Interlink Cloud Blog
Guest Blogger

Top 5 Reasons You Should NOT Use Cloud Storage

Top 5 Reasons You Should NOT Use Cloud Storage

The value and benefits of cloud storage are so clear and compelling that I have found it difficult to understand why a business would choose not to embrace the cloud as a means of solving file sprawl. In the past, cloud fear was a major obstacle, but this is no longer the case. So I tried to put myself in the shoes of a change-averse enterprise to better understand their thinking. The result is a list of the top five reasons you should not move files to the cloud.

1. You love running big hardware datacenters.

We are all still kids at heart and a massive datacenter is essentially a giant playroom filled with very expensive and complex toys.

These toys, otherwise known as servers, do not take care of themselves. You get to oversee the maintenance of both the datacenter as a whole and the actual hardware. Heating, cooling, electricity, disaster planning – that’s all yours.  As time goes by and your employees and applications generate more and larger files, this hardware will start to run out of capacity.

But don’t worry about consolidating your data center. You can always buy a whole new set of big, shiny, expensive servers when you need more space. This makes your storage environment more complex. 

And don’t forget the budget planning that goes along with it – what’s not to love about complex financial spreadsheets?

2. Migrations are a joy!

Speaking of fun, who enjoys a good migration? 

Nothing is more thrilling than sitting at your workstation and managing the movement of files from one storage volume to another.  No matter which solution you have in place, migrations can be very complex affairs.  And IT professionals love nothing more than performing challenging, pull-out-your-hair tasks on nights and weekends when all their friends and families are doing normal activities (e.g. having a life). 

Don’t worry, you will not be going through this misery alone. You get to interact with your peers when they call you about the inevitable permissions problems that keep them from their data. Then you can be a hero and solve the problem they blamed you for in the first place.

3.  You have no need for backups.

Your users may have lost access to their files before.

Maybe they deleted a document they needed, or suddenly wanted an old project back. But you know that files are files.  Your users can always create new ones. In fact, you and your colleagues have been wondering whether it’s necessary to protect company files at all.  Sure, you may have heard about how the cloud can eliminate the need for backup, generating significant cost savings and improving protection, but why not just leave everything to chance instead?

Writing to tape is the Russian roulette of the IT world.  So go ahead, scrap protection, and inject a little do-or-die drama into your work place. 

state of cloud storage

 

4.  Your users work only at their desk.

Employees are constantly on the go. They need access to their files from any device or location. The right enterprise cloud storage solution makes this possible. 

But when you don’t use cloud storage, you’re operating as though your employees work only at their desks.  In fact, they never:

  • Go home at night
  • Visit clients
  • Work in conference rooms, common areas or off-site
  • Travel for business

You might as well shut your servers down at night while you’re at it.  

5. None of your employees collaborate on work. 

This especially gets complicated with users in different branches or those working remotely. When collaborating, users will need to access the same files that others are also working on. But in a company without cloud sharing, these collaborations are intensely more difficult, stressful and time-consuming.

On those rare occasions when a project requires the input of an employee who works in a different region, the standard operating procedure is to charter a jet, fly that person into the office for a few hours, then whisk them back again. If something comes up the next day, and that employee’s input is needed again, there are always more jets.

Personally, I still think cloud storage makes more sense, and Cloud NAS in particular, but this has been a helpful exercise for me. I am starting to understand why companies choose to avoid moving files to the cloud. That said, if you are the sort who would rather avoid migrations, reduce your dependence on expensive hardware, enhance protection and extend file access, you might want to take 90 seconds to watch this quick video on our complete storage solution leveraging the cloud.

 


Nasuni is a partner of Interlink. If you need help with a cloud storage solution, Interlink can help - contact us today.

 

Nasuni 2015 State of Cloud Storage Report Thumb no DS Web

Download this white paper to receive your copy of the The State of Cloud Storage in 2015.

 

Matt Scherocman

The Struggle is Real: How to Deal with the Growth and Sophistication of Cybercrime with Microsoft Advanced Threat Analytics

The Struggle is Real: How to Deal with the Growth and Sophistication of Cybercrime with Microsoft Advanced Threat Analytics

As business changes and technology evolves, the majority of organizations depend on IT systems to store their data and run critical workflows. Unfortunately, these systems can be a prime target for cyber-attacks as sophisticated hackers put the enterprise in a vulnerable position. Just take note of these especially stunning stats:

  • 76% of attacks stem from compromised user credentials
  • The average cost of a data breach to a company is $3.5 million and total cost of cybercrime on a global scale is as high as $500 billion
  • Because of dangerous IT security blind spots (shown in the image below), it could take over 200 days to detect an attack

    IT blind spots Microsoft Advanced Threat Analytics

Stats courtesy of Microsoft Advanced Threat Analytics Datasheet.

The reality is, businesses need to pay attention and adapt to this changing nature of data security threats.

Now available in the Enterprise Mobility Suite, Microsoft Advanced Threat Analytics (ATA) helps to protect your company from attacks by leveraging machine learning. It uses behavioral analytics to uncover suspicious behavior, internally or from external attacks. It also detects known security issues and risks , the goal is to stay  one (or two, or three) steps ahead of the attackers.

