Verified Document

Cloud Computing Information Security In Research Paper

All of these factors taken together will provide enterprise computing buyers with more effective foundations of arguing for more thorough measures of application performance. The net result will be much greater visibility into how cloud computing is actually changing the global economics of the enterprise computing industry. III. Final Report:

Introduction

The foundational aspects of cloud computing's economic advantage are predicated on how efficiently this approach to propagating enterprise-wide applications across entire organizations at a very reasonable cost. The technological factors of this technology platform, along with its accompanying infrastructure stability, fault redundancy, multitenancy, security and user experience advancements, have made it an area of continued research & development focus by many leading corporations and universities. As a result there is a wealth of both empirical and theoretical knowledge with regard to cloud computing as a technology platform alone. The myriad of those developments form the foundation of a disruptive shift in the economics of enterprise software, including a complete redefinition of how Total Cost of Ownership (TCO) is used today for evaluating and choosing SaaS-based applications over traditional, and more expensive on-premise applications (Bhutta, Huq, 2002). While the TCO advantages of cloud-based applications and platforms are very compelling, there is a lingering doubt in the minds of many Chief Information Officers (CIOs) with regard to their long-term viability and value. CIOs are given the responsibility of stabilizing the enterprise it infrastructure for the companies they work for; their ideal situation is having no risk and no strategic challenges to deal with during their tenure (Carr, 2011). They are in essence the keepers of the it infrastructure dial-tone.

Yet cloud computing, with its disruptive economic forces and as this study shows, significantly lower Total Cost of Ownership (TCO) indexed to SLA performance, can deliver significantly greater business gains over time. As has been often cited in Dr. Clayton Christensen's book the Innovator's Dilemma, the role of new market entrants is to often change the economics of a given industry by making more streamlined, cost-effective technologies more strategic over time. This is the identical paradigm that is reshaping the cloud computing industry today globally, and is especially evident in the area of Customer Relationship Management, which is experiencing the most rapid adoption rates of any category. For purposes of this study, a comparison of TCO performance between on-premise CRM applications and cloud-computing CRM applications has been made. These results are indexed by services revenue of each company, which is an indicator of how profitable Service Level Agreements (SLA) is for each vendor. From the cloud computing vendor's perspective, SLAs are often used as a means to gain trial and eventual adoption of enterprise-wide cloud computing applications. For the o-premise vendor, their maintenance revenue stream, as has been mentioned before, form the majority of their recurring revenue stream over time. To ensure complete coverage of the market, the top three market share leaders will be covered in this analysis. The following chart provides an analysis of the worldwide CRM market share leaders in 2012, which is the latest available data from it research advisory firm Gartner Inc. In their report Market Share Analysis: Customer Relationship Management Software, Worldwide, 2012 published April 18, 2013 this firm showed that Salesforce.com has the majority of worldwide CRM market share with 14%, followed by SAP at 12.9%, Oracle at 11.1% and Microsoft at 6.3%. Only Salesforce.com generates all of its revenues using a cloud-based architecture. Figure 1, Worldwide CRM Software Spending by Vendor, 2012 illustrates the distribution of worldwide CRM software sales by vendor.

Figure 1: Worldwide CRM Software Spending by Vendor, 2012

Source: (Gartner, 2013)

SAP, Oracle and Microsoft each rely on the traditional enterprise software model of having a series of relative high up-front costs, followed by a recurring maintenance fee over time. This is in contrast to the business model cloud-based application providers use including Salesforce.com, who relies on a subscription-based business model. Large-scale enterprise deployments that are on-premise often take several months to gain funding approval of, and in the case of 400 seat implementations or more, must also go through a rigorous budgeting process (Stanic, 2003). This is because the initial costs of enterprise-wide application support and platforms can be well over $1 million or more. For cloud-based applications however, enterprises pay subscription fees and consulting fees for business process reviews. An emerging best practice today by early adopters of cloud computing...

