Category Archives: Cloud Computing

Cloud Migration Services Market worth $29.2 billion by 2028 – Exclusive Report by MarketsandMarkets USA … – PR Newswire

CHICAGO, Feb. 15, 2024 /PRNewswire/ -- Trends including edge computing migration, AI-driven solutions,containerisation, and the use of hybrid and multi-cloud infrastructure will shape the cloud migration services market in the future. The evolution of services is driven by issues like regulatory compliance and the complexity of data migration; cost optimisation, DevOps integration, and ecosystem collaboration are key components of effective, safe, and compliant cloud migrations.

The Cloud Migration Services Market is projected to grow from USD 10.2 billion in 2023 to USD 29.2 billion by 2028, at a compound annual growth rate (CAGR) of 23.3% during the forecast period, according to a new report by MarketsandMarkets. The Cloud Migration Services Market is expected to grow significantly during the forecast period, owing to numerous business drivers such as rising demand for better agility and automation, and seamless integration and compatibility of enterprises with the evolving landscape of cloud technology.

Browse in-depth TOC on "Cloud Migration Services Market"

219 - Tables 52 - Figures 287 - Pages

Download PDF Brochure @ https://www.marketsandmarkets.com/pdfdownloadNew.asp?id=266815130

Scope of the Report

Report Metrics

Details

Market size available for years

20182028

Base year considered

2022

Forecast period

20232028

Forecast units

USD (Billion)

Segments Covered

Service Type, Deployment Mode, Migration TypeApplication, Vertical, and Region

Geographies covered

North America, Asia Pacific, Europe, Middle East & Africa, and Latin America

Companies covered

IBM (US), AWS (US), Google (US), Microsoft (US), Oracle (US), SAP (Germany), VMWare (US), Cisco (US), NTT Data (Japan), Accenture (Ireland), Infosys (India), DXC (US), HPE (US), Veritis (US), RiverMeadow (US), Rackspace (US), Informatica (US), WSM (US), and so on.

By service type, assessment & planning services segment to register for the largest market size during the forecast period.

By service type, assessment & planning services segment is expected to register the largest market size during the forecast period. These services align the cloud migration strategy with the business objectives of the organization. By understanding the specific goals and requirements, assessment services ensure that the migration plan is tailored to meet the unique needs of the business. Assessment and Planning Services form the foundational phase of cloud migration, providing organizations with a comprehensive understanding of their current state, aligning migration strategies with business objectives, identifying and mitigating risks, and developing a detailed roadmap for a successful transition to the cloud.

Request Sample Pages@https://www.marketsandmarkets.com/requestsampleNew.asp?id=266815130

By deployment mode, hybrid cloudto register for the highest CAGR during the forecast period.

The hybrid cloud segment of the Cloud Migration Services Market is growing rapidly. Hybrid Cloud deployment, supported by cloud migration services, provides organizations with a balanced and adaptable approach to cloud adoption. It offers the advantages of cloud scalability and innovation while allowing organizations to retain control over certain workloads and maintain compliance with specific requirements. Cloud migration services are instrumental in designing, implementing, and optimizing Hybrid Cloud solutions tailored to the unique needs of each organization.

By region, Asia Pacific accounted for highest growth rate during the forecast period.

Asia Pacific is witnessing significant growth in Cloud Migration Services Market. Companies in the region are recognizing the cost benefits associated with cloud migration. Cloud services offer a pay-as-you-go model, eliminating the need for significant upfront investments in hardware and infrastructure. Several governments across the Asia Pacific region have been promoting cloud adoption through various initiatives and policies. These efforts aim to foster innovation, improve public services, and drive economic growth.

Top Key Companies in Cloud Migration Services Market:

Some major players in the Cloud Migration Services Market include IBM (US), AWS (US), Google (US), Microsoft (US), Oracle (US), SAP (Germany), VMWare (US), Cisco (US), NTT Data (Japan), Accenture (Ireland), Infosys (India), DXC (US), HPE (US), Veritis (US), RiverMeadow (US), Rackspace (US), Informatica (US), WSM (US), and so on.

Recent Developments:

Inquire Before Buying@ https://www.marketsandmarkets.com/Enquiry_Before_BuyingNew.asp?id=266815130

Cloud Migration Services Market Advantages:

Report Objectives

Browse Adjacent Markets:Cloud Computing Market Research Reports & Consulting

Related Reports:

Cloud Storage Market- Global Forecast to 2028

Cloud Mobile Backend as a Service Market- Global Forecast to 2028

Telecom Cloud Market- Global Forecast to 2027

Cloud TV Market- Global Forecast to 2026

Biometrics as a Service Market- Global Forecast to 2025

About MarketsandMarkets

MarketsandMarkets has been recognized as one of America's best management consulting firms by Forbes, as per their recent report.

MarketsandMarkets is a blue ocean alternative in growth consulting and program management, leveraging a man-machine offering to drive supernormal growth for progressive organizations in the B2B space. We have the widest lens on emerging technologies, making us proficient in co-creating supernormal growth for clients.

Earlier this year, we made a formal transformation into one of America's best management consulting firms as per a survey conducted by Forbes.

