Special report: Data center & cloud

Special Coverage

Data center & Cloud

Special report: Data center & cloud

Summary: We examine which markets in Asia are emerging as the next wave of datacenter hotspots, and identify key design factors that go into building efficient, sustainable data centers.

SHARE:
TOPICS: Data Centers, Cloud
0

Policies, not policing, to address shadow IT influx

Employees using consumer cloud services to aid them in their work have their benefits, so companies should not clamp down on these practices. But to balance other concerns such as security and compliance, they should have holistic, granular policies in place to guide the use of such services, say industry watchers.

Song Chuang, research director at Gartner, said workers have moved to an era when the tools for their jobs are not necessarily provided by the employer anymore but by online service providers offering anything from Web-based e-mail systems to storage.

"First we had people wanting to use their own computers, then mobile devices at work. Now, we're at a point where people also want to bring or use their own apps," Chuang said, adding that use of these apps tends to provide benefits in terms of staff productivity.

Steven Wallage, managing director at Broadgroup Consulting, agreed that consumer-grade online services can be a boon to employee productivity although it's been said that workers sometimes use these apps for personal, rather than business, reasons.

That said, shadow IT, or technology used by employees that were not pre-approved by the IT department, bring varying levels of security and performance issues and makes it a real challenge for companies to manage IT and ensure compliance of their backend systems and data, Wallage noted.

Even if there were some unexpected savings from the lowered costs of internal datacenter maintenance or storage hardware due to the increased use of online storage services, the managing director said such pros would be outweighed by the security and management concerns.

IT chiefs ZDNet Asia spoke to concurred with both analysts. Foong Sew Bun, CTO and distinguished engineer at IBM Asean, said such consumer-grade services have their usefulness but pose challenges in security as well as integration with the enterprise's overall IT environment.

Tan Hoon Chiang, CIO of the National Institute of Education in Singapore, pointed out that the concept of cloud computing does "positively modify" the technological landscape for improvement and innovation. But when consumer cloud services are used for work, IT units have to assess whether data security and application performance are at risk while ensuring all systems supporting the company's core business functions run normally, he added.

To this, Gartner analyst Chuang said: "As it was with bring-your-own-device (BYOD), [consumer cloud] is both a boon and bane. Enterprises want to gain the productivity as well as manage the risk and support overload."

Craft out clearly defined policies
Nick Kirkland, CEO of CIO Connect, said when employees turn to consumer IT services of their choosing such as online storage service Dropbox, it is a "symptom" that the organization's IT department had failed to meet the needs of the business.

As such, CIOs need to ensure they are not controlling or restricting access for the wrong reasons based on past practices at the expense of authorizing new technologies to advance the business needs, Kirkland urged. After all, consumer IT is a "tide that cannot be stopped" and IT chiefs can either go with the flow or be pushed out of the way, he added.

So, the sensible approach for decision-makers would be to help the company find a way to allow employees to continue using consumer-grade IT services where it benefits the business, he suggested.

At the same time, they would need to develop a strategy to deal with governance concerns, Kirkland said. Aspects to consider include helping the business cope and educate users in best practice procedures when using unauthorized services, and get them to understand the value and need for secure management of corporate data, he added.

Foong said consumer cloud adoption should no longer be viewed as a separate, individual initiative but a continuum of delivery options available to businesses. With or without the IT department's blessings, end-users are purchasing compute capacity at their convenience. So to fully benefit from this trend, CIOs have to balance the mix of on-premise, cloud, and other deployment options in the company to meet their needs, the IBMer noted.

Essentially, the aim is to encourage and support collaboration and innovation across organizational boundaries without jeopardizing security, integrity, resiliency, and interoperability, he explained.

"Without a holistic approach and proper policy, it's all too likely that multiple groups in an organization will make independent decisions to deploy services in clouds that are disconnected or cannot interact seamlessly with traditional IT environments," Foong said.

Gartner's Chuang advised companies to develop policies that have more granular clarification as to which consumer-grade services are permitted, what instances can they be used, and what security steps should be practiced when using these products.

For a start, companies can identify the services that are heavily used by staff currently and determine the severity of the impact should these services lead to security breaches. From there, IT chiefs can then better assess the risk and develop management tools to optimize the use of these cloud-based products, the analyst added.

Topics: Data Centers, Cloud

Ellyne Phneah

About Ellyne Phneah

Elly grew up on the adrenaline of crime fiction and it spurred her interest in cybercrime, privacy and the terror on the dark side of IT. At ZDNet Asia, she has made it her mission to warn readers of upcoming security threats, while also covering other tech issues.

Kevin Kwang

About Kevin Kwang

A Singapore-based freelance IT writer, Kevin made the move from custom publishing focusing on travel and lifestyle to the ever-changing, jargon-filled world of IT and biz tech reporting, and considered this somewhat a leap of faith. Since then, he has covered a myriad of beats including security, mobile communications, and cloud computing.

Liau Yun Qing

About Liau Yun Qing

The only journalist in the team without a Western name, Yun Qing hails from the mountainy Malaysian state, Sabah. She currently covers the hardware and networking beats, as well as everything else that falls into her lap, at ZDNet Asia. Her RSS feed includes tech news sites and most of the Cheezburger network. She is also a cheapskate masquerading as a group-buying addict.

Jamie Yap

About Jamie Yap

Jamie writes about technology, business and the most obvious intersection of the two that is software. Other variegated topics include--in one form or other--cloud, Web 2.0, apps, data, analytics, mobile, services, and the three Es: enterprises, executives and entrepreneurs. In a previous life, she was a writer covering a different but equally serious business called show business.

About

Loves caption contests, leisurely strolls along supermarket aisles and watching How It's Made. Ryan has covered finance, politics, tech and sports for TV, radio and print. He is also co-author of best seller "Profit from the Panic". Ryan is an editor at ZDNet's Asia/Singapore office.

Kick off your day with ZDNet's daily email newsletter. It's the freshest tech news and opinion, served hot. Get it.

Talkback

0 comments
Log in or register to start the discussion