Inside the Briefcase

Augmented Reality Analytics: Transforming Data Visualization

Augmented Reality Analytics: Transforming Data Visualization

Tweet Augmented reality is transforming how data is visualized...

ITBriefcase.net Membership!

ITBriefcase.net Membership!

Tweet Register as an ITBriefcase.net member to unlock exclusive...

Women in Tech Boston

Women in Tech Boston

Hear from an industry analyst and a Fortinet customer...

IT Briefcase Interview: Simplicity, Security, and Scale – The Future for MSPs

IT Briefcase Interview: Simplicity, Security, and Scale – The Future for MSPs

In this interview, JumpCloud’s Antoine Jebara, co-founder and GM...

Tips And Tricks On Getting The Most Out of VPN Services

Tips And Tricks On Getting The Most Out of VPN Services

In the wake of restrictions in access to certain...

The 3 stages of cloud computing resistance

February 7, 2014 No Comments

SOURCE: InfoWorld

How do many enterprise IT departments approach cloud computing? Their path mirrors that of a person going through the stages of grief: denial, anger, and acceptance.

Stage 1: Ignore the problem
When retail-oriented public cloud providers began to emerge several years ago, there were those in the enterprise who needed ways to share and collaborate with colleagues on documents and files. They picked up cloud services by Box, Dropbox, Google, Apple, and others. Enterprise IT responded by “allowing” the use of these clouds, as long as it didn’t know about it — tech’s version of “don’t ask, don’t tell.”

[ From Amazon Web Services to Windows Azure, see how the elite 8 public clouds compare in the InfoWorld Test Center’s review. | Stay up on the cloud with InfoWorld’s Cloud Computing Report newsletter. ]

Stage 2: Overreact to the problem
More recently, many IT organizations have cracked down on the use of personal clouds, by enacting policies that explicitly forbid it, by blocking access altogether, or by doing both. Users had to go back to implementing “sneakernets,” emailing files, or adopting other less-than-productive approaches. In more enterprises than you’d suspect, users commonly bring in their own mobile hotspots to get around the corporate firewalls.

Those in IT often argue that these clouds are inherently insecure, so they’re not to be used. I argue that users need a reasonable alternative to thumb drives, personal email, and sneakernet that IT can support, if not for the users’ benefit, then to be more secure. These techniques are much less secure than using certain cloud services.

Stage 3: Solve the problem
The trick is to come up with a plan that includes the use of many popular services, but in secure and manageable ways. Figuring this out will take some time, some resources, and even some risk. However, if they’re done right, you’ll have happier and more productive employees.

The days of just saying no to every new technology that comes down the pike are over. The current generation of enterprise users is tech-savvy enough to use them anyway, if they make their work lives easier and/or more productive. IT will have to figure out the real issues rather than just sending out all-company emails stating that Dropbox or whatever is now forbidden.

This is not to say you’re obligated to use and support every kind of cloud technology — you do need to control use and access. However, there should be policies that explain the why and how about cloud computing rather than issue a flat “no.” Drink some tea and relax; it will be OK.

 

Leave a Reply

(required)

(required)


ADVERTISEMENT

Gartner

WomeninTech