The B2B economy is witnessing the emergence of $25 trillion of new revenue streams that are substituting existing revenue streams in this decade alone. We work with clients on growth programs, helping them monetize this $25 trillion opportunity through our service lines - TAM Expansion, Go-to-Market (GTM) Strategy to Execution, Market Share Gain, Account Enablement, and Thought Leadership Marketing.

Built on the 'GIVE Growth' principle, we work with several Forbes Global 2000 B2B companies - helping them stay relevant in a disruptive ecosystem. Our insights and strategies are molded by our industry experts, cutting-edge AI-powered Market Intelligence Cloud, and years of research. The KnowledgeStore (our Market Intelligence Cloud) integrates our research, facilitates an analysis of interconnections through a set of applications, helping clients look at the entire ecosystem and understand the revenue shifts happening in their industry.

To find out more, visit http://www.MarketsandMarkets.com or follow us on Twitter, LinkedIn and Facebook.

Contact: Mr. Aashish MehraMarketsandMarkets INC. 630 Dundee Road Suite 430 Northbrook, IL 60062 USA: +1-888-600-6441 Email: [emailprotected] Research Insight: https://www.marketsandmarkets.com/ResearchInsight/cloud-migration-service-market.asp Visit Our Website: https://www.marketsandmarkets.com/ Content Source: https://www.marketsandmarkets.com/PressReleases/cloud-migration-service.asp

Logo: https://mma.prnewswire.com/media/2297424/MarketsandMarkets_Logo.jpg

SOURCE MarketsandMarkets

View post:
Cloud Migration Services Market worth $29.2 billion by 2028 - Exclusive Report by MarketsandMarkets USA ... - PR Newswire

Embracing shadow AI will help accelerate innovation – CIO

Emerging technologies catch IT leaders flat-footed, so it comes as no surprise that some are clenching their teeth over shadow AI, or the unsanctioned use of generative AI and associated services.

CIOs recall when cloud computing disrupted the industry more than a decade ago. They remember business line leaders using corporate credit cards for cloud applications from startups.

Yet once IT leaders realized how much employees valued these tools they came around. They secured enterprise licenses, integrated the technologies with their existing IT systems and trained employees. IT leaders augmented productivity while preserving security.

With todays proliferation of genAI services democratizing AI, IT leaders are bracing for the growth of shadow AI.

Yet IT leaders should embrace and extend rather than hinder employees genAI experiences.

This would serve two desirable goals: help employees realize greater productivity and even augment the customer experience.

GenAI could help buoy profits by as much as $4.4 trillion by boosting productivity across customer operations, sales and marketing, software engineering, and research and development, according to McKinsey Digital.1

With genAI gaining traction, IT should learn what employees prefer to use, educate them on how to use them responsibly and institute guardrails. This might help IT garner goodwill with the business, with which it may be at oddseven today.

Consider that while more than half of IT decision makers want a stronger relationship with their business peers, 81% of business decision makers exclude their IT peers from strategic decision-making, according to new Dell research.2 Lack of trust is typically the key sticking point.

Yet IT leaders can take lessons from their past experiences with shadow IT to build a bridge between employees and genAI that cultivates trust unleashes innovation. These tips can point the way.

Some IT leaders first instinct is to create or at least command every technology solution. Instead, IT leaders should learn and understand how employees consume genAI to assist their work.

IT leaders must then work with the C-suite to build consensus around how to use genAI to accelerate the business but balance such efforts with risk mitigation, as McKinsey noted.

Leadership will communicate this messaging to the rank-and-file early and often.

When its time to engage with a vendor or build a solution, IT leaders can position themselves as innovators by executing with a product management mindset that aligns agile development practices with business goals.

CIOs can use this approach to ensure that their technology solutions directly contribute to the organizations objectives, said CIO-turned-investor Yousuf Khan.

GenAI is new enough that most employees dont yet know how to use it and most companies arent helping. Only 6% of companies have trained more than 25% of their people on genAI tools, according to a Boston Consulting Group survey of C-suite executives.3

Organizations must tailor education, training and tools for employees in technical and nontechnical roles.

Accenture plans to train 250,000 employees on how to use genAI services responsibly, said Accenture CEO Julie Sweet at the recent World Economic Forum. This is basic digital literacy to run a company and to be good, Sweet said.

The stakes are high for such literacy. As much as 40% of current job roles will be redefined or eliminated across large enterprises due to genAI adoption, according to IDC research commissioned by Dell.4

From a risk perspective, genAI is like Jurassic Parkchaotic. GenAI services are black boxes; no one knows how they arrive at their conclusions. They may hallucinate and spew false information. Comprised or inaccurate content can put businesses reputationor worseat risk.

This makes risk mitigation critical. Most companies will track and assess AI for risk and apply mitigation strategies as needed over the next 12 to 24 months, Accentures Sweet predicted.

That timeline feels long. Organizations adopting genAI should institute governance and security models today, ideally taking a Zero Trust approach, to keep the organization safe and secure.

Falling back on the classic command-and-control stance is instinctive for IT leaders, but genAI is too easy to use and easily accessible for most employees.

