companies to confidently move important processes online, ensuring the cloud continues its path of fundamentally transforming corporate IT. Broadly, the future for cloud computing will include clearly defined and standards-based security solutions and technology that will enable enterprises to retain full control of their sensitive information assets while continuing to move more business functions online (thereby reducing IT and other costs). This year's The Future of Cloud Computing survey by North Bridge gave some great insights into what might be coming for the cloud and I've added a couple of additional ideas below.

Increase of Public Cloud vs Private Cloud Applications
At the enterprise level, the use of public cloud applications will continue and increase across IaaS, Saas and PaaS. Private cloud will continue to be the preferred approach where feasible, but at the enterprise app layer (applications like CRM, Human Capital Resource Management and IT Service Management) public cloud SaaS apps will reign. As more companies enter the cloud application provider space, they will work to gain critical competitive advantages over the rest of the pack and enterprises will benefit from the associated innovations providers produce.

These innovations will allow enterprises to more fully employ public clouds and unlock the true potential they have for their organizations. It is clear that we'll see large companies increase adoption of both private clouds and a series of critical enterprise-grade public cloud options, making the hybrid approach the most popular model.

Improved Security and Reliability of Cloud Computing
While more companies are benefitting from the cloud and while the big cloud application providers have very secure data centers to secure data at rest, some companies have experienced well publicized security and reliability issues - including failed migration of data to cloud applications. In the coming years, cloud application providers will proactively tout the improved security and reliability measures they are putting in place. In fact, you'll see them visibly differentiating on security and compliance. Cloud processes and techniques for securing data in motion will be dramatically improved. A key part of this will be ensuring that a variety of protections and risk mitigation techniques are available to enterprise customers that will require a multi-faceted approach to controlling their data stewardship and application use. Giving enterprises the ability to control data assets, throughout their entire lifecycle, in motion at rest, will allow cloud providers and their ISV partners to address legal and legislative blockers to cloud adoption.

Auditing and monitoring will also be improved and more predictive and alerting capabilities will be built directly into the cloud services. We'll see a rise of cloud security brokerage capabilities designed to safeguard cloud use and empower IT and security organizations within the enterprise. Being able to anticipate issues and proactively address them with the appropriate remediation techniques will permit secure, uninterrupted use of the world's most powerful and pervasive cloud services.

To learn more about how PerspecSys is already helping enterprises address challenges associated with moving to the public cloud, visit the "How We Help" section of our website and see how we help make the public cloud private.

Read the original blog entry...


PerspecSys Inc. is a leading provider of cloud protection and cloud encryption solutions that enable mission-critical cloud applications to be adopted throughout the enterprise. Cloud security companies like PerspecSys remove the technical, legal and financial risks of placing sensitive company data in the cloud. PerspecSys accomplishes this for many large, heavily regulated companies across the world by never allowing sensitive data to leave a customer's network, while maintaining the functionality of cloud applications. For more information please visit / or follow on Twitter @perspecsys.

More Stories By Mike Morrissey

Mike Morrissey is Chief Technology Officer at PerspecSys. He leads PerspecSys’ product research and development organizations and helps to define and deliver innovative capabilities within PerspecSys’ cloud data protection solution. A former executive at Research In Motion (RIM), Descartes Systems Group, and IBM, Mike has more than 20 years of engineering, product development, and infrastructure management experience. As RIM’s Vice President of Cloud and Platform Services, he led the development and architecture of the company’s core platform, including key identity components and technologies from Certicom, a wholly owned RIM subsidiary that provided innovative cryptography and security capabilities.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


