Cloud Deployment Strategy Starter Guide

Cloud Deployment
Strategy Starter Guide
Moving from traditional, hardware-centric offerings to cloud computing solutions can
open up new opportunities. Use this guide to evaluate and expand your product and
service offerings to include elements of cloud-based computing.
Application Profiling
Evaluate your current application and service offerings to identify opportunities for cloud computing integration.
List all application(s) and services you currently offer.
(VMware*, Windows* Server, Microsoft* Office* 365, SAP*, McAfee*; storage and backup, asset management and repair,
business intelligence, web hosting, communications)
Which of these application(s) or services would benefit from new or expanded resources?
(Storage, Bandwidth, Server performance)
Which application(s) experience irregular or cyclical peaks in resource utilization?
How important is rapid deployment and/or the potential for rapid scale-up of these applications
and services?
Do these application(s) access private, proprietary, or otherwise sensitive information?
Do any of these applications have licensing restrictions? What are they?
Virtualization
Virtualization is a fundamental building block to cloud solutions.
Learn More »
What have you virtualized?
(Hardware, Operating system, Storage, Networking)
What concerns do you have with extending virtualization deployment?
What are your plans for designing High Availability (HA) and Disaster Recovery (DR) into your
service offering?
Security: User, Storage, & Audit Considerations
Evaluating how to best meet user needs for storage and security is a critical step to a
complete and compelling cloud offering.
Learn More »
Users
When deploying a customer solution, how do you capture user data?
What kind of user authentication process is in place? How do you handle user churns?
(Account provisioning)
How do you secure user IDs and access credentials?
Storage & Transfer
Where do you currently store customer data?
How is data transferred?
Do you have customers who are encrypting, or who would benefit from encryption?
How do you plan to monitor service performance?
Audit & Security
What type of security identification and prevention tools are you using?
How often do you scan for network and application vulnerabilities?
Do you use application security measures in your production environment? What are they?
(Application-level firewall, Database auditing)
What are your data breach procedures?
Operations, Service & Business Processes
Align your operations and business processes to effectively sell and support cloud solutions.
How do you manage the process of resource provisioning?
Have you developed business processes to handle cloud infrastructure operations?
What is your strategic plan for detecting and responding to services failure?
How will you track service usage and bill customers?
Will subscription periods be flexible (hourly/daily) or more fixed (monthly/annually)?
Learn More
Cloud computing is constantly evolving, learn more about how Intel is shaping this new business-focused approach to IT:
www.intel.com/cloud
Intel and the Intel logo are trademarks of Intel Corporation in the U.S. and/or other countries. Copyright © 2012 Intel Corporation. All rights reserved.
*Other names and brands may be claimed as the property of others.
0212/CMD/CAF/PDF
C Please Recycle
Learn More »
Download PDF
Similar pages