Instead, IT leaders should work with their business peers on responsible use, adopt and/or build safe and vetted technologies, and educate and communicate to the rank-and-file how to consume them.

Trusted partners can help, providing the hardware, software and services to help organizations bring AI to their data in a way that respects IT governance while democratizing employee access to genAI services.

Learn more at dell.com/ai.

See the article here:
Embracing shadow AI will help accelerate innovation - CIO

USPS scam smishing campaigns could move to cloud with SNS Sender – SC Media

USPS failed delivery scam texts could be sent through Amazon cloud services using a new phishing tool brought to light by researchers Thursday.

SNS Sender is a Python script discovered by SentinelOne researchers that is designed to enable bulk SMS delivery via the Amazon Simple Notification Service (SNS). The phishing kit automatically inserts links to attacker-controlled websites, such as fake U.S. Postal Service (USPS) websites that collect victims personal information including names, addresses, phone numbers, emails and credit card numbers.

SentinelLabs Threat Researcher Alex Delamotte said in a blog post detailing the script that it represents a previously unseen technique in the context of cloud attack tools.

A common threat between businesses and threat actors is that both are moving workloads previously handled by traditional web servers to the cloud, Delamotte wrote.

SMS phishing, or smishing, campaigns may leverage bulk SMS delivery tools, such as Twilio, to boost their ability to spam victims en masse. The SNS Sender smishing kit is believed to be the first of its kind to target Amazon SNS, according to SentinelOne.

The suspected author of SNS Sender is known by the alias ARDUINO_DAS, whose handle appears in more than 150 other phishing kit files identified by SentinelOne. More than half of the kits associated with ARDUINO_DAS were related to USPS scams.

SNS Sender contains a text file for storing a list of phishing links that are randomly chosen and inserted into smishing messages by replacing occurrences of the linkas string. It also includes text files for storing target phone numbers, message contents and Amazon Web Services (AWS) access keys.

There are some signs in the SNS Sender script that suggest it is more of a work-in-progress than a complete smishing kit. For example, the script includes the ability to insert a custom sender ID, which is not supported by carriers in the United States where targets of USPS scams would presumably reside.

Additionally, the manner in which the script selects AWS access key pairs to use for each message does not appear to be optimized, as it would require an impractically long list of credentials to run at scale.

While the discovery of a phishing tool dedicated to exploitation of Amazon SNS is a new development, there have been several examples of threat actors targeting cloud servers for potential subsequent phishing campaigns.

For example, an attacker who used previously exposed AWS access keys to infiltrate an AWS server in March 2023 was observed by Permiso researchers attempting a GetSMSAttributes action. The researchers realized attackers may run GetSMSAttribute, GetSMSSandboxAccountStatus and similar commands to determine if a hijacked server is configured properly to send mass SMS messages.

Attackers targeting AWS SNS may run into trouble, as the cloud service does not enable bulk SMS delivery by default. The AWS tenant must be outside of the SNS sandbox environment to take advantage of this feature.

SentinelOne previously detailed Predator AI, a Python-based infostealer and hacking tool that leverages the ChatGPT API. Predator AI targets a wide range of cloud services, including email and SMS communication services that could be leveraged for phishing campaigns, such as AWS Simple Email Service (SES).

Earlier this year, another Python-based hack tool called FBot was revealed to be targeting AWS, Sendgrid, Twilio and other cloud and software services. Like Predator AI, FBot established initial access to accounts to be used post-compromise for email and text spamming.

Continue reading here:
USPS scam smishing campaigns could move to cloud with SNS Sender - SC Media

Benefits and challenges of managed cloud security services – TechTarget

Organizations continue to grow more distributed, virtual and complex. Over the last several years, they have sped up digital transformation projects, leaning hard into hybrid and multi-cloud deployments. This rapid movement comes with a price, however. Too many organizations lack the in-house cloud security expertise and resources needed to protect cloud assets effectively.

One option to address these challenges is managed cloud security. Outsourcing cloud security to a third party not only helps organizations with limited cloud security resources manage risks in the cloud, but it can, in some cases, save budget and free in-house security teams to focus on other pressing issues.

Let's look at the challenges of managing cloud security and the benefits and challenges of using managed cloud security services.

The cloud introduces several new security issues organizations must contend with. Security teams struggle to detect and remediate cloud security threats, with 90% of the organizations surveyed in Palo Alto Networks' "The State of Cloud-Native Security Report 2023" admitting they can't identify and mitigate cyberthreats within an hour.

In addition, too many organizations deploy cloud applications too quickly. This can equate to limited testing time and DevOps teams deploying code with gaping security holes. Developers are also tapping commercial off-the-shelf software to accelerate deployment times -- some of which don't have the best security measures. An application's security is at risk if it has any vulnerabilities in the development software.

Organizations also struggle with the number of tools needed to manage cloud security. The Palo Alto Networks survey found teams use more than 30 discrete security tools, of which six to 10 are for cloud security. Plus, 75% said the large number of separate tools makes it difficult to get an accurate view of the cloud environment. They said, in this scenario, it is challenging to gauge where the most significant risks are and how to remediate them.

