Mitigating Risk When Implementing Cloud Computing Services

Updated: February 04, 2011

Smaller companies will leverage Cloud services more broadly and more quickly than their larger counterparts. This is mainly due to the fact that finding qualified IT personnel for smaller companies is difficult since the skillset must be broad and deep. However, using Cloud Services to complement a smaller IT team will probably make them more successful.

Larger enterprises should target areas of highest payback that fit into the overall Cloud Computing strategy and move those services to the Cloud first. Large enterprises will always have more IT skillsets than smaller businesses, which can help ensure the vendor negotiations, management and evolution of services happen in a manner most productive to the organization. However, the larger the enterprise the more risk associated with making a paradigm shift (and sometimes more reward when it offers a leg up on competitors).

Regardless of your company size, if you are implementing Cloud Computing services there is a risk that reality won't live up to the promises. In order to help avoid disappointment, here are five actions to take to help mitigate risk when implementing Cloud services:

  1. Strategy. Make sure the vendor you engage fits into your overall Cloud strategy. This is extremely important because moving from one Cloud vendor to another can cause unnecessary duplication of efforts.
  2. Phases. Don't plan a massive migration on the first try. Start small and phase in additional services over time. This is especially true with SaaS implementations. With PaaS or IaaS it might make sense to leave some redundant infrastructure or capabilities in place until you are absolutely sure that all systems are working to your satisfaction.
  3. Plan B. Make sure you have a plan B, or fall back plan, if the implementation doesn't go well at "go live" or shortly thereafter. Can you quickly move back to the previous service? How much help will the vendor be? Know exactly when it's time to move to Plan B.
  4. Communicate. This is the one area that is usually forgotten or glossed over. Communicate frequently, especially if you are moving from an internal application or functionality to external services. While IT shops are always trying to make transitions seamless and transparent the reality is transitions are hardly ever without incident. The other value in ongoing communication is the high likelihood that someone will raise a question that hadn't been considered before.
  5. References. It amazes me that many people will skip this step. Think about the fact that a 10-minute phone call could save you headaches and possibly your job. Talk with other clients who are using the service you will be implementing to understand what specific challenges might have tripped them up or slowed them down. Even those clients who had smooth implementations will have some words of caution specific to the service or vendor.
Related Categories
Featured Research
  • Office365 Adoption eGuide

    Microsoft moved to the cloud in 2014, and, as a result, Office 365 is taking off. Now, Okta customers are connecting to Office 365 in increasing numbers. This eGuide explains why IT departments should plan and deploy solutions around identity and mobility management in concert with their Office 365 roll out to get maximum user adoption. more

  • Okta Directory Integration

    For most companies, Active Directory (AD) or Lightweight Directory Access Protocol (LDAP) play a central role in coordinating identity and access management policies. When on-premise applications are integrated to Active Directory or LDAP, users get the best possible experience. That's why Okta's cloud-based identity and access management service provides a highly useful single integration point. more

  • Securing Enterprise Information Technology

    In the 1980s and 1990s, business applications and data were largely confined within and protected by a Local Area Network (LAN). The 2000s introduced a significant change. Download this white paper now to learn why the shift to the cloud is changing how companies think about and manage their IT infrastructure. more

  • Top 8 Identity and Access Management Challenges with Your SaaS Applications

    With more and more businesses adopting Software-as-a-Service (SaaS) applications, enterprise IT is fundamentally changing. This whitepaper presents the eight biggest Identity and Access Management (IAM) challenges associated with adopting and deploying cloud and SaaS applications, and discusses best practices for addressing each of them. more

  • Better BYOD with Pulse Secure and MDM Partners

    Learn how Pulse Secure and leading MDM product partners are transforming the way employees and IT benefit from the productivity and flexibility of BYOD — without compromising security or increasing management complexity. more