Latest Stories
15th Cloud Expo, which took place Nov. 4-6, 2014, at the Santa Clara Convention Center in Santa Clara, CA, expanded the conference content of @ThingsExpo, Big Data Expo, and DevOps Summit to include two developer events. IBM held a Bluemix Developer Playground on November 5 and ElasticBox held a Hackathon on November 6. Both events took place on the expo floor. The Bluemix Developer Playground, for developers of all levels, highlighted the ease of use of Bluemix, its services and functionalit...
How do APIs and IoT relate? The answer is not as simple as merely adding an API on top of a dumb device, but rather about understanding the architectural patterns for implementing an IoT fabric. There are typically two or three trends: Exposing the device to a management framework Exposing that management framework to a business centric logic Exposing that business layer and data to end users. This last trend is the IoT stack, which involves a new shift in the separation of what stuff happe...
The 3rd International Internet of @ThingsExpo, co-located with the 16th International Cloud Expo - to be held June 9-11, 2015, at the Javits Center in New York City, NY - announces that its Call for Papers is now open. The Internet of Things (IoT) is the biggest idea since the creation of the Worldwide Web more than 20 years ago.
The Internet of Things is tied together with a thin strand that is known as time. Coincidentally, at the core of nearly all data analytics is a timestamp. When working with time series data there are a few core principles that everyone should consider, especially across datasets where time is the common boundary. In his session at Internet of @ThingsExpo, Jim Scott, Director of Enterprise Strategy & Architecture at MapR Technologies, discussed single-value, geo-spatial, and log time series dat...
Some developers believe that monitoring is a function of the operations team. Some operations teams firmly believe that monitoring the systems they maintain is sufficient to run the business successfully. Most of them are wrong. The complexity of today's applications have gone far and beyond the capabilities of "traditional" system-level monitoring tools and approaches and requires much broader knowledge of business and applications as a whole. The goal of DevOps is to connect all aspects of app...
When an enterprise builds a hybrid IaaS cloud connecting its data center to one or more public clouds, security is often a major topic along with the other challenges involved. Security is closely intertwined with the networking choices made for the hybrid cloud. Traditional networking approaches for building a hybrid cloud try to kludge together the enterprise infrastructure with the public cloud. Consequently this approach requires risky, deep "surgery" including changes to firewalls, subnets...
Want to enable self-service provisioning of application environments in minutes that mirror production? Can you automatically provide rich data with code-level detail back to the developers when issues occur in production? In his session at DevOps Summit, David Tesar, Microsoft Technical Evangelist on Microsoft Azure and DevOps, will discuss how to accomplish this and more utilizing technologies such as Microsoft Azure, Visual Studio online, and Application Insights in this demo-heavy session.
DevOps is all about agility. However, you don't want to be on a high-speed bus to nowhere. The right DevOps approach controls velocity with a tight feedback loop that not only consists of operational data but also incorporates business context. With a business context in the decision making, the right business priorities are incorporated, which results in a higher value creation. In his session at DevOps Summit, Todd Rader, Solutions Architect at AppDynamics, discussed key monitoring techniques...
The 4th International DevOps Summit, co-located with16th International Cloud Expo – being held June 9-11, 2015, at the Javits Center in New York City, NY – announces that its Call for Papers is now open. Born out of proven success in agile development, cloud computing, and process automation, DevOps is a macro trend you cannot afford to miss. From showcase success stories from early adopters and web-scale businesses, DevOps is expanding to organizations of all sizes, including the world's large...
An entirely new security model is needed for the Internet of Things, or is it? Can we save some old and tested controls for this new and different environment? In his session at @ThingsExpo, New York's at the Javits Center, Davi Ottenheimer, EMC Senior Director of Trust, reviewed hands-on lessons with IoT devices and reveal a new risk balance you might not expect. Davi Ottenheimer, EMC Senior Director of Trust, has more than nineteen years' experience managing global security operations and asse...
The Internet of Things will greatly expand the opportunities for data collection and new business models driven off of that data. In her session at @ThingsExpo, Esmeralda Swartz, CMO of MetraTech, discussed how for this to be effective you not only need to have infrastructure and operational models capable of utilizing this new phenomenon, but increasingly service providers will need to convince a skeptical public to participate. Get ready to show them the money!
The Internet of Things will put IT to its ultimate test by creating infinite new opportunities to digitize products and services, generate and analyze new data to improve customer satisfaction, and discover new ways to gain a competitive advantage across nearly every industry. In order to help corporate business units to capitalize on the rapidly evolving IoT opportunities, IT must stand up to a new set of challenges. In his session at @ThingsExpo, Jeff Kaplan, Managing Director of THINKstrateg...
SYS-CON Media announced that Centrify, a provider of unified identity management across cloud, mobile and data center environments that delivers single sign-on (SSO) for users and a simplified identity infrastructure for IT, has launched an ad campaign on Cloud Computing Journal. The ads focus on security: how an organization can successfully control privilege for all of the organization’s identities to mitigate identity-related risk without slowing down the business, and how Centrify provides ...
"We help companies that are using a lot of Software as a Service. We help companies manage and gain visibility into what people are using inside the company and decide to secure them or use standards to lock down or to embrace the adoption of SaaS inside the company," explained Scott Kriz, Co-founder and CEO of Bitium, in this SYS-CON.tv interview at 15th Cloud Expo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
"SAP had made a big transition into the cloud as we believe it has significant value for our customers, drives innovation and is easy to consume. When you look at the SAP portfolio, SAP HANA is the underlying platform and it powers all of our platforms and all of our analytics," explained Thorsten Leiduck, VP ISVs & Digital Commerce at SAP, in this SYS-CON.tv interview at 15th Cloud Expo, held Nov 4-6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.