Lastly, cloud providers apply a shared responsibility model to security. IaaS providers are primarily responsible for infrastructure security, while the client is on the hook for securing the workloads running in the environment. Client cloud operations teams sometimes need help understanding where their obligations begin and end.

Managed cloud security delivers many of the same benefits as outsourcing on-premises security. It can provide advanced threat intelligence and threat hunting capabilities, backed by the support of threat researchers and sophisticated tools, to expedite and improve threat identification. These services can also help organizations prioritize alerts and contain threats.

The best managed cloud security providers are trusted partners that can deliver innovative and effective technology, while alleviating the headaches associated with collating data from disparate tools. Managed cloud security services can also give organizations access to cloud-specific expert resources and partners with experience navigating evolving regulatory environments.

Outsourcing cloud security can also be more cost-effective than handling everything in-house; consolidating security operations under a third party can lower some operating expenses.

Managed cloud security isn't perfect. Suppose the service only provides cloud security for one environment. The client's IT team must integrate data from the cloud security services with its other security resources, adding complexity to security management.

There is also always a risk the external provider and its partners could expose the client's cloud environment to new risks. This fear of loss of control keeps many organizations from adopting managed cloud security services.

Finally, using third-party cloud security services -- depending on the circumstances -- could prove more expensive than managing these protections internally.

Many cloud security suppliers are available. All hyperscalers and cloud providers offer security controls as part of their IaaS and SaaS offerings, often for free. However, apart from Microsoft, which offers a full slate of managed cloud security services, most are discrete tools focusing on a single security aspect rather than providing a complete end-to-end perspective on the cloud environment. These primarily concentrate on security within their cloud, which complicates the security situation for organizations with hybrid and multi-cloud environments.

On the other hand, all major managed security service providers (MSSPs) offer cloud security services, as do many vendors that opt for a security-as-a-service model. MSSPs often provide security across cloud and hybrid environments. Most of their services are delivered via the cloud, translating to more rapid deployment. They can also mask much of the complexity associated with cloud security management, making it easier for internal security teams to tackle challenges as they arise.

One crucial aspect to consider is how cloud security fits into an organization's broader security strategy. It is essential to see the security perspective across the entire enterprise IT estate, including hybrid and multi-cloud. Tools such as extended detection and response offer protection from the customer premises to the cloud. These products amalgamate the tools that track, analyze and orchestrate responses across endpoints, infrastructure, workloads, networks and the cloud.

Cloud security services are available for organizations of all sizes, but under-resourced smaller and midsize organizations typically benefit the most. Finding the right provider comes down to trust -- and a proven track record. Cloud security providers should be able to demonstrate effectiveness in production cloud environments with customer testimonials. They must have integrations with all the hyperscalers and major cloud providers. It is also essential that cloud security services can integrate with any on-premises security infrastructure for more holistic management.

Amy Larsen DeCarlo has covered the IT industry for more than 30 years, as a journalist, editor and analyst. As a principal analyst at GlobalData, she covers managed security and cloud services.

Link:
Benefits and challenges of managed cloud security services - TechTarget

Dubai RTA and Amazon Web Services do cloud deal – ITS International

The Roads and Transport Authority (RTA) in Dubai, United Arab Emirates, signed an agreement with cloud specialist Amazon Web Services (AWS) to support RTA's transition to cloud computing.

The transport agency calls this part of a "qualitative shift towards an advanced digital future", which also includes using artificial intelligence to "enhance innovation and improve the user experience" in Dubai.

A statement from the two also suggests they will exchange knowledge and best practice in areas such as application programming, data solutions, augmented reality, virtual reality and the Internet of Things.

Mohammed Al Mudharreb, CEO of RTA's Corporate Technology Support Services Sector, says: "This agreement aligns with RTA's objective to enhance its leading position and adopt the latest technological innovations."

Wojciech Bajda, director of AWS public sector in the Middle East and Africa, adds: "This cooperation with the RTA in Dubai represents an important step towards enhancing digital transformation in the region."

Read more here:
Dubai RTA and Amazon Web Services do cloud deal - ITS International

How a $10 billion media enterprise significantly increased SaaS security, yielding a 201% ROI – SC Media

The explosive growth of the SaaS market is enabling new heights of enterprise productivity.

As spending on SaaS applications grows by 18% annually, projected by Gartner to hit $232.3 billion in 2024, enterprise operations are being redefined, especially with the sensitive data moving into cloud-based SaaS services.

These trends are challenging CISOs with the need to devise a new security posture strategy.

However, organizations can only protect the data in view. Today, security teams lack visibility into the SaaS stack, which is becoming an expanding attack surface where threat actors are targeting security gaps.

SaaS Security Posture Management (SSPM) has emerged as the solution that can provide the correct security lens into the SaaS environment to ensure a robust security posture.

This article takes a look at how a $10B revenue enterprise adopted an SSPM solution to regain security control of its SaaS stack and improve its security posture. A Forrester Consulting Total Economic Impact (TEI) study, commissioned by the leader in SaaS Security, Adaptive Shield, found the investment delivered the enterprise 201% ROI in less than 6 months.

