About Ed Cone

Edward Cone is a managing editor and senior analyst with the Thought Leadership group at Oxford Economics.

In addition to our global survey of IT and business executives, we interviewed several leaders across different industries for the Unlocking the Cloud project.

Among those who spoke with us about what cloud does in the real world were the following executives:

John Rote , Vice President of Product and Experience at Bonobos

  • Key quote: “What’s attractive about cloud services is that they can be switched on, scaled up, scaled down, and reconfigured quickly, and with few IT resources. It’s possible to go from State A to State B without having to navigate an intermediate state.”

Lincoln Wallen , Chief Technology Officer at DreamWorks Animation SKG

  • Key quote: “A shared-service, distributed-cloud model gives us the flexibility to know who is doing what at any given moment and fully understand what infrastructure is and can be applied to any given problem at any given time.”

John Considine , Chief Technology Officer for Verizon Terremark

  • Key quote: “As more and more people use mobile devices and access data from remote offices and the field, there is a strong argument that data shouldn’t reside in the data center. It should be stored in the cloud, which, by definition, is distributed. This makes data much more accessible and simplifies IT requirements.”

Feargal O’Sullivan , SVP and Head of Sales, Americas, at NYSE Technologies

  • Key quote: “Unlike a generic cloud-based environment, where every node or VM in the cloud needs to be able to talk to any computer, anywhere in the world over the Internet, this cloud requires a much higher level of security and therefore cannot be accessed directly over the Internet.”

Roger MacFarlaine , Vice President, Technology & Systems at Mövenpick Hotels and Resorts

  • Key quote: “The question isn’t whether to be in the cloud—this is inevitable. It’s how to build the best security possible into a cloud environment. It’s important to start with the mentality that you will find a way to build in protections.”

More from these executives in our on cloud adoption, mobility, security, and integration.

Mobile security is a big issue in the cloud. From our report on cloud security, .

Security issues are increasingly shifting to mobile environments. In fact, the use of mobile devices generates a variety of concerns, particularly as organizations adopt BYOD, and users merge personal and company data on the same devices. There are liability questions (who is accountable for private and corporate data?), and the possibility that privately installed software (apps) could violate corporate security policies. A lost or stolen smartphone or tablet can result in significant damage to corporate data security—and damage can spread rapidly through cloud environments and virtualization tools that replicate data and create virtual machines. Although the gains related to employees using personal devices for work are substantial, these smartphones and tablets must be managed to minimize the occurrence of rogue apps and ensure that data is not misused.

We have talked here about the fact that security is the top challenge companies face with cloud computing, and this chart brings that fact home in a powerful way. The image is from our paper on cloud security, .

“While there is a tremendous opportunity for CIOs and other top executives to be champions and brokers of cloud computing, there are also tremendous compliance and security risks that line-of-business executives don’t want to handle—and many aren’t equipped to deal with.”

–John Considine, Chief Technology Officer at Verizon Terremark, in our paper on cloud security, .

From our new paper on security, Protecting the Cloud (free download ):

At NYSE Technologies, the commercial technology division of the NYSE Euronext stock exchange company, an industry-specific Secure Financial Transaction Infrastructure (SFTI) wide-area network provides for a high level of protection. It establishes strict controls for the approximately 2,000 firms that connect to the firm’s infrastructure. “Unlike a generic cloud-based environment, where every node or VM in the cloud needs to be able to talk to any computer, anywhere in the world over the Internet, this cloud requires a much higher level of security and therefore cannot be accessed directly over the Internet,” says Feargal O’Sullivan, SVP and Head of Sales for the Americas.

“The increasing use of mobile technology and clouds is creating a data dispersion that leads to significant security and business integrity concerns.”

–Lincoln Wallen, Chief Technology Officer at DreamWorks Animation

From our new paper on security, Protecting the Cloud (free download ).

From our latest paper, :

The task of securing the cloud is becoming more complex. The same initiatives that ratchet up business rewards also amplify dangers; strategic use of social media, Bring Your Own Device (BYOD) policies, and the rise of networks that intertwine with business partners, third-party sites, and customers all pose data-management challenges. This fast-changing risk portfolio requires companies to think about cloud security in a fundamentally different way from conventional IT security, and adopt an information-centric approach that extends beyond traditional “defense in depth,” which relies solely on multiple layers of security controls and protections.