Cloudistics entered into a strategic partnership with Fungible. The Cloudistics development team is working jointly with Fungible on software to drive the next generation of composable infrastructure. A few members of our team have joined Fungible directly, this will ensure synergy and create leadership integrated offerings.

skip to Main Content
4 Reasons To Repatriate Public Cloud Services And Data To Private Cloud

Cloud computing has been around now for some time but questions about security still linger — especially with reports of widespread data breaches. Cloud computing makes it relatively easy to procure the services you want and trust the service provider to do the heavy lifting. The prize of less complexity and less worry with the promise of fast and flexible data and applications is very enticing. However, this “trust” in the arrangement overlooks a very important risk — that of exposing data to hackers and thieves.

Public cloud uses what’s known as the shared-security model. For example, Amazon’s part of the shared security is the infrastructure underlying the cloud service itself. It protects the hardware, software, networking, and facilities that generate the AWS cloud services. The enterprise customer is responsible for all the software running in the cloud instance, including encryption, operating system, firewall, platforms, and applications. Because this can be overwhelming and not always monitored as frequently as necessary, there is a growing trend of companies moving mission critical data back to private data cloud solutions — known as data repatriation. For more insights, here are 4 reasons to consider Repatriating Public Cloud Services and Data to Private Cloud:

1. Data Breach Frequency is Increasing

While the public cloud may seem like the simple choice for many enterprises, dealing with the fallout from a data breach is not. In fact, InfoSecurity Magazine recently reported that 2017 set some disturbing records: 

  • The most breaches and the most data compromised in a year — 5,207 breaches — 20% higher than record setting 2015.
  • 7.8 billion records exposed — a 24.2% increase over 2016’s previous high of 6.3 billion.
  • Web breaches (accidentally exposing sensitive data to the Internet) took over the top spot at 69.2%, or 5.4 billion records.

Many experts such as Josh Mayfield, Platform Specialist at FireMon, have noted the ease with which cyber criminals are getting familiar with accessing, storing and then downloading sensitive data residing in cloud storage repositories such as AWS’ S3.

2. Cybercriminals are Getting More Creative

On Feb. 14 of this year the Buckhacker website was launched. It allows anyone to search for unsecured sensitive data in the AWS S3 cloud. Amazon hasn’t yet commented, but in November 2017 they launched five new encryption and security features, so they’re aware of the potential for breaches.If your own PC was infected by a virus or a warning popped up from a website you’ve clicked on, then you’re already familiar with the immediate reaction one has — dread, fear, and uncertainty. Now imagine getting a warning like those issued to companies such as Uber, Verizon, Alteryx, the WWE, US defense contractor Booz Allen Hamilton, and Dow Jones as outlined in a recent BBC article: Exposed Amazon cloud storage clients get tip-off alerts.

3. Security is Often Overlooked

Why are so many records being exposed? The reasons include misconfigured settings, a lack of contact details to reach security or system admins when leaks are first noticed, mothballed projects that leave old data stores active and subject to hacking, forgotten development projects containing login info that can be used to gain access to other parts of customers’ networks. In addition, AWS S3 information bucket defaults are “public” access unless it’s changed to “private.” If these facts are making you nervous about exposing the corporate or customer data you’re currently storing in the cloud, then you should be seeking to augment your public cloud strategy with a secure private/hybrid solution.

4. Public Cloud Masks Security Complexity with IaaS Simplicity

With the skill of a magician using slight-of-hand to distract an audience during an illusion, public cloud companies have masked security complexity by wrapping it in the simplicity of IaaS. The reality is that storing data in the cloud is simple until it becomes public, that’s when the risks to the business become real, exposing customer data, company Intellectual property, and private network information for hackers to use for financial, political, monetary gain/blackmail, etc.Consider the impact recent data breaches have had on the reputation of firms such as Equifax.

So, what’s the bottom line? First, for data in the cloud make sure security policies are documented, followed and kept up to date. That includes any changes in personnel, abandoned projects and “rouge” IT efforts on the part of internal users.Second, consider moving data to private cloud solutions as part of a hybrid cloud business model. If you’re including data repatriation as part of a hybrid cloud approach, then you need to be sure that you’re moving to a compatible architecture that offers the same benefits of scale, cost and operational simplicity while also insuring your application portability to meet performance expectations.One such solution is Cloudistics Ignite Cloud Platform.

Cloudistics Ignite Cloud Platform — Public Cloud Flexibility with Private Cloud Control & Security

The Cloudistics Ignite Cloud platform consists of three layers — networking, storage and compute — all managed by a cloud-based controller. This software-defined platform is configured as an easy-to-use appliance that’s scalable and elastic by design with built-in security.

Data is protected because it’s encrypted at rest and in-flight. Applications and VMs are protected with micro-segmented, distributed firewalls and overall management enhanced through integration with third party applications such as Splunk SIEM. Because the Cloudistics software defined solution is constantly being updated with the latest industry compliance guidelines you don’t have to stay abreast of current security processes. Security key management is transparent; there are no additional licenses to purchase or maintain. And last, but certainly not least, in these times of rampant cyber hacking, the Cloudistics Ignite cloud controller is encrypted and doesn’t require opening any inbound firewall ports — all communication is initiated by customer inside their firewall and outbound communication is encrypted.

Cloudistics Ignite — Designed to Enable Successful Repatriation from Public Cloud

Cloud data repatriation on the Cloudistics Ignite Private Cloud can help alleviate your concerns about control, security and enable Agile methodologies.

  • It’s elastic and clusterless, which enables network, storage and compute resources to scale on demand to satisfy daily performance peaks and valleys
  • It’s built on open-source software, removing the need for expensive proprietary licenses for virtualization so your operational costs are predictable, you only pay for what is consumed from the marketplace
  • It includes a unique Adaptive Overlay Network (AON) for true network virtualization
  • It includes a powerful, secure, SaaS cloud controller so you can control, manage and orchestrate all Cloudistics platform resources from a single pane of glass
  • It includes certified templates for new technologies such as containers and big data in its own application marketplace

If you’re ready to Repatriate Public Cloud Services and Data to Private Cloud, Cloudistics Ignite Private Cloud might be the right fit for your organization. Learn more about the premium Cloudistics private cloud experience, visit us at or request your 15-minute live demo.

Dan Mroz

VP of Worldwide Marketing

Over the past 20 years, Dan has had the opportunity to hold several diverse positions within the IT industry. Prior to joining Cloudistics, he was part of an incubation team at Lenovo, which launched new hyper-converged products. He developed channel and enablement strategies while contributing to marketing and messaging efforts. Prior to Lenovo, Dan held positions in sales and engineering at Dell-EMC. Dan was engineer of the year in 2012 and 2014.

Dan has held IT leadership and instructor positions at the Pennsylvania State University where he led technology strategy, instructional design, and numerous strategic projects.

Dan has always had an entrepreneurial spirit and co-founded a web development, hosting, and consulting company. He has led marketing, recruitment, and IT operations of multiple organizations in the healthcare, technology, and financial segments.

Dan earned two undergraduate degrees from the Pennsylvania College of Technology and his MBA from the New York Institute of Technology.

Back To Top
×Close search