Lets zoom into the case study of a $10B annual revenue European-headquartered global media and information services enterprise organization where data security was set as a top priority in response to breaches and highly inefficient workloads and workflows.

Growing SaaS adoption for business-critical applications across the organization was challenging the security team. The company experienced six internal security breaches in one year that were attributed to SaaS app usage.

Since security managers had limited knowledge of each application, typically managed by different owners outside of IT or security teams, this left security teams with limited visibility into the applications security settings. App owners were neither educated nor equipped enough to exercise security, making it impractical for business teams to secure their ecosystem.

The security team was also investing 2400 hours a year in manual processes to implement compliance rules.

The company CSO realized it was time to automate SaaS security efforts, choosing the Adaptive Shield solution considering that it supported the industrys widest portfolio of SaaS integrations.

With the SSPM solution, the company experienced quick improvement in its SaaS security posture. During the Proof of Concept, the security team found issues in SaaS configurations and fixed them.

Before the POC, the companys SaaS security posture was 40%. In the first six months, the organization experienced rapid improvement, with the score reaching 70% by the end of the year.

An immediate benefit was a reduction in data breaches, dropping half in the second year and projected to be one or fewer the third year. An additional benefit was a 90% savings in labor efforts managing the firms compliance goals, with time spent decreasing to 240 hours per year.

As a cloud-first strategy creates a proliferation of SaaS applications, this case study demonstrates how organizations are successfully updating their cybersecurity strategy to continue to fulfill responsibilities to ensure that all data is secure wherever it is stored.

Learn more about how a $10B enterprise improved security posture with an SSPM and achieved a 201% ROI

Originally posted here:
How a $10 billion media enterprise significantly increased SaaS security, yielding a 201% ROI - SC Media

What is cloud computing anyways?. And why does it matter? | by Hamza Iqbal | Feb, 2024 – Medium

What is cloud computing anyways?

And why does it matter?

If you have never heard about something like AWS or Azure before, then it must feel like some alien technology with cool names where nerds throw difficult words here and there. And nothing pretty much makes any sense.

Infrastructure, cloud, serverless- What does this all really mean?

But just like everything, its not complicated, and maybe the first step towards becoming a good cloud engineer is to understand its raison dtre; its reason for existence.

Why do Companies use Cloud?

You might think, in a world which keeps getting expensive, why would someone in their right minds decide to buy expensive cloud services? I havent even bought a spotify premium yet, and piratesbay is my netflix, so it really didnt make any sense to a peasant like me at all.

Not only these giant corporations lock you in their ecosystems, but you have to keep sending them hard-earned cash annually.

But the thing is, cloud services save you moneys. Loads of money. If you hire a good cloud engineer that is (Thats why you should hire me in future)

Anyways, the thing is, every big company worth its salt have a need of huge amounts of expensive hardware. The servers, data centers and all.

Lets take an example. Imagine you are a CTO or whatever of some big company, and you guys come with an idea of a new product that can take the world by storm.

After a long stupid meeting, you guys come to a conclusion that for this new product, your company will have to buy loads of hardware. It will take atleast 2 weeks to get delivered, a week to get configured, and a huge amount of upfront installation fees.

Worse than this is, what if that new brilliant app doesnt get any new customers. All of this will go to waste.

Even after all this, you might worry about how one earthquake or tsunami near your hardware resources can wipe away all the data of your precious little company. Its too much worry, and rich people dont like to worry at all. So, thats why smart people at amazon invented AWS.

AWS gives you access to all these hardware services online. So instead of going through all the worry, you can just rent some amazon hardware at a fractional cost and you are ready for development in a matter of minutes.

No installation cost, No salary to IT guys, and no worry about natural disasters or some technical issue wiping away your entire company.

Its just like putting your images on google drive. You dont have to worry about buying new memory cards everytime your storage gets full. You can just pay very minimal money and buy a good amount of storage.

Even if your mobile god-forbids gets damaged (or snatched if you live where I live: Karachi) you know that you still have access to your pictures.

Another great point is that you have to pay much less to AWS. They have what they call pay-as-you-go service. Something like google drive.

What this means is, you have to pay only for the resources you use, and as your customers grow, you can buy additional resources according to your needs. This is an important advantage.

If you had to buy your own hardware before the product launches, you would either fall in a condition where you bought less resources and now your product is crashing, or you bought more than needed resources and now they are sitting idle.

Both of them put you at a disadvantage, and in this cut-throat corporate competition, disadvantages like these can amount up to a failed business.

Anyways, so thats what the point of cloud computing is. Its a better way to use hardware resources for big companies who can not afford the hassle of having their own hardware setup.

So keeping this all in mind, big corporations prefer using a cloud computing platform like AWS or Azure. And thats where good cloud engineers come in.

They understand all the services in and out, and can make decisions as to which cloud services would save the most amount of companys cash.

But you might be thinking: What if there is a natural disaster at an amazon data center where my data is kept?

Smart people at amazon have thought about this too. Ill talk about this in the next article. Thanks for reading!

