Hot off the heels of last week’s Amazon Web Services re:Invent conference, we sat down with DLT’s Chief Technology Officer, David Blankenhorn, to discuss the current state of the Cloud and what drivers will fuel more innovation and adoption for the U.S. public sector in 2020.
There have been a few big agenda items for the cloud community to digest this year – what is the current state of U.S. public sector cloud adoption and usage?
Every year, thousands of cloud enthusiasts, vendors and partners gather in Las Vegas for a week of learning and networking (and maybe a little downtime), all in the name of Amazon Web Services (AWS). This year was no different, and in excess of 65,000 people descended upon Las Vegas for the 8th annual AWS re:Invent conference: an event that continues to get better, and certainly bigger, every year.
Although cloud adoption in government is growing, it can be a challenging technology to envision. Many cloud deployments don’t go as planned, take longer than expected to implement, or fail completely. In the private sector, studies suggest that 74% of those organizations that move an application to the cloud moved it back into their own infrastructure.
By Mav Turner, VP, Product Management, SolarWinds
For federal IT pros, moving to a cloud environment is a “when” rather than an “if” proposition. From the government’s recently released Report on IT Modernization, calling for agencies to identify solutions to current barriers regarding agency cloud adoption, to the White House’s draft release of a new “Cloud Smart” policy, which updates the “Cloud First” policy introduced in 2010; cloud migration continues to be a priority.
More and more organizations are making the move to cloud-based security solutions. Today, 33 percent of organizations are planning to adopt one or more security-as-a-service (SECaaS) solutions. The efficiency with which endpoint security solutions can provide protection, particularly when delivered as-a-service, is a key strategic consideration for many organizations – perhaps none more so than America’s network of medical schools and teaching hospitals.
It’s often said that there are two types of organizations: those that have been hacked, and those that will be – turning the conversations around security breaches from ‘what if?’ to ‘when?’.
A vast majority of government networks are driven by Microsoft products, from Office 365 to the Azure cloud platform. It should come as no surprise, then, that more and more agencies are looking for tools to monitor Microsoft systems more effectively—all through a single pane of glass.
The good news is there are ways to make the most of existing Microsoft technology with complementary monitoring strategies that will meet the needs of the federal IT operations security teams, SysAdmins, DevOps pros, and managers.
The AWS Public Sector Summit is just around the corner. Part of a global series of summits, this year’s event in Washington, D.C. brings the public sector cloud community together to connect, collaborate, and learn about AWS. DLT will be exhibiting at the Summit this year with its technology vendors including AWS, Crowdstrike, NetApp, Quest, and more in booth #800.
Federal agencies are using multiple public clouds in addition to on-premises private and non-cloud infrastructures. This mutli-cloud adoption is creating increasingly complex environments and making it difficult to manage and protect data. Without proper data management, hybrid and multi-cloud environments can quickly become just another series of expensive and risky silos. All cloud migration strategies should encompass data management best practices to maximize cloud adoption benefits while minimizing risk.
Cloud services are accelerating agility and collaboration and generating cost-efficiencies for government agencies. But as the public sector takes more and more advantage of the cloud, it’s important not to forget the data. In SaaS environments, agencies own the security of that data and need to access it appropriately. When using IaaS or PaaS, government is also responsible for the security of those workloads and the correct configuration of the underlying application and infrastructure components.