fbpx Skip to content

Public Cloud IaaS : A Price/Performance vs. Security Analysis

Transformation Infrastructure

By pwsadmin | September 26, 2020

Hybrid IT enables a composable infrastructure which describes a framework whose physical compute, storage, and network fabric resources are treated as services. Resources are logically pooled so that administrators need to physically configure hardware to support a specific software application, which describes the function of a composable architecture. This type of transformative infrastructure is foundational…

Essential Characteristics of Cloud Computing as Digital Transformation

By pwsadmin | September 25, 2020

A survey of 2,000 executives conducted by Cognizant in 2016 identified the top five ways digital transformations generate value:      Accelerating speed to market      Strengthening competitive positioning      Boosting revenue growth      Raising employee productivity      Expanding the ability to acquire, engage, and retain customers   Digital transformation is also a cultural change. Cloud Computing as Digital Transformation Since cloud…

Embrace Transformation

By pwsadmin | September 22, 2020

From a business perspective, differentiating business processes and quality customer service are central to overall success. Business leaders must therefore clearly identify and measure how information technology contributes to the value of every key business process. They must also know how to most cost effectively use IT when the task is merely the management of…

Computer Vision Advances Zero-Defect Manufacturing

By pwsadmin | July 25, 2020

by Kevin L. Jackson Electronics manufacturers operate in a challenging environment. It’s hard enough to keep up with the ever-accelerating rate of change in the industry. Now customers want increasingly specialized product variations in less time and of higher quality. Meeting this demand for increased product variation can seriously impact the bottom line. Such variability increases…

Real-Time Analytics Power the Roadway of the Future

By pwsadmin | July 25, 2020

By Kevin L. Jackson The complexities of citywide traffic are pushing the limits of existing transportation management systems. Outdated infrastructure is based on proprietary, single-purpose subsystems, making it costly to acquire, operate, and maintain. And current roadways are simply not prepared for the future of autonomous vehicles. Enter the SPaT Challenge, an initiative encouraging cities and…

Thriving on the Edge: Developing CSP Edge Computing Strategy

By pwsadmin | March 6, 2020

Communications Service Providers (CSPs) are facing significant business model challenges. Referred to generally as edge computing, the possibilities introduced by the blending of 5G networks and distributed cloud computing technologies are redefining how CSPs operate, partner, and drive revenue. A new Ericsson Digital whitepaper entitled, “Edge computing and deployment strategies for communication service providers,” addresses these challenges…

SourceConnecte! Marketplace With A Mission

By pwsadmin | March 6, 2020

Earlier this year, GC GlobalNet launched a new breed of B2B e-commerce sites. Curated by Kevin L. Jackson, SourceConnecte (with an “e”) went live with three strategic goals in mind: Efficiently leverage modern social media technologies to facilitate value-based interactions between enterprise buyers and vetted suppliers; Establish a protected interactive environment capable of supporting high-value B2B e-commerce negotiations…

Potential vs. Reality: Is Edge Computing Real?

By pwsadmin | January 19, 2020

Edge computing provides compute, storage, and networking resources close to devices generating traffic. Its benefits are based on an ability to provide new services capable of meeting stringent operational requirements by minimizing both data latency and the need for bandwidth. Based on Google trend data, searches for the term has also grown substantially over the…

Enabling Digital Transformation

By pwsadmin | December 22, 2019

Digital transformation integrates technology into all areas of an organization’s business or mission. Its fundamental purpose is to create and deliver innovative and industry-changing products and services to a global customer base. This outcome requires the seamless two-way flow of data and information between internal business processes and external processes that interact with customers, business…

The ThinkShield Story Part 1: The Challenge

By G C Network | October 24, 2019

The cybersecurity challenge seems to be growing daily. Threats are becoming more sophisticated, and attacks are becoming more destructive while the corporate world’s response seems to resemble a deer in headlights. Recent examples of this dangerous state of affairs include[1]: A data breach of a US Customs and Border Protection surveillance contractor that led to…

Industry’s transition from custom made, one-of-a-kind IT infrastructures to the standardize, commodity based cloud paradigm is well on it’s way. IBM’s recent “Under Cloud Cover” study highlights the rapidly of this global transformation:

“According to our global study of more than 800 cloud decision makers and 
users, business leaders of all stripes – Finance, Sales & Marketing, Product 
Development and more – are becoming increasingly focused on the business value 
cloud provides. Over the next three years, cloud’s strategic importance to business 
users is expected to double from 34 percent to 72 percent, even surpassing their IT 
counterparts at 58 percent.”

From IBM “Under Cloud Cover”: Competitive advantages from 
cloud computing help leading organizations deliver stand-out
 financial performance . (Click to enlarge)

What seems surprising, however, is that this shift is happening even in the face of repeated cautions and warnings about the security of public clouds.  The key challenge for decision makers is how to balance the business need to quickly transition to cloud with the equally important business need of maintaining information security and privacy.

Lucky for us, two recent public cloud reports from Gartner and Cloud Spectator have gone a long way toward addressing this critical question. Gartner’s “Toolkit: Comparison Matrix for Cloud Infrastructure as a Service Providers, 2013” provides a comparative scoring of the security and compliance capabilities of the Gartner Public IaaS Magic Quadrant companies while Cloud Spectator has recently provided a price/performance  scoring for the same group of companies. I’ve used this data to produce the Price/Performance vs Security chart below.

Click to enlarge

While this marketplace snapshot is definitely not definitive, this data should certainly help us all who are charged with managing this important transition.

( The Price-Performance score is a blend of technical performance obtained from Cloud Spectator and use case performance obtained from Gartner. In the chart, the higher the value on the vertical axis, the better. Security score was obtained from Gartner. The further to the right on the horizontal axis, the better. Since CSC was not included in Cloud Spectator’s performance analysis they are also not included in the chart provided above.)

( Thank you. If you enjoyed this article, get free updates by email or RSS – © Copyright Kevin L. Jackson 2012)


Follow me at https://Twitter.com/Kevin_Jackson

G C Network


  1. Kenny Li on October 26, 2013 at 5:55 am

    Very interesting take on the two analyses, Kevin!

    Just out of curiosity, which price/performance values did you use from the Cloud Spectator report? The system performance?

    The information here is well-illustrated, and simplifies a range of concerns brought up in the cloud industry. Thanks for the post, and I look forward to seeing more information like this in the future.

  2. Kevin L. Jackson on October 29, 2013 at 10:48 pm

    Thanks. I just updated to post in order to clarify data origin. The Price-Performance score is a blend of technical performance (CloudSpec Score) obtained from Cloud Spectator and use case performance obtained from Gartner. I then normalized the values using equal weight. In the chart, the higher the value on the vertical axis, the better. Security score was obtained from Gartner. The further to the right on the horizontal axis, the better.

Leave a Comment


Purchase Crate

Shipping and discount codes are added at checkout.

Scroll To Top