Read the original post:
What is cloud computing anyways?. And why does it matter? | by Hamza Iqbal | Feb, 2024 - Medium

Navigating the Cloud: Challenges and Solutions for Businesses in a Multi-Cloud Era – CXOToday.com

CXOToday has engaged in exclusive interview with John Dumalac, Global Sales VP of Distributed Cloud Services at F5

Applications are at the heart of all digital experiences, and when theyre secure, they unlock value and potential. But just as apps have become critical for life online, theyve also become harder to protect. Todays apps are built on multiple architectures, distributed over various cloud environments, and connected by an exploding number of APIs. According to Deloittes most recent research, SMBs that use the cloud grow 26% quicker and are 21% more lucrative, while businesses praise the clouds resilience, agility, flexibility, and scalability. However, cloud security concerns continue to prevent organizations from fully adopting the cloud, resulting in reduced cloud ROI. Below are some of the hybrid and multi-cloud challenges that businesses face:

At F5, we understand these challenges and strive to help our customers simplify hybrid and multi-cloud environments. We make it easy to deploy and maintain applications and APIs faster, smarter, and more cost-effectively using automation and advanced deployment techniques such as dynamic security policies and API discovery. We also bring distributed ecosystems into focus with a single SaaS-based management console, robust troubleshooting tools, and insights from application behavior. With F5, customers can maximize app performance and reduce security headacheseverywhere their apps are deployed.

Distributed cloud computing decentralizes resources to improve closeness to data sources, addressing difficulties that centralized models ignore. It offers benefits like data localization, decreased latency, greater performance, cost-effectiveness, and a better user experience. According to SlashData, 55% of global developers are already using the distributed cloud approach in some form for their work.

And to strengthen organizations in this digital world, where organizations are adopting a distributed cloud approach, we brought forth our F5 Distributed Cloud Services. These are SaaS-based security, networking, and application management services that enable customers to deploy, secure, and operate their applications in a cloud-native environment wherever neededdata center, multi-cloud, or the network or enterprise edge.

Through F5s Distributed Cloud Platform, we provide flexibility as these services are centrally managed but can be deployed anywhere the app needs to be to maximize business impact and deliver a superior customer experience. We also enable our customers to automate application deployment, scaling, security, secrets/keys, and operations, as the control plane removes the overhead of managing individual Kubernetes clusters. In addition, it also provides complete infrastructure management for heterogeneous cloud and edge environments.

F5 Distributed Cloud Platform provides SaaS-based security, networking, and application management approach, providing businesses with a lot of advantages. The F5 Distributed Cloud Platform allows businesses to gain scalability and flexibility while lowering infrastructure costs and ensuring global reach for continuous service delivery. Businesses can streamline operations and focus on key skills by automating updates and maintenance, implementing strong security measures, and providing a unified administration interface. Integration capabilities and performance optimization improves the overall effectiveness of managing and safeguarding applications and makes F5 Distributed Cloud Services an attractive option for enterprises looking for a modern, cloud-centric approach to their IT infrastructure requirements.

India is a significant market for F5, and we have a base of 5000+ customers. Operating for more than two decades in the country, F5 has its largest R&D center in Hyderabad, with people working towards new developments and innovations. In India, we have a robust partner ecosystem consisting of distributors, resellers, and system integrators. Along with this, we also have a dedicated team that manages our channel partner network and drives growth in the region.

Our focus in India has been on application security and cloud-based services, resulting in the expansion of our operations. F5 products and solutions are widely used in various industries such as banking, financial services, insurance, telecom, etc. To cater to the specific needs of the Indian market, we are committed to investing in the region to expand our channel partner network and drive growth. The new excellence center in Bengaluru, an extension of our current R&D center in Hyderabad, supports our ambition to become a global leader in multi-cloud application services. The center will play a critical role in driving research, development and product innovation for F5 as the company expands its portfolio of multi-cloud application security and delivery solutions.

India is one of the worlds largest and fastest-growing digital consumer marketplaces, according to Nielsens India Internet Report 2023, India already had over 700 million active internet users by Dec 2022. As digital capabilities increase and connectivity becomes more widespread, technology is poised to rapidly alter every area of Indias economy. This is anticipated to provide enormous economic value while also changing the nature of labor for Indians. The public and private sectors are driving digital consumption growth. The government has recruited over 1.2 billion Indians in its biometric digital identity program. Aadhaar has brought over 10 million enterprises onto a digital platform through a goods and services tax. Digital applications are expected to proliferate across most sectors of Indias economy. Core digital sectors such as IT and business process management, digital communication services, and electronics manufacturing could double their GDP level to $355 billion to $435 billion by 2025. According to a report by McKinsey Global Institute on Digital India Sectors such as agriculture, education, energy, financial services, healthcare, logistics, and retail, as well as government services and labor markets could create $10 billion to $150 billion incremental economic value in 2025.

The coming years will definitely witness the Indian era when it comes to digital growth and we at F5 are working towards being a part of this by helping businesses leverage the digital developments in India.

