Story image

How to avoid costly cloud migration stalls

27 Oct 2016

Organisations looking to undergo digital transformation using cloud technologies need to ensure their cloud migrations strategies are well planned and executed.

According to Fronde, new research shows 90% of cloud migration programs stall for extended periods, usually at the 20% completion mark.

Only 70% of these go on to recover, according to research by Amazon Web Services (AWS).

“Many of today’s buzzwords, such as digital transformation, digital disruption, and shadow IT, reflect the fact that organisations are looking to gain agility and speed by modernising the customer experience, operating model, products and services capability, strategic capability, and/or employee experience,” explains James Valentine, chief technology officer, Fronde.

“The cloud is the perfect delivery mechanism to achieve all this but only if your cloud migration program is well planned and executed,” he says.

Fronde has identified five key steps for successful migration to the cloud:

1. Cloud-first policy

When organisations have legacy on-premise investments to maintain, their budgets can get tied up on capital expenditure and software licence lock-in. This prevents organisations from changing direction quickly. Businesses should therefore implement a cloud-first procurement policy for future investments.

2. Cloud migration strategy

While a ‘lift-and-shift’ approach may be appropriate in some cases, it may not be the right choice for all application workloads. Organisations can choose a number of other ways to migrate to the cloud. In fact, evidence is emerging that ‘lift-and-shift’ may even be a key contributing factor to migration stalls. Before committing time and resources to implementation, organisations should do a thorough needs assessment and build a practical cloud migration strategy.

3. Run a business change project, not a technology project

Technology-led projects are less likely to succeed. The role of applications is to automate business processes, so any changes in applications will affect stakeholders. The business will be less inclined to support changes if the benefits are unclear. It is therefore critical to engage business stakeholders early on to help understand the real goals of the migration project, and to help with planning, communications, and implementation.

4. Agile implementation

If the organisation’s future state is unclear, an agile approach may work best, because the small, iterative changes let the project team course-correct as they learn more. Often, legacy infrastructure has grown organically, so understanding how to unpick it continues well into the implementation.

5. Establish the new operating model

Often overlooked in cloud migration projects is the need to put the necessary support and management capability in place, post-migration. Cloud technology lends itself to DevOps practices and competencies, so organisations can build these along the way or use specialist providers. This is critical to ensure the IT team can provide end-to-end support to the business.

 “These five steps can help businesses avoid a costly cloud migration stall,” says Valentine.

“Organisations should also consider working with an experienced partner to streamline their cloud migration project and ensure it delivers on business objectives,” he says.

Check Point announces integration with Microsoft Azure
The integration of Check Point’s advanced policy enforcement capabilities with Microsoft AIP’s file classification and protection features enables enterprises to keep their business data and IP secure, irrespective of how it is shared. 
Why AI will be procurement’s greatest ally
"AI can help identify emerging suppliers, technologies and products in specific categories."
Are AI assistants teaching girls to be servants?
Have you ever interacted with a virtual assistant that has a female-based voice or look, and wondered whether there are implicitly harmful gender biases built into its code?
Google 'will do better' after G Suite passwords exposed since 2005
Fourteen years is a long time for sensitive information like usernames and passwords to be sitting ducks, unencrypted and at risk of theft and corruption.
Hackbusters! Reviewing 90 days of cybersecurity incident response cases
While there are occasionally very advanced new threats, these are massively outnumbered by common-or-garden email fraud, ransomware attacks and well-worn old exploits.
Data#3 to exclusively provide MS licences to WA Government
The technology services provider has won two contracts with the Western Australia Government, becoming its sole Microsoft licence provider.
Why cash is no longer king in Australia
Australia is leading the way in APAC for granting credit on B2B transactions.
Informatics deepens integration with Google Cloud
The data management company has connected its solutions with Google Cloud’s big data analytics solutions.