Enterprise cloud use on agenda for new Open Group committee

Will look to develop a common understanding of safe and effective cloud deployments

The Open Group is forming a new cloud computing committee that brings vendors and end-user organizations together to develop a common understanding about how cloud services should be deployed safely and effectively.

The consortium's Cloud Work Group includes vendors such as IBM and Sun, end-user organizations like Eli Lilly, financial services companies, and U.S. and U.K. government officials.

Several new committees and organizations promoting cloud standards and frameworks have popped up this year.

But the Open Group says it aims to contribute something unique by focusing on enterprise requirements for cloud computing, rather than the nitty-gritty technology details.

"The last thing this industry needs is more competing and contradictory information on emerging technologies like cloud computing," says Dave Lounsbury, the Open Group's vice president of collaboration services.

The group will meet weekly with a first goal of publishing a business scenario for enterprise cloud computing, which "will help companies identify and understand business needs relative to cloud computing and thereby derive the requirements that the architecture development must address," according to the Open Group.

The idea is to help businesses make decisions about how to procure and use cloud computing services.

The Open Group says it has been discussing end-user requirements and potential vendor lock-in problems related to the cloud with its members for about a year. Enterprise IT shops want to know how they can use cloud services to gain new flexibility and elasticity in computing resources, and also how to address security concerns, the group says.

In particular, identity management is important to businesses, both in terms of preventing unauthorized access to company resources and managing multiple identity mechanisms in a way that is not burdensome to end users, Lounsbury says.

"You need to know what kinds of identity management tools your cloud provider is going to require, and figure out how to knit that into your enterprise," he says.

But customers are seeing obvious benefits.

"People see the value of agility and elasticity," Lounsbury says. "Everyone wants to control capital expenditure but you have to do it in a way that maintains the security and integrity of the business."

The Open Group is a vendor-neutral consortium which, not surprisingly, promotes open standards and interoperability for enterprise technology.

With the Cloud Work Group, the organization is hoping vendors and users can collaborate to form a common set of beliefs about how cloud computing should be deployed, but isn't looking to dictate a strict set of standards that every organization must follow.

As of now, there are many different types of cloud models that enterprises are trying to make sense of, Lounsbury says.

"We don't control what vendors produce," he says. "Right now, we think it's a good thing that there is this diversity in what cloud providers are doing."

Follow Jon Brodkin on Twitter

Join the CSO newsletter!

Error: Please check your email address.

Tags The Open Groupcloud computing

More about IBM AustraliaIBM AustraliaOpen Group

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Jon Brodkin

Latest Videos

  • 150x50

    CSO Webinar: Will your data protection strategy be enough when disaster strikes?

    Speakers: - Paul O’Connor, Engagement leader - Performance Audit Group, Victorian Auditor-General’s Office (VAGO) - Nigel Phair, Managing Director, Centre for Internet Safety - Joshua Stenhouse, Technical Evangelist, Zerto - Anthony Caruana, CSO MC & Moderator

    Play Video

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

More videos

Blog Posts

Market Place