It’s been quite a busy year in the cloud computing world. It seems that every week, a relatively young cloud-focused company scores a funding round with a valuation above $1B (unicorns!), and every week we see a traditional enterprise-focused software vendor introduce a new cloud-based service.
Each firm will provide different numbers, but the consensus is that spend on cloud computing services is growing significantly, and when compared to the rest of Enterprise IT spend, spend on cloud services is growing at a much faster clip.
Diving a bit deeper, the mix of services is changing dramatically. Earlier this year, Cisco predicted that Software-as-Service (SaaS) workloads will reach 59% of all cloud workloads by 2018; in 2013, this number was 41%. That still leaves a lot of share for both Platform-as-a-Service (PaaS) and Infrastructure-as-a-Service (IaaS) offerings.
Acronyms aside, there is certainly a lot of confusion in the cloud computing industry. There are still several players across IaaS, even more across PaaS and thousands of SaaS providers; each have a very unique way of going to market, with varying approaches to pricing, deployment, management, and security.
That last topic can be a bit troubling. As organizations continue to move their workloads and sensitive data to cloud-based solutions — solutions in which the vendor is now responsible for managing their data — their approach to information security needs to evolve, and will likely become more complicated. Beyond IT, new stakeholders are involved as individual business units select their own cloud-based solutions, and new approaches are required to secure data that is no longer behind the firewall.
This is also a tricky topic for the software vendors themselves. Managing the avalanche of acronyms, protocols and standards, many proprietary, is a challenge. Customers often request and demand interoperability amongst all their providers, but without standards, this is a difficult proposition.
Enter the Cloud Security Alliance (CSA). As a non-profit organization, they’ve focused on bringing together the entire community impacted by cloud computing — providers and customers, governments, and entrepreneurs — to build a trusted cloud ecosystem. With several initiatives, working-groups, certifications and their CSA STAR registry, the CSA is making huge strides to ensure a secure and trusted ecosystem.
We’re excited to announce that Centrify has joined the CSA as a corporate member. We’ll be working closely with the CSA and other members to contribute to CSA’s initiatives, and have been asked to share best practices around using identity to define a new security perimeter. We’ll certainly learn from other industry leaders, and are excited to build upon existing alliance partnerships to build innovative joint solutions.
If you haven’t checked out the CSA — I encourage you to do so. This is an exciting time to be part of a technology transformation, and through collaboration with the CSA and their ecosystem, we look forward to building a secure world in the cloud.
Read more about building a secure world in the cloud with Five Simple Steps to Securing Your Corporate Identity.