Of the many areas where early adopters of cloud-based applications are making process, the one with the most use cases and evidence of business process management (BPM), business process re-engineering (BPR) and significant gains in corporate performance is CRM as a result. Given the wealth of CRM use cases, this area of enterprise software is the basis of this TCO and SLA analysis. on-premise enterprise software companies have long relied on BPM and BPR-based projects to increase the size and profitability of sales for on-premise applications (Shackleton, Saffre, Tateson, et.al. 2004). This has especially been true in CRM, where process latency from isolated, often customer-centric workflows can be quickly determined, and the isolated effects of a new CRM system quickly quantified as a result. This is lucrative for traditional enterprise software vendors including SAP, Oracle, Microsoft, IBM, Infor and many others that it is common to see the costs of these BPM and BPR projects are at least ten times those of the actual costs of the software itself. This 10X multiple for services, the majority of the time driven by BPM and BPR-based work, is often managed b y the CIO and their staff. In contrast, BPM and BPR-based work on cloud computing application are typically at a much lower multiple, nearly 5X at most, given the highly iterative nature of cloud-based applications and the ease of modifying them in real-time (Denne, 2007).
The discussion of BPM and BPR strategies for on-premise enterprise applications vs. those that are cloud-based is especially relevant from the funding perspective of the enterprise adopting them. For on-premise applications with heavy requirements for BPM and BPR custom programming professional services, funding is treated as a capital expense (CAPEX). CAPEX-based spending on a project requires approval not just of the CEO but of the board of directors of a corporation as well (Katzan, 2010). If the corporation is public, the expenditure will also need to be mentioned in the financial reports, filed with the Securities and E. change Commission (SEC) as a material event if the company is publically-held in the U.S. To ensure compliance with the Sarbanes-Oxley Act of 2002. While lengthy, complex and very time-consuming, corporations often tolerated this purchasing process to gain the potential value of an enterprise software application in their company. CRM, with its strong focus on driving top-line revenue, have historically been the most efficient at navigating the CAPEX process as the Return on Investment (ROI).

SaaS-based applications including CRM are sold on a subscription basis, where payment is made only on the functionality and in some cases, measured value delivered. This has over time lead to Salesforce.com and a myriad of other software companies creating pricing that aligns with operations budgets of enterprises. This budgeting approach is called OPEX (operating expense) and is under control of the line-of-business manager or leader of a given department. Selling software using the OPEX model leads to sales cycles that average less than two months, have in-build value accelerators to provide customers with incentives for using the software across more of their companies while also streamlining the BPM and BPR-based process improvements that enterprises typically put in place as they also introduce a new enterprise software application.

This shift in enterprise software economics, from CAPEX to OPEX, has its foundational elements in the compelling financial advantages TCO shows cloud-based applications have. SLAs are the accelerators of TCO-based change throughout the enterprise. Quantifying just how much of an impact SLAs have in decision-making is outside the scope of this research, which centers on indexing TCO performance of cloud-based applications. These fundamental shifts in the economics of cloud computing are a threat to the status quo CIOs so religiously attempt to protect. Yet the economics of cloud computing, in this era of economic uncertainty, are so pervasive that the role of the CIO is also being changed.

Change management is often the most critical success factor of any enterprise software deployment. The economics of cloud computing in general and the continual influence of TCO-based decision making in enterprises, is accelerating the pace of change in enterprises. CIOs can no longer rely on the status quo and a risk mitigation strategy to resist change, even when cloud computing platforms offer such compelling financial benefits to their organizations. CEOs, board of directors and shareholders all realize the pace of change itself is changing in the enterprise, and all calling on the CIO to become a strategist first, technologist…

Sources used in this document:
References

AMR Research (2003) -- Configuration is the Heart of Customer Fulfillment for Complex Product Manufacturers. AMR Research Report. Accessed with permission from the publisher.

AMR Research (2005) -- the Handbook of Becoming Demand Driven. AMR Research Report. July 15, 2005. Accessed with permission from the publisher. Lora Cecere, Roddy Martin, Debra Hofman.

AMR Research (2006) -- What is Demand Visibility? AMR Research Report. Published March 14, 2006. Accessed with permission from the publisher. Lora Cecere and Roddy Martin.

