- Enterprise IT As-A-Service™
- Strategic Sourcing
- Business Transformation
- Service Optimization
- Service Provider Consulting
As discussed here before, a number of different enterprise cloud adoption paths are emerging. These patterns range from “Observers,” who are taking a reactive, wait and see approach to migration to “Transformers,” who are using private and public clouds to drive wide scale IT transformation and modernization programs. Not surprisingly these transformers are the Holy Grail being pursued by many cloud service providers and enterprise IT vendors. The opportunity to drive significant pieces of an enterprise IT environment to cloud environments (private and public) in multi-year transformation efforts creates visions of big services, hardware, and in some cases software dollars.
While many service providers are crafting go-to market strategies around these types of client opportunities, they’re running into an interesting challenge. They’re not finding a lot of Transformers out there yet. Enterprise cloud adoption, particularly for IaaS, is still largely focused on specific use cases or initial pilots. While many CIOs have long-term visions for cloud-centric future state environments, few CIOs are actually doing it today.
So why aren’t we seeing more Transformers in the market? Our experience suggests that in many cases there are a set of tactical (and often mundane) issues preventing CIOs from getting to the cloud more aggressively. While by no means comprehensive, several of the issues we frequently see are:
Why isn’t security and compliance on the list? Because in many cases, we’re finding that security and compliance is a red herring that IT is hiding behind. This is not to say that there are not workloads and use cases where security and compliance issues prevent certain public cloud models; however, these situations in reality are the minority. A variety of examples exist of enterprises leveraging the cloud today while still maintaining compliance with PCI, HIPAA and other mandates (most of which are open to auditor interpretation anyway). Best practices, tools and architectures for addressing common security issues are also becoming more prevalent, as are more mature CSP offerings and security practices for common use cases. Net, net: where there’s a will there’s a way, and in most cases if CIOs are truly interested in getting to the cloud, there are secure, compliant ways of getting there.
Overall, we believe that the wave of transformation is coming in the enterprise. Early movers exist and are achieving the promised payoff. Unfortunately the timing and shape of the wave for the mainstream organization is not as clear as those in the enterprise IT world would like, and the pace is being shaped primarily by a set of factors that are largely non-technical and beyond the IT leader’s control.