Blog da Zscaler

Receba as últimas atualizações do blog da Zscaler na sua caixa de entrada

News & Announcements

The Three Phases of Cloud Evolution

image
MATT PIERCY
February 02, 2018 - 3 Min. de leitura

The cloud makes it possible for companies to focus completely on their core business.  It means they become more efficient, IT spend is curbed, and employees are empowered to find computing solutions to suit them. Cloud adoption is accelerating new opportunities and new markets. The combined innovation in the cloud far outstrips what an Enterprise could hope to innovate – it’s getting better every day. However, the path to ’off-premise’ nirvana has been fraught with complications and only now are we reaching ‘cloud nine’.

Phase One: How the Cloud Came to be

Companies began treating computing as a utility as early as the service bureaus of the 1960s, long before application service providers (ASPs) brought web-based applications to market as a service in the 1990s. Some of these early attempts failed because the technology was too crude and networks couldn’t cope. However, it proved the cloud would be viable once hardware improved and networks could handle the traffic.

When Java arrived and allowed us interactive applications on the web, it hit home that this concept of using the internet to connect to off-premise applications really could happen. Fast forward 10 years, Java matured, the internet became faster and easier to access, in fact, it became the best network in the world, and so it became viable to give enterprises and users the ability to do computing the way it works nowadays: with the benefits of unprecedented agility and flexibility.

Phase Two: Controlling the Cloud

The cloud caught IT departments unaware when employees started to use it for business. Staff started to bypass IT in their search for the best application available to support their job – which was often cloud-based and therefore created the phenomena of Shadow-IT.

The problem was that the cloud had the potential to negate the value of the network and those datacenters the IT department had so carefully created. In their old way of working IT managers viewed themselves as the keepers of a castle, they had built a moat around it and data and applications were secured inside this fortress. Many IT departments went into total denial with the cloud at first, as they could not face the idea of losing control over data and applications that were moving outside the fortress.

IT teams tried to keep everything under control by blocking cloud applications, inventing policies and forcing staff through lengthy and costly hoops to get them cleared – and of course, this procedure is the total contrary of what the fast, accessible and cost-effective cloud was supposed to be.

But users continued to plot their own path and justified their decisions because these cloud-based applications made them faster and more productive in their work environment, it made them more successful. At that point, the cloud had become an unstoppable force. This is, when IT departments realized, that they have to change their way of thinking and to adopt a methodology of coping with the trend.

Phase Three: Coping with the Cloud

Today, the cloud is everywhere. Applications are being used and the business and control-based IT methods are being rigorously updated. Internet-bound traffic already dwarfs that of datacenter bound traffic in most organizations. Up to 70 percent of network traffic today is already directed off premise. Organizations realize they have to adapt by implementing new processes and structures designed for an IT world centered on the cloud.

As digitalization is not only about implementing cloud-based apps, this move needs to be thoroughly planned. An old-fashioned castle and moat network does not work anymore in a world where cloud requirements for performance, bandwidth, and security are dominating. A network-centric infrastructure belongs to the past and will eventually be left behind on a journey to encompass the internet as the new corporate network. Companies will have to accept that they cannot control the internet. The security battle line has moved, connecting to the network is no longer enough; it's about connecting the right user to the right resource.

form submtited
Obrigado por ler

Esta postagem foi útil??

Aviso legal: este post no blog foi criado pela Zscaler apenas para fins informativos e é fornecido "no estado em que se encontra", sem quaisquer garantias de exatidão, integridade ou confiabilidade. A Zscaler não se responsabiliza por quaisquer erros, omissões ou por quaisquer ações tomadas com base nas informações fornecidas. Quaisquer sites ou recursos de terceiros vinculados neste post são fornecidos apenas para sua conveniência, e a Zscaler não se responsabiliza por seu conteúdo ou práticas. Todo o conteúdo está sujeito a alterações sem aviso prévio. Ao acessar este blog, você concorda com estes termos e reconhece que é de sua exclusiva responsabilidade verificar e utilizar as informações conforme apropriado para suas necessidades.

Receba as últimas atualizações do blog da Zscaler na sua caixa de entrada

Ao enviar o formulário, você concorda com nossa política de privacidade.