Cisco Blogs


Cisco Blog > Data Center and Cloud

IT Needs a Promotion to Cloud Services Broker

 

How can leaders manage the transition to a cloud services broker? Check out the new Gartner newsletter to learn more.

How can leaders manage the transition to a cloud services broker? Check out the new Gartner newsletter to learn more.

Is your IT department currently acting as a Cloud services broker?And what exactly is a Cloud services broker?

As our world of many clouds continues to evolve, increased opportunities exist for IT departments to move from the traditional “siloed” working environments to play a more critical role in corporate planning strategies.

Aligning IT and business objectives are duties handled by an IT services broker, who is usually the company CIO.

This role has become increasingly recognized as IT-as-a-Service (ITaaS) becomes a piece of the intercloud fabric.

The time is now for corporations to begin viewing their IT departments as more than the group that resets passwords and helps new-hires with their computer set-ups.

 

In order to manage the cloud transition and embrace the role of cloud services brokers, CIOs and IT leaders should consider these five steps:

1) Develop your future thinking and let go of the idea of how your IT department has done things in the past and think about what processes can be reengineered or what new capabilities need to be developed. Your IT group is best able to identify technology gaps in an organization’s processes as CIOs contend with hybrid cloud environments.

2) Create your Infrastructure-as-a-Service (IaaS) Building Block and ensure it’s agile, so your IT department can manage infrastructure services in a highly automated fashion and deliver to users in just minutes. By enabling a hybrid cloud environment in the IaaS layer, IT can more easily play the role of cloud services broker.

3) Add the Platform-as-a-Service (PaaS), which uses the agility in the IaaS foundation. Ultimately, this delivers greater efficiencies and flexibility in the deployment and deployment of cloud workloads. Without PaaS, development and testing of initiatives would require dedicated capacity to be allocated by IT.

4) Ensure required security standards. The SaaS and Infrastructure Security building block is where IT’s ability to serve as a cloud service broker plays a critical role and for an organization’s integrity, cloud-based services are best managed by them as a one cohesive infrastructure.

5) Make your vision a reality and implement transformational change! Now that you’ve assembled all the necessary building blocks, find a trusted partner to help you define and implement your vision. Tools like Cisco Domain Ten can help your IT department create evaluation criteria that helps them play their role as cloud services broker.

Additional Resources:

If you want to learn more about how to prepare for growing cloud workloads, how to evolve your IT department to harness the true potential of the cloud, and how to develop a more strategic approach to IT operations and service management, be sure to :

Watch the Cisco Intercloud Workload Migration Webcast (Available on demand).

Cisco Live, May 18-22

or follow the conversation online @CiscoCloud with #CLUS and #CiscoCloud.

Watch the Cisco Live Opening Session and Keynote by John Chambers on Monday, May 19 at 3:30 p.m. PDT.

Watch the Cisco Live Technology Business Vision  keynote by Rob Lloyd on Tuesday, May 20 at 10:00 a.m. PDT.

Register today for the Cisco Powered Cloud Day at Cisco Live on Monday, May 19. The insightful day will focus on opportunities and challenges that can be addressed with cloud.

Watch the Cisco Live Cloud Technology Trend Keynote – Aligning Your Strategy and Business for Cloud Success by Dr. Gee Rittenhouse and Faiyaz Shahpurwala on Tuesday, May 20 – 1:30 p.m. PDT.Visit

Cloud Executive Perspectives to get additional cloud insights for IT leaders.

 

Tags: , , , , , , , , , , , , , , ,

How Cisco IT Solved Its Internal Cloud Dilemma

May 7, 2014 at 4:30 pm PST

Is your organization looking to build a cloud?

You’ll want to learn how Cisco’s John Manville leveraged an internal, private, infrastructure-as-a-service cloud to drive business value.

View John Manville's Cloud Insights Video Podcast

View John Manville’s Cloud Insights Video Podcast

John Manville is responsible for Cisco’s Global IT infrastructure  - which includes the data centers,  networks, platforms and more. Overall, John’s role is to implement Fast IT, which is really about being adaptable and responsive to business needs.

What technology helps drive this responsiveness and adaptability? “There are many solutions that can help, but if I had to sum it up in one word, that word is  cloud” replied John .

Cisco uses internal cloud technology for several important business imperatives. Through the cloud, we are  balancing internal IT workloads and providing our engineering team the tools needed for OS development. We are also using the internal cloud for external capabilities. For example, Cisco Smart Services uses our internal cloud to offer services to external customers.

Recently, John had the chance to participate in a new Cloud Insights Video Podcast to discuss the challenges his team faced prior to cloud implementation. Like most IT teams, they were challenged by speed of delivery of business capabilities, driving Total Cost of Ownership (TCO)  down and completing maintenance on the underlying infrastructure with minimal impact on the business users or applications they need on a daily basis.

To offset these challenges, his team  developed and deployed CITEIS (Cisco IT Elastic Infrastructure Services), an internal, private, infrastructure-as-a-service cloud. CITEIS started off as a way to provision virtual machines, but the team quickly realized that it  wasn’t enough so they  added on more middleware and database capabilities . Now, it’s a rich service that John’s team  offers to their clients.

