Almost 30 per cent of enterprises budgeting for Cloud: Connection Research

Price and pay-per-use features not as important as security, support and privacy

Almost 30 per cent of Australian CIOs and ICT managers responding to a study had allocated funds to deploy or at least pilot Cloud infrastructure over the next year, with 20 per cent considering it for their next budget.

Connection Research’s Insights Quarterly “Cloud in Australia” study – completed in conjunction with Fujitsu and Microsoft – gauged attitudes of 179 Australian CIOs and IT managers towards Cloud computing. The respondents came from organisations with between 100 and 5000 staff.

Almost 20 per cent of these respondents had allocated funds to develop private Cloud infrastructure with 18 per cent contemplating it for the next period. A further 36.1 per cent had allocated a budget for desktop virtualisation with 26.7 per cent considering it for the next 12 months.

Price and “pay-per-use” ranked low on the selection criteria list when CIOs were choosing a Cloud provider, despite cost savings being listed as one of the main drivers for CIOs to move to Cloud computing.

Other factors such as data security, support from the Cloud provider, privacy and the reputation of the supplier also ranked high on the list of importance. Graeme Philipson, report author and research director at Connection Research, said this was to be expected.

“What is more significant is what they do not rate so importantly,” he said in the report.

"Pay-per-use is at the bottom of the list, for example. The ability of Cloud to act as an “information utility” turned off and on at will, with metered payments for that use, is comparatively unimportant when it comes to selecting a platform, most likely because this is now seen as a “standard” Cloud feature.”

Key drivers and Cloud applications

A key driver for moving to the Cloud was the ability to lower capital expenditure on IT with 46.81 per cent rating this as either the biggest advantage or of high importance. Lowering operational costs of IT, scalability and flexibility and being able to access services over the Internet also rated highly.

By application, email and messaging was the most common Cloud platform with 5.8 per cent of respondents totally in the Cloud and 9.7 per cent had an implementation on the way. A further 22.6 per cent were some way towards moving email and messaging to the Cloud.

Cloud computing was least likely to be used for business intelligence platforms, with less than 1 per cent of respondents putting these applications totally in the Cloud.

Finally, more than half (55 per cent) believed Cloud computing was overhyped but the hype was justified while 17.4 per cent said the hype was not justified.

Join the CSO newsletter!

Error: Please check your email address.
Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Byron Connolly

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts