By Kevin Nikkhoo | Article Rating: |
|
October 27, 2012 02:00 PM EDT | Reads: |
868 |

In the software universe we’ve all heard the saying “We are One Inch into a Mile of Functionality but we are paying for the entire mile.”
That pretty much sums up every technology initiative ever embarked upon. Whether we are talking, ERP, CRM, SIEM or a variety of other alphabet soup programs, it always looks so simple in the demo, but when rubber meets the road, there’s always some gremlin preventing or delaying full realization of the benefits or expected ROI.
Now I am not looking down my nose at any particular implementation of any particular product, but I read a Forrester statistic that stated 73% of major software implementations don’t get past phase one. Whether a result of scope creep, budget busting or flagging executive buy-in, the promise of ROI is underwhelming; not to mention the drag on IT productivity and lack of measurable results. And it’s those results we depend on to drive ROI and solve the business need.
And, of course that’s where the cloud can be a savior to an SMB or Fortune 500 global enterprise. The immediate benefit of cloud applications is the zero-day factor. One the first day of your subscription, the functionality is 100% there and ready to be applied. The endless hours upon hours of scoping, development, implementation, testing, tweaking, retesting, reinstalling, configuring, hair pulling, reconfiguring, reprioritizing, rescoping, testing again more deploying, redeploying are gone. And with it, the delta of time between capital investment and ROI realization has stretched considerably. Sometimes in excess of 3-4 years.
This is especially true when applying enterprise security solutions.
We all realize that IT security can be a cost center. We also know that return on investment on a security initiative can take time to calculate. However, if applying security-as-a-service solutions such as SIEM, Log Management, IDM, Access Management and SSO an enterprise receives maximum benefit right out of the gate and you remove all the crushing weight of capital costs.
Here’s an example. Company X must comply with a federal regulation (PCI, HIPPA, CIP, GLBA, etc.). IT and the C-Level executives realize that a solution to capture log events and store the requisite information is needed. While doing their due diligence, they discovered that having a solution that also monitors the logs for suspicious activity is also worth the investment. In the end they create a budget and decide on an appropriate course of action. Now comes the expensive part. They lay out the cash for the server, for the software package, for the additional hardware. Conservatively (for a small enterprise) we are talking $150,000. And that’s before the first line of custom code is written or a PC is plugged in. Additionally the support and maintenance clock has started ticking—another 30 grand.
It’s three months later, and you finally deployed the first small portion. You’ve invested two full-time implementers, a consultant, etc., another $25,000. And in that time there has been a software update and seven patches. Without putting too fine of a point on it, before you’ve seen one inch of functionality, you’re already in the hole well over a quarter million dollars. Now how many anomalies prevented will it take to realize any return? Besides in the three months, you’ve simply scratched the surface in terms of functionality. It will be another year before the system is fully functional.
Let’s compare that nightmare scenario with the deploying and managing from the cloud. Once the sensors are calibrated (each sensor is less than 1GB of space on a server or monitored device) and configured, your enterprise is fully covered. You are receiving a fully-formed, fully functional enterprise-class deployment. In this case there is no server purchase, no software purchase…in fact no capital expenditure of any kind. For what Company X is paying in support and maintenance (it’s OpEx commitment), the company could trade in the entire Year 1-3 initiative costs. The instant scalability of the cloud-based SIEM/Log Management gives Company X the flexibility to right size as it goes and therefore, only pay for what is needed. There is never a mile minus one inch of function going unused.
Many organizations are in the same boat as Company X. By considering security-as-a-service they could instantly reduce capital budget (trade CapEx for OpEx) and immediately begin accruing the necessary capabilities to meet the business need while enjoying the direct benefits that translate into return on investment. In this scenario, there’s no waiting three years for ROI, but more important for compliance and security, there’s no waiting to deploy important functionality.
Kevin Nikkhoo
Published October 27, 2012 Reads 868
Copyright © 2012 SYS-CON Media, Inc. — All Rights Reserved.
Syndicated stories and blog feeds, all rights reserved by the author.
More Stories By Kevin Nikkhoo
With more than 32 years of experience in information technology, and an extensive and successful entrepreneurial background, Kevin Nikkhoo is the CEO of the dynamic security-as-a-service startup Cloud Access. CloudAccess is at the forefront of the latest evolution of IT asset protection--the cloud.
Kevin holds a Bachelor of Science in Computer Engineering from McGill University, Master of Computer Engineering at California State University, Los Angeles, and an MBA from the University of Southern California with emphasis in entrepreneurial studies.
- Cloud People: A Who's Who of Cloud Computing
- Twelve New Programming Languages: Is Cloud Responsible?
- Agile Adoption – Crossing the Chasm
- TOGAF Foundation Level Certification – Another Practice Test
- TOGAF Foundation Level Certification – Practice Test
- Examining the True Cost of Big Data
- What Makes Agile Agile?
- Rackspace Lets Go of OpenStack
- Thanks to Big Data, Analytics Will Be a $51B Business by 2016: IDC
- Here Comes Rackspace & Amazon’s Latest Rival
- Cloud Expo Silicon Valley | Cloud Computing Adoption: Where Are We Really?
- Cloud Expo Silicon Valley: APIs – The Wiring Behind the Cloud
- Cloud People: A Who's Who of Cloud Computing
- Twelve New Programming Languages: Is Cloud Responsible?
- Agile Adoption – Crossing the Chasm
- TOGAF Foundation Level Certification – Another Practice Test
- TOGAF Foundation Level Certification – Practice Test
- Examining the True Cost of Big Data
- What Makes Agile Agile?
- Rapid7 Nexpose Introduces IPv6 Discovery and Scanning Capabilities, and Reduces Signal-to-Noise Ratio for Vulnerability Management, Enabling Security Professionals to Focus on Highest Priority Issues
- Rackspace Lets Go of OpenStack
- Thanks to Big Data, Analytics Will Be a $51B Business by 2016: IDC
- Here Comes Rackspace & Amazon’s Latest Rival
- Cloud Expo Silicon Valley | Cloud Computing Adoption: Where Are We Really?
- A Cup of AJAX? Nay, Just Regular Java Please
- Java Developer's Journal Exclusive: 2006 "JDJ Editors' Choice" Awards
- JavaServer Faces (JSF) vs Struts
- The i-Technology Right Stuff
- Rich Internet Applications with Adobe Flex 2 and Java
- Java vs C++ "Shootout" Revisited
- Bean-Managed Persistence Using a Proxy List
- Reporting Made Easy with JasperReports and Hibernate
- Creating a Pet Store Application with JavaServer Faces, Spring, and Hibernate
- Why Do 'Cool Kids' Choose Ruby or PHP to Build Websites Instead of Java?
- What's New in Eclipse?
- i-Technology Predictions for 2007: Where's It All Headed?
- ');
for(i = 0; i < google_ads.length; ++i)
{
document.write('
- ');
document.write('' + google_ads[i].line1 + '
'); document.write('' + google_ads[i].visible_url + '
'); document.write(google_ads[i].line2 + ' ' + google_ads[i].line3); document.write(' ');
}
document.write('