Read More »

Tags: , , , , , , , , , , , , , ,

Join Us May 14: Cisco Intercloud Workload Migration Webcast

The use of hybrid cloud or Intercloud technology is growing increasingly popular. A recent study supports that IT managers want a mix of public and private cloud in their enterprises. In fact, 60% of the 400 enterprises surveyed see the hybrid cloud model as the way to go.

And for good reason: The same secure, open and flexible solutions that can be found within your private data center can be implemented with a hybrid cloud set-up, providing the best of both worlds: private cloud control and flexible public clouds. And when the need arises to expand your data center, creating an Intercloud to extend your own data center and cloud capacity when you need it is an excellent option for any business of any size.

Next week, we invite you to join our informative cloud webcast: Cisco Solutions for Open and Secure Intercloud Workload Migration. You’ll gain insight as to how your organization will benefit from an Intercloud approach. The conversation will be focused on how your business can:

  • Extend your company’s capabilities, store more data and increase resources as you need them. Data centers cost to both build and operate, and InterCloud makes the public cloud an extension of your cloud.
  • Maintain your sense of security by applying your same quality of service restrictions and policies to your hybrid cloud. You may be “renting” the capacity, but for all intended purposes, you own it.
  • Keep your current cloud provider of choice and even link to more than one if you choose. The same traits are replicated in each instance of your data center.

 

When Cisco’s Global Intercloud was introduced, it completely changed the direction of how we utilized the hybrid cloud. It also showed us the need that CIOs across the globe had for a customizable, secure and high-performance data center expansion solution. And now is your chance to see why we’ve answered with Intercloud.

Registration is open, mark your calendar and join us for this webcast (available on demand):

Cisco Solutions for Open and Secure Intercloud Workload Migration.  Join our webcast to learn how the Cisco InterCloud solution helps ensure the same network security, quality of service (QoS), and access control policies previously enforced in the data center are implemented in the public cloud.  Wednesday, May 14, 9:00 a.m. Pacific Time / 12:00 pm Eastern Time

Cisco Solutions for Open and Secure Intercloud Workload Migration. Join our webcast to learn how the Cisco InterCloud solution helps ensure the same network security, quality of service (QoS), and access control policies previously enforced in the data center are implemented in the public cloud.   Available on demand.

Cisco Solutions for Open and Secure Intercloud Workload Migration

Wednesday, May 14

9:00 a.m. Pacific Time / 12:00 pm Eastern Time

Read More »

Tags: , , , , , , , , , , , ,

6 Healthcare IT Transitions: The Hackers delight

May 4, 2014 at 10:15 pm PST

From FDA (Food and Drug Administration) to FBI (Federal bureau of Investigations), they see a core issue bubbling up: The vulnerability of Healthcare systems to cyber-attacks. Both agencies have issued an advisory in this regard in the last 1 year.

Source: DataLossDB.org

Source: DataLossDB.org -- Healthcare amounts to 17% of incidents in 2013

FDA Advisory was focused on medical devices and hospital networks, while the FBI’s communication is focused on hackers attempting to hack personal medical records and health insurance data and even goes to calling out the gaps in resiliency to cyber-attacks as compared with other sectors such as financial and retail sectors.

In addition, looking at statistics from datalossdb.org, Health Care sector has consistently been in the top 3 sectors that have had the most incidents.

But the question is, why now?

This is where the correlation with the Health Care IT transition time lines adds up. It’s the other side of Health Care IT transitions that we looked at in the previous part (At the security cross roads of Healthcare reforms and IoE – 6 Health Care IT Transitions) of this blog series – the threat that have emerged from open anywhere, anytime, any device access which has enabled convenience and transformational experience to patients and care teams.

Let’s see an example of the changing dynamics of some of these transitions from a Hackers perspective by analyzing one of these transitions: Transition from Paper charts to EMR and enabling anywhere anytime, any device access to my care teams and my patients.

Health Care IT Transitions and their Security Implications 1-3 of 6

Health Care IT Transitions and their Security Implications (1-3 of 6)

Read More »

Tags: , , , , , ,

Bring Your Own Service: Why It Needs to be on InfoSec’s Radar

Security concerns around cloud adoption can keep many IT and business leaders up at night. This blog series examines how organizations can take control of their cloud strategies. The first blog of this series discussing the role of data security in the cloud can be found here. The second blog of this series highlighting drivers for managed security and what to look for in a cloud provider can be found here.

In today’s workplace, employees are encouraged to find the most agile ways to accomplish business: this extends beyond using their own devices to work on from anywhere, anytime and at any place to now choosing which cloud services to use.

Why Bring Your Own Service Needs to be on Infosec's Radar

Why Bring Your Own Service Needs to be on Infosec’s Radar

In many instances, most of this happens with little IT engagement. In fact, according to a 2013 Fortinet Survey, Generation Y users are increasingly willing to skirt such policies to use their own devices and cloud services. Couple this user behavior with estimates from Cisco’s Global Cloud Index that by the year 2017, over two thirds of all data center traffic will be based in the cloud proves that cloud computing is undeniable and unstoppable.

With this information in mind, how should IT and InfoSec teams manage their company’s data when hundreds of instances of new cloud deployments happen each month without their knowledge?

Additionally, what provisions need to be in place to limit risks from data being stored, processed and managed by third parties?

Here are a few considerations for IT and InfoSec teams as they try to secure our world of many clouds:

Read More »

Tags: , , , , , , , , , , , , , ,