The ever-evolving world of technology has an immense impact on businesses, modifying how they operate, develop, and remain competitive. In recent years significant trends have evolved, influencing multiple facets of the business ecosystem. Businesses are traversing a changing technical terrain that includes the integration of artificial intelligence and edge computing, developments in cybersecurity operations, and the growing relevance of API Security. Telemetry, cloud-native technologies, 5G, and robotic process automation all play an important role in the industrys pursuit of sustainability, connection, and efficiency. Below are some more technology trends that businesses must look out for:

See the article here:
Navigating the Cloud: Challenges and Solutions for Businesses in a Multi-Cloud Era - CXOToday.com

Google Cloud’s Anton Chuvakin Talks GenAI in the Enterprise – InformationWeek

With the proliferation of generative AI, much of it consumer-oriented, it may be inevitable that such platforms and tools find their way into the workplace -- even if they are not designed to meet the oversight businesses require in their technology.

From proprietary code to sensitive data, the stakes can be high for organizations. Generative AI (genAI) that is not built specifically for the rigors businesses face could be a liability when it comes to regulatory compliance on information security and access. Moreover, what consumer-focused generative AI produces might be fraught with AI hallucinations, errors, and simply not measure up to the standards businesses require.

Amusing tools for spawning digital content might leave a few windows, doors, and ventilation ducts open -- potentially compromising digital security.

Anton Chuvakin, security advisor at the Office of the CISO with Google Cloud, spoke with InformationWeek about how consumer-oriented generative AI might bring more headaches than efficiency to businesses.

Consumer technology, such as smartphones, worked their way into the workplace, sometimes before folks really thought about how device management or security was going to be dealt with. Organizations might be caught up in the shiny new object of generative AI now, and not asking how they can actually police this. Can they shift to something else, potentially stop the use of consumer-oriented generative AI?

Related:How Generative AI Is Changing the Nature of Cyber Insurance

I think that the cases weve encountered are kind of fun and occasionally quite irrational. Wasnt there the classic case in the media about the lawyer who was using ChatGPT, and it was giving him made-up data? To me this is like the top of the iceberg of consumer-grade AI being used for business. In many cases what I would have to deal with as part of the Office of the CISO is the security leader calling me and saying, We need security guidance. And then they ask about these controls and those controls. And then they, Oh, by the way, we use ChatGPT-3.

Im like, But its a toy.

A very fun toy. The point is that these are toys for fun and personal education. But youre describing the levels of control, granular access between teams at your organization, but then you say you use ChatGPT-3. That makes absolutely no sense, but to him it did because his business was pushing him -- that they want to use this tool.

In essence, these stories are quite surreal at times because what we encounter from clients is just a lack of understanding of whats a consumer toy -- probably inaccurate, but still good.

Related:Selipsky at AWS re:Invent on Securing Data in the GenAI World

I was writing a letter to my former dance teacher using Bard [Googles chat-based AI tool. Today, Google announced it was changing Bard's name to "Gemini."] Its like a belated Christmas message. Bard [Gemini] is doing great with that. Would I do it for security advice given my realities to a customer? No. General advice would probably be good, but you need to have precision; you need to have certainty; you need to have provenance of data. But this intermixing is kind of endemic and sometimes it pops up not only as mismatch of use cases, but also people demanding controls, which they expect in enterprise technology from consumer-grade technology.

The result is even more hilarity is generated because its not going to fit.

When our field teams talk to customers about Vertex AI [Googles tool for testing and prototyping generative AI models], there are many, many layers of controls -- technology, procedural controls explaining how we do things.

What I want to invent, ultimately what we want to invent, is more than just education. We dont just want to tell people, Hey, youre really doing it wrong. It only goes so far. I feel like building an enterprise stack so that its as easy to adopt as consumer-grade tech but has all the controls is going to be the direction, probably for the future.

Related:Generative AI an Emerging Risk as CISOs Shift Cyber Resilience Strategies

Another common enterprise theme is people say, Would it learn from my prompts? And the answer is, Yes, of course for consumer-grade; no, of course not for enterprise.

Its like complete polar opposites. Yes, it would. No, it would not. Absolutely, yes. Absolutely, no. You see these forks in the road and if you really want an enterprise AI for enterprise use cases, you push vendors to build things, require things, require controls, require privacy controls, require governance controls -- a long list of things versus just go and sign up.

There are mindsets about being aware of security, visibility, access, and what is going on within an IT infrastructure or cloud infrastructure. For whatever reason, did that just kind of get forgotten once generative AI came onto the scene?

If you look at some of the online reports about some people who are trying to create an enterprise AI out of consumer AI, you would see some hilarity in the access permissions. For example, your function at an enterprise shouldnt see what my function in the enterprise does with the AI. It may be compliance; it may be just practical. It may be that mine is less sensitive than yours, but this type of cross-pollination, cross-learning is sort of assumed in consumer because you wanted to learn from everything. But its assumed to not be there in enterprise.

For example, if I am a security incident responder and you are an IT guy, I dont want you looking at my tickets (a very 1990s example), because it is possible that Im investigating you for leaking corporate data. There are many other reasons why security data is more sensitive. Imagine the same thing with genAI where youre training AI on tickets.