Microsoft Advanced Threat Analytics

When you think of security software, your mind might immediately turn to configuring system rules and alerting. All of which take time and commitment from your team. With ATA, you don’t need to create rules, baselines, or thresholds. It’s streamlined from setup and works immediately. Once a threat is detected, it’s also easy to view a timeline of when the attack hit. It can help pinpoint where the breach took place. All of this insight can better prepare you for future attacks.

The thought of being hacked and not even knowing it is scary enough, but ATA also helps identify internal threats like why a user would be accessing files in accounting if they’re in the marketing department? Combined with online security reports, ATA can show anomalies for logins.  It will help detect when user credentials have been compromised by reporting geographically distant logins that occur at the time time – like a single user being logged in from Ohio and from Romania at the same time.  

The high-level benefits of using ATA at your business are obvious. Peace of mind goes a long way, and you also want it to help you adapt as cyber-attacks grow in frequency and sophistication. The features of ATA are even more appealing when you see exactly how it works for your business. Here are a few of our favorites:

  • Timeline: We’ve already mentioned that timeline, but it’s worth noting again. In addition to listing the activities as they occur, ATA provides recommendations on how to handle that alert.
  • Organizational Security Graph: This maps out entity interactions which represents the context and activities of the users, devices, and resources. This will be a big driver in managing security for each of your users.
  • Email Alerts: There’s no need for one person to be continuously monitoring for cyber-attacks. With ATA, you can have emails sent to users or groups when suspicious activity is detected.
  • Leveraging the Cloud:  Microsoft cloud based correlation engine helps more quickly identify new attacks and reduce the amount of false positives. 

The cyber-attack threat is real and ATA can help you adapt to the changing cyber-attack world we live in.

Contact Interlink if you any questions.

 

Matt Scherocman

Three Ways Microsoft Enterprise Mobility Suite (EMS) Has Changed Everything

Three Ways Microsoft Enterprise Mobility Suite (EMS) Has Changed Everything

Looking at how technology has evolved, the cloud has certainly changed everything in terms of how we do business and what’s expected of us as a company. The cloud has created a ton of benefits and possibilitieslike the promise for users to be able to work anywhere on any device. That flexibility also created several challenges. Those challenges include security, device management, and data protection.

 
[...]
Sarah Bunt

[On-Demand Webinar] Getting Value from Office 365: You’ve Deployed Exchange – Now What?

[On-Demand Webinar] Getting Value from Office 365: You’ve Deployed Exchange – Now What?

view webinar slides o365 blue

Do you know what you already own ?

Many organizations deploy Office 365, but only use Exchange. There are so many other applications within Office 365 like Groups, Sway, Video, and Delve that have been designed to help your users be productive.

In this on-demand webinar Microsoft and Interlink Cloud Advisors - Microsoft Cloud Consumption Partner of the Year - showcases the features and resources Office 365 (E3 plan) includes beyond Exchange.

Covers some of the most common workload scenarios and questions, including:

  • Efficiently sharing ideas and content
  • Collaborating together – co-authoring
  • Accommodating different working styles
  • Protecting intellectual property
  • Better coordinating group communications and efforts
  • Live demos, including: Sway, Delve, Planner, Office Groups, OneDrive, and Admin Portal

Whether you have already started moving workloads to the cloud or are just getting started, view the webinar to hear the best practices and insights into promotions that can further accelerate your cloud projects. 


Presenter:

Matt Scherocman

Matt Scherocman
President, Interlink Cloud Advisors
Microsoft VTSP and #1 in the world at helping clients with Microsoft funding 

 

Matt Scherocman

How To Protect Your Users From Ransomware and Vicious New Maladies Hidden In Your Incoming Email

How To Protect Your Users From Ransomware and Vicious New Maladies Hidden In Your Incoming Email

Protecting Your Email with Exchange Online Advanced Threat Protection 

With the constant threat of malware, companies have to constantly find ways to stay ahead.  How do you protect your data from these threats when they are constantly evolving and becoming more aggressive?  Microsoft has a solution in Exchange Online called Advanced Threat Protection (ATP).  It is another layer of must-have security that Microsoft offers to meet all your business needs. 

[...]

Welcome to the Interlink Cloud Blog

All content provided on this blog is for informational purposes only. The owner of this blog makes no representations or warranties regarding the information from our partners or other external sources.

Blog Categories

Interlink Cloud
Interlink Cloud
6 post(s)
Tips and Tricks
Tips and Tricks
2 post(s)
Outlook
Outlook
2 post(s)
Reporting
Reporting
1 post(s)
Cloud Storage
Cloud Storage
2 post(s)
Webinars
Webinars
16 post(s)
OneDrive
OneDrive
5 post(s)
Yammer
Yammer
3 post(s)
Azure
Azure
23 post(s)
SharePoint
SharePoint
10 post(s)
Microsoft
Microsoft
7 post(s)
SQL 2016
SQL 2016
2 post(s)
Lync
Lync
8 post(s)
Office 365
Office 365
61 post(s)