Imagine how many new trends in the consumer market are being enjoyed by the vast majority of users, and it leaders in the enterprise are also considering what this trend means for the organization. Before it came up with an implementation and promotion program, employees had begun to use the technology in their daily work. After all, tools like Dropbox improve the efficiency of daily work by ensuring that every user has access to the latest documents, without having to pass through e-mail, through collaborative storage.
It's not hard to guess what the topic we're talking about: the consumption of it. This is not a new gadget, but with the advent of Bring-your-own-cloud (BYOC: Carrying your own cloud), employees use public or third-party cloud services to accomplish specific tasks and assignments, it can play a lot of tricks.
Bring-your-own-cloud is rapidly popular, mainly because of the benefits it brings to users: convenient, fast and inexpensive. We all know that it's a difficult and time-consuming thing to get it approved, and sometimes the tools that are being applied are not even purchased. At this time, Bring-your-own-cloud is naturally used.
Employees in the IT department are already struggling to catch up with new technologies and are now finding themselves under more pressure: Developers are building new capabilities and solutions quickly, and users are constantly bringing in their own cloud.
BYOC the risk
For it, there is such a large stack of unlicensed, unauthorized services running in their own network, there must be hidden dangers, have to be managed. You have to be very careful and try your best to find the services that flow through your IT veins and understand the impact of each component. Here are some of the larger risks of BYOC:
excessive consumption of resources : Suppose you share a 1GB file with several colleagues on Dropbox, and then suddenly everyone starts downloading the video. The company's network may not be able to withstand this extra traffic. This can be very serious to pull down system availability, crowding out the resources that other users on the network need to use in order to complete their work.
the expensive price : In the past, the funds were strictly allocated to it, and are now being drawn away and allocated to different business units, who have the autonomy to build the infrastructure of the sector. It has no say in how these infrastructures are built, but is required to be responsible for the prevention and resolution of various problems. It is not uncommon for a business unit to not consult the IT department before ordering Salesforce, and the Salesforce service itself includes training and support. It has been kept in the dark until the system crashes and the information is lost or the network bandwidth is diverted to cause downtime. According to amplifying the Signal in the Notice of IT monitoring statistics, the cost of downtime can reach $100,000 per hour.
information pitfalls are increasing : Employees place the company's information in places that are not monitored or managed, just as leaving unlocked notebooks on their desks, creating an opportunity for the bad guys. The company has absolutely no control over the BYOC service, or just a little, because these services are owned by employees, or at least controlled by them, and hosted by a third party provider. For example, employees use their personal box.net (file sharing and collaboration) accounts at work. Never underestimate the strength of hackers, especially when employees work remotely and connect to insecure networks.
complexity : Even if cloud computing allows an organization to move computing out of its internal data centers, the responsibility for delivering quality services to customers has not changed. It teams are already struggling to cope with complex data centers, thinking about the myriad of it tools, poor capacity planning, and so on, and now they have to do everything they can to monitor and manage services that run outside of the controlled range. In addition, if there is no scalable network, each business unit will eventually be caught in the fight to rob the limited capacity.
Given these risks, why don't these organizations simply wipe out the BYOC altogether? After all, this is a disruptive technology that leads to new patterns in the IT field. Why? Because you can't do it! The penetration of end-user-driven Apple devices has clearly shown this, the pitch has changed and it-driven days are gone. Consumers just like the simplicity and ease of use of cloud products. Even if the employee has not brought Byoc into the enterprise now, it is only a matter of time sooner or later. Therefore, instead of resisting, it is better to look for hugs and benefits. Don't be seen as a stumbling block on the road to success and begin to lose influence.