The WHAT The HOW
The large majority of our clients want to do public cloud in
order to deliver more value to their end customers. They
want to mature their operations so they can stay competi-
tive by delivering value faster and more cost-effectively. All
say they want to use the cloud to transform how their busi-
ness operates. We help them understand the key areas of
focus based on the eight pillars of our Cloud Transforma-
tion Maturity approach (figure 2). The majority of technical personnel at large enterprises
adopting cloud either do not have the required skills or,
more importantly, the needed time to focus on this new ini-
tiative. Oftentimes, they are busy supporting mission-criti-
cal applications every day, which does not give them
enough bandwidth to dedicate to other work. Therefore,
most enterprises choose a partner to help accelerate the
cloud transformation and enable the IT staff to become
capable and self-sufficient in the cloud over the long term.
These maturity domains are all interconnected, and in order
to be truly successful in the cloud, companies must address
all of them. That does not mean you have to focus on every
domain right away, nor that you should put the same
amount of effort into each one. However, you should abso-
lutely understand your current level of maturity first, and
identify your desired target end state, so you can chart your
course accordingly. Transformation takes time, so do not
worry about boiling the ocean right away. Pick a couple of
areas and begin the journey: The Strategy and Security
domains are usually good candidates.
Could an organization’s IT staff do everything on its own?
Maybe, but certainly not right away, and not at the velocity
a partner can help establish. Sometimes there is a bit of
healthy tension between the partner and internal IT, but
please resist IT’s argument that they can do the same work,
with the same quality and in the same timeframe as the
partner. If they could, who would be doing their regular work?
• Purchasing and Vendors
• Goals and KPIs
• Economics, Chargeback • Governance and Risk
• Multi-Cloud Strategy
• Leadership Coaching
• Operational Models
• Tagging and Metadata
• Self-Healing Automation • Logging/Monitoring
• Dashboards and Status
• OPS + DEV Roles
• Refactor, Retire, Replace
• IaaS Automation
• Cost Analysis • Migration Techniques
• Landing Zone Automation
• App Assessment Tools
• Visibility and Optics
• Compliance and Risk
• Tools & Software • Risk and Compliance
• Audit and Governance
• Automated Frameworks
Strategy
Operations
Applications
Security
Figure 2: 8 Pillars of
16 | THE DOPPLER |
SUMMER 2019