Ambust, M. et al. (2009). Above the Clouds: A Berkeley View of Cloud Computing. UC Berkeley Reliable Adaptive Distributed Labratory, 10 Feb 2009. Retrieved from http://x- integrate.de/x-in- cms.nsf/id/DE_Von_Regenmachern_und_Wolkenbruechen_-_Impact_2009_Nachlese/$file/abovetheclouds.pdf
Balachandra, R. et al. (2010). Cloud Security Issues. 2009 IEEE International Conference on Services Computing. Retrieved from http://xml.csie.ntnu.edu.tw/JSPWiki/attach/Supergud/Cloud%20Security%20Issues.pdf
Columbus, L. 2012. Cloud Computing and Enterprise Software Forecast Update, 2012. Forbes Online: http://www.forbes.com/sites/louiscolumbus/2012/11/08/cloud-computing-and-enterprise-software-forecast-update-2012/
Durkee, D. (2010). Why Cloud Computing Will Never Be Free. Communications of the ACM, May,2010,53, 5. Retrieved from http://www.san.uri.br/~ober/arquivos/orientacoes/artigos_referencia/communications201 005.pdf
http://www.forbes.com/sites/louiscolumbus/2013/04/26/2013-crm-market-share-update-40-of-crm-systems-sold-are-saas-based/
Kaufman, L. (2009). Data Security in the World of Cloud Computing. IEEE Security & Privacy, July/Aug 2009. Retrieved from http://xml.csie.ntnu.edu.tw/JSPWiki/attach/supergud/Data%20Security%20in%20the%20 World%20of%20Cloud%20Computing.pdf
King, R. (2009). Cloud computing: Small companies take flight. Business Week. http://www.businessweek.com/technology/content/aug2008/tc2008083 619516.htm
Leavitt, N. (2009). Is Cloud Computing Really Ready for Prime Time? Computer, 42(1), 15-20. Retrieved from https://www.hh.se/download/18.70cf2e49129168da0158000123279/8+Is+Cloud+Compu ting+Ready.pdf
McQueen, M. (2008) System Security Through Ideal Driven Technical Metrics. Idaho national laboratory. Jan. 2008. Retrieved from: http://www.inl.gov/technicalpublications/Documents/3881671.pdf
O'Bryan, 2006). Critical elements of information security program success. Retrieved from http://www.isaca.org/Journal/Past-Issues/2006/Volume-3/Pages/Critical-Elements-of-Information-Security-Program-Success1.aspx
Pronto, JP (2008) Developing Metrics for Effective Information Security Governance. Getronics. Retrieved from: http://www.interop.com/newyork/2008/presentations/conference/rc10-pironti.pdf
Rajkumar, B. Yeo, C., Venugopal, S. (2008). High Perfomance Computing and Commuications. HPCC 08, 10th International Conference on Computing. Retrieved from http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=4637675&url=http%3A% F%2Fi eeexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3D4637675
Stoddard, M. (2005) Process Control System Security Metrics -- " State of Practice. I3P. Retrieved from: http://stuweb.ee.mtu.edu/~ssmoily/section_4.pdf
Stolfo, S. et al. (2012). Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud. Security and Privacy, 2012 IEEE Symposiom, p 125-128, 2012. Retrieved from http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=6227695&url=http%3A%2F%2Fi eeexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3D6227695
Cite this Document:
Copy Bibliography Citation

Related Documents

Security in Cloud Computing
Words: 3274 Length: 10 Document Type: Research Paper

Security in Cloud Computing Security issues associated with the cloud Cloud Security Controls Deterrent Controls Preventative Controls Corrective Controls Detective Controls Dimensions of cloud security Security and privacy Compliance Business continuity and data recovery Logs and audit trails Legal and contractual issues Public records The identified shortcomings in the cloud computing services and established opportunities for growth regarding security aspects are discussed in the current research. The security of services is regarded as the first obstacle. The opportunity for growth is provided as combination

Cloud Computing and Security
Words: 729 Length: 2 Document Type: Web Content

Department of Defense (Dod) And Cloud Computing Through cloud computing services and technology, the Dod is able to set up an enterprise cloud that is in line with department-wide federal-level IT efficiency programs and plans. Cloud computing facilitates consolidation of infrastructure, leveraging of commodity information technology services, and elimination of operational redundancies, whilst simultaneously boosting operational continuity. These programs' success, on the whole, is reliant on well-implemented security requirements that are

Security Information Security Is a Primary Concern
Words: 809 Length: 2 Document Type: Essay

Security Information security is a primary concern for consumers and businesses. In "IT security fails to keep pace with the rise of cloud computing," the author claims that in spite of the advancements in cloud technology, information security has not kept pace. This assessment is rooted firmly in fact and best practices in the information security industry. Although their analysis is thorough, the authors would do well to point out the

Cloud Computing Laws Explained
Words: 799 Length: 2 Document Type: Essay

Cloud Security and Privacy Cloud computing's exponential growth is fueling a corresponding need for greater compliance, governance and regulations to ensure data and knowledge are secured and accessed for intended use. A regulation by definition is a rule or law, and has inherent within its definition support for compliance and enforcement (Halpert, 2011). Regulations differ from legal frameworks or standards in that the former is broadly protective and more focused on

Cloud Computing
Words: 3424 Length: 10 Document Type: Essay

Brodkin, J. (2008). Gartner: Seven cloud-Computing security risks. Infoworld, pp. 1 -- 3. Carlin, S. & Curran, K. (2011). Cloud computing security. International Journal Of Ambient Computing And Intelligence (IJACI), 3 (1), pp. 14 -- 19. Cloud Computing Benefits, risks and recommendations for information security. (2009). [e-book] Available through: ENISA https://resilience.enisa.europa.eu/cloud-security-and-resilience/publications/cloud-computing-benefits-risks-and-recommendations-for-information-security [Accessed: 24 Mar 2014]. Cloudsecurityalliance.org. (2011). Top threats to cloud computing: cloud security alliance. [online] Retrieved from: https://cloudsecurityalliance.org/research/top-threats [Accessed: 24 Mar 2014]. Feng,

Cloud Computing Will Be Discussed to Show
Words: 9986 Length: 26 Document Type: Research Proposal

cloud computing will be discussed to show that the good outweighs the bad. Furthermore, it will be further discussed that the government is looking into using cloud computing because it will cut IT cost down and increase capabilities despite the fact people are concerned with security issues that this may bring to the public. In completing a dissertation, it is very hard to go through the challenges that it requires.

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now