Some companies would say, AI -- tickets. Push the button. Did they think, Whoa, wait a second. Their permissions, the level of sensitivity here, its not just like a ticket database. Ive been telling a story -- it didnt happen to a client, but its something Ive heard from industry contacts where something vaguely similar happened. If they didn't have genAI, if they were just playing in enterprise, they would think, OK, what are the access rules? Who would access what?

But with this particular AI, not only they didnt think about it, the actual tech stack they used did not have a way to do it because it was kind of a derived from ultimately consumer genAI. To me this type of permissioning, and Im not talking about like fine permissioning, but more like, Just give it all the data.

What are the consequences for enterprises? Whats at stake here if organizations dont make it clear within their operations how theyre going to use gen AI, whether or not theyre going to allow use of the consumer-facing options? Have we learned lessons from examples in the earlier days for ChatGPT when proprietary code from Samsung got into the wild?

In essence they went to ChatGPT, and they submitted pieces of Samsung code and wanted to improve it or whatever the use case was -- I vaguely recall that. It wasnt really an accident from their point of view. They really did want to do exactly that. It was just the wrong tool.

The problem is that at the time, there were no right tools. I think that the excitement to use new technology is obviously a feature of many IT technologists. Maybe less so in security. Frankly, just the other day, I was polling security leaders about what they care more about: securing AI or using AI for security?

I expected them to go full-on paranoia and say, Hey, were all securing AI. But in reality, it split half and half. It was a very informal poll, not Google-sponsored. The point is that the balance wasnt, Im a CISO; I care about secure use of AI by my company. The result was one CISO, "yes," another CISO is, I care about using AI for security now. The motivation to move quickly is very strong and I sense that the fear of missing out here is stronger. This is my guess, based on my experience.

More:
Google Cloud's Anton Chuvakin Talks GenAI in the Enterprise - InformationWeek

The Rise of Hybrid and Multi-Cloud Computing Architecture – NEXTDC

In today's dynamic business environment, the shift to cloud operations is more crucial than ever. As organisations transition, the need to scale securely and efficiently takes centre stage. This article unveils the secrets to mastering cloud strategies and navigating the contemporary organisational landscape.

These findings shed light on the evolving landscape of cloud adoption, showcasing the enduring popularity of hybrid and multi-cloud strategies among organisations.

In the ever-evolving realm of cloud computing, enterprises are expanding their horizons beyond in-house data centres, embracing strategic approaches such as multi-cloud, hybrid cloud, and colocation solutions. Let's unravel the distinctions and explore the latest trends shaping the diverse landscape of cloud computing strategies.

Example: In hybrid and multi-cloud environments, the integration of edge computing is revolutionising real-time data processing. For instance, a retail company employs edge computing to analyse customer behaviour data instantly, enhancing personalised shopping experiences.

Hybrid cloud and multi-cloud are enduring enterprise solution strategies integral to a comprehensive hybrid IT approach. Both terms are anticipated to remain relevant in the long term. While cloud services offer numerous advantages, they also pose distinctive challenges. IT leaders need to establish a robust IT automation strategy to effectively manage the chosen solution. Furthermore, a thorough assessment of enterprise transformations is essential, as the adoption of new technology introduces potential new threats and challenges.

Hybrid cloud and multi-cloud solutions are cornerstones of modern enterprise IT. As you navigate the complexities of cloud adoption, it's also crucial to align your strategy with your unique organisational needs and goals.

By weighing up your unique needs, you can narrow down your choice of multi or hybrid cloud. The perfect type of cloud service is one that delivers the resources you need, protects your assets, and fits your requirements.

Leverage Australia's most extensive partner ecosystem with a community of 750+ partners to enable more connections with carriers, cloud providers, and IT service providers.

Empowering customers to leverage cloud first strategies and optimise multi-cloud deployments to scale mission critical IT infrastructure.

NEXTDC is at the forefront of supporting Edge computing and High-Performance Compute (HPC) requirements, providing customised solutions to accelerate your AI journey.

The only data centre operator in the southern hemisphere with Tier IV Gold certification for Operational Sustainability, NEXTDC guarantees zero downtime for reliability and performance.

Secure, private, and direct access to Australias most connected range of global cloud providers, integrated with a nationwide network of data centre facilities.

Internationally recognised for designing, constructing, and operating Australias market leading Tier IV facilities, certified by globally renowned Uptime Institute.

Demonstrating a commitment to sustainability, NEXTDC prioritises renewable energy sources, achieving leading standards such as 5-star NABERS energy efficiency ratings and TRUE certification.

NEXTDC is certified by Australias Digital Transformation Agency (DTA), to ensure compliant and sovereign critical infrastructure choice for government at all levels.

NEXTDC, a listed company on the ASX 100, stands out with industry peer awards as the region's most innovative and customer focused data centre provider.

NEXTDC's corporate operations are certified carbon neutral under the Australian Governments Climate Active Carbon Neutral Standard.

Engineered for outstanding energy efficiency, NEXTDC data centres deliver industry-leading benchmarks for minimising operational cost and total cost of ownership.

Go here to see the original:
The Rise of Hybrid and Multi-Cloud Computing Architecture - NEXTDC