blog

0
112
Tuesday, March 3, 2015

Cloud Acquisition Strategy, Customized to the Right Cloud Model

by
Melvin Greer
Managing Director, Greer Institute 

Cloud Acquisition Strategy, Customized to the Right Cloud ModelThis year has brought big news, significant changes and increased awareness of the adoption of cloud computing in Government. In fact Cloud computing may be the biggest and most overhyped term in Government information technology today.   It is also the most discussed topic in agency strategy, cyber security forums and mission / program reviews.  While lots of conversation has been devoted to technology and the benefits that government customers can derive from Cloud, in the end the biggest challenge may be the acquisition of cloud services. Cloud computing presents a different set of acquisition challenges to the federal government and this shift requires a rethinking the agency acquisition process. Smart purchasing decisions require an understanding of security requirements, service models and service level agreements.
Clearly adherence to the Federal Risk Authorization and Risk Management  (FedRAMP) cloud security requirements are central to acquisition of cloud services. This includes issues like data location and jurisdiction, privacy, and eDiscovery, as they are very important in a service-based environment.
An enhanced view of cloud acquisition involves the mapping of the right acquisition strategy with the right cloud deployment model. The dominant cloud deployment model in Government is the hybrid cloud model. Given that agencies will not likely limit themselves to one cloud deployment but will rather incorporate different and overlapping cloud services the acquisition strategy for the hybrid model will need to provide the flexibility necessary to map to the varying deployment models.
By focusing on a customized acquisition strategy in contracting for cloud services, agencies can reduce the risk of vendor lock-in, improve portability, and encourage competition.  With these goals in mind, agencies will want to establish explicit Service Level Agreement (SLA) information for security, continuity of operations, and service quality and the impact on the cloud service provider of not meeting SLA metrics.
By developing a cloud acquisition strategy that comprehends security requirements, service models and service level agreement metrics, agencies can acquire the benefits of cloud adoption required to meet their mission needs.  Learn more about the acquisition of Cloud in the ViON eBook, “The Business of Cloud”
https://www.vion.com/
 

JOIN VION
BUSINESS OF CLOUD
on
https://www.linkedin.com/groups/Business-Cloud-8248605

( This content is being syndicated through multiple channels. The opinions expressed are solely those of the author and do not represent the views of GovCloud Network, GovCloud Network Partners or any other corporation or organization.)

Bookmark and Share

Cloud Musings
↑ Grab this Headline Animator

( Thank you. If you enjoyed this article, get free updates by email or RSS – © Copyright Kevin L. Jackson 2015)

Follow me at https://Twitter.com/Kevin_Jackson

LEAVE A COMMENT

Name*
E-mail*
Phone number*
Your Message

Latest posts

0
206

MWC19: Where Telecommunications and Cloud Meet

As a cloud solution architect, my passion is learning the details about how cloud computing uniquely supports specifi...

0
170

Tulane University SoPA Selects “Architechting Cloud Computing Solutions”

Last week, Packt Publishing announced that “Architecting Cloud Computing Solutions” by Kevin L. Jackson a...

0
378

5G Wireless Technology Connecting Healthcare

Healthcare is in the middle of massive change. Called digital transformation by many, this term describes the industr...

0
349

Maria Lensing: The Network Platform for Healthcare’s Future

As a girl, Maria and her family traveled to Memphis, Tennessee to get cancer treatment for her sick brother. The mira...

0
1401

How “Big Iron” Does “Big Regulation”

According to Verizon, there were over there were over 53,000 security incidents in 2017, with over 2,200 of those ide...

0
1806

Mainframe Synergies for Digital Transformation

In July  of 2018, Broadcom announced its intentions to acquire CA Technologies. In the press release, Hock Tan, Presi...

0
456

2018 AT&T Business Summit: Security “in” and “of” the Cloud

While public cloud is undoubtedly an outsized piece of the conversation, news headlines of the latest data breach can...

0
198

My Brush with Royalty: Queen Latifah

Queen Latifah! Hip Hop Icon. Movie Star. Television Star. Fashion Model. Songwriter. Producer. Entrepreneurial Genius...

0
348

What’s New in Puppet 5?

Puppet 5 is released and comes with several exciting enhancements and features that promise to make configuration man...

0
227

5 Reasons Why Ansible is the Best CM Tool Out There?

Amidst volatile markets, dynamic technology shifts, and ever-increasing customer demands, it is imperative for IT org...