• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH
IT Infrastructure

Here’s Why Cloud Service Providers Are Perfect for SMBs

Cloud expert Brian Berger explains why Cloud service providers are the ideal partner for SMBs that may have a limited budget but cloud needs.

October 23, 2017 Brian Berger Leave a Comment

While the topic of Cloud security may have a lower budget priority to IT organizations than overall IT security, the convergence of topics is here to stay.

Since the overarching trend of outsourcing to Cloud Service Providers (CSPs) for specific applications, platform services or infrastructure has become commonplace, the intersection of Cloud security and organizational security has merged.

I would argue that the intersection of Cloud and enterprise/IT security has become a vital component of a company’s overall cybersecurity posture, and as such, requires careful monitoring.

Driving the intersection of Cloud and overall IT security are the convenience and investments (ROI) of an organization. The convenience of buying Cloud applications like email, CRM, storage and back-ups from third party providers have been significant factors in decision-making.

These services are easy to implement because they are already configured, available and scalable without the requirement of capital purchases and investment in additional human resources — call it time to market or time to solving a problem.

Most organizations are trying to solve IT requirements with a credit card. The removal of layers of approvals, new budget allocations and resource headcount approvals is a theme of the past when considering a Cloud model.

This may sound like a pro-Cloud argument, and in some ways, it is. Most organizations who need to meet a specific requirement with limited budgets or time have very few choices to consider — when taking into account that investing in CSPs is significant in both infrastructure, scalability and security, that idea of “building your own” becomes further and further removed from reality.

If we look at the SMB marketplace, the financial benefits of Cloud far outweigh any other options.

Security of IT and Cloud is a discussion that has been ongoing from industry experts. The net of this, for most, is the dividing line between multi-tenancy Clouds, hybrid Clouds and private Clouds.

For some applications, multi-tenancy may be a completely acceptable model for most organizations — take Google Apps and Office365 as examples — whereas services sold by a business as their product may require a hybrid model.

Applications built in a multi-tenancy application licensing model and core applications running on bare metal services hosted by a CSP could be a very real scenario for product delivery. There are several variations and models used by companies today that work well.

As the connection between an organization’ IT infrastructure, CSP services and third-party apps as subscription, the need for a cybersecurity plan becomes a requirement.

Typically, the changes in IT happen across departments based upon the budgets or business needs of the organization, causing a more complex set of relationships to occur.

When the influx of business applications, services and infrastructure merge in the IT department with an overarching message to ensure the business is secure, it’s time to make cyber the executive topic of discussion.

The executive team needs to become more involved with cyber, making it a business continuity planning requirement versus an IT security overhead. The ability for the IT team to move overall IT security to a cyber discussion will help projects and programs receive funding.

In addition to the approvals of budget, an overall assessment of all the complex relationships needs to occur.

Once the IT department has complete visibility of the company’s cyber posture, a comprehensive plan of action can be managed to address both vulnerabilities and processes: the first step to becoming cyber prepared.

A standards-based approach to cyber preparedness should be considered. It is said that most companies are either going to be hacked soon, just recovered from a hack, or have been hacked and are unaware.

Measuring an organization’s cyber readiness is a worthy approach to protecting the company’s core assets: revenue!


Brian Berger is the executive vice president of commercial cybersecurity for Cytellix. With more than 28 years of experience in device security, IT, data analytics and corporate leadership, Berger has led the successful development of strategic engagement agreements with multibillion-dollar Cloud service providers, securing significant contracts in data encryption, authentication, network security, Cloud, analytics and embedded hardware security.

 

This article was originally posted on TD sister site Security Sales & Integration.

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our digital newsletters!

Tagged With: Cloud, Managed Services

Related Content:

  • Cloud, SASE, Aryaka How the Cloud is Redefining Media Production and…
  • Software License Spending, SaaS, cloud apps Your Guide to Choosing the Best Cloud Security…
  • IT Budget 2025 Budgeting Tips for IT Pros/CIOs in 2025
  • A close-up of a technician’s hands typing and navigating through troubleshooting steps on a computer in a well-lit office. , natural light, soft shadows, with copy space Five Ways to Reduce Desktop Support Troubleshooting Time

Free downloadable guide you may like:

  • Practical Design Guide for Office SpacesPractical Design Guide for Office Spaces

    Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-face time with co-workers. When designing the office spaces — and meeting spaces in particular — enabling that connection between co-workers is crucial. But introducing the right collaboration technology in meeting spaces can […]

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest Downloads

Practical Design Guide for Office Spaces
Practical Design Guide for Office Spaces

Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-fa...

New Camera Can Transform Your Live Production Workflow
New Camera System Can Transform Your Live Production Workflow

Sony's HXC-FZ90 studio camera system combines flexibility and exceptional image quality with entry-level pricing.

Creating Great User Experience and Ultimate Flexibility with Clickshare

Working and collaborating in any office environment today should be meaningful, as workers today go to office for very specific reasons. When desig...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.