blogs.vmware.com
Open in
urlscan Pro
2a02:26f0:480:5a0::2ef
Public Scan
Submitted URL: https://marketing.vmware.com/MDQ4LVNaVy0wNDUAAAGLYJNRqplOgN2VoLJVH-62BuIjM5W2Q5bYp2ERkcSSo22pOwj32SWjAmhikahGWA4vv5dT5xM=
Effective URL: https://blogs.vmware.com/emea-en/2023/03/the-real-risk-of-avoiding-cloud-sovereignty/?mkt_tok=MDQ4LVNaVy0wNDUAAAGLYJNRqiX...
Submission: On April 27 via api from IE — Scanned from DE
Effective URL: https://blogs.vmware.com/emea-en/2023/03/the-real-risk-of-avoiding-cloud-sovereignty/?mkt_tok=MDQ4LVNaVy0wNDUAAAGLYJNRqiX...
Submission: On April 27 via api from IE — Scanned from DE
Form analysis
2 forms found in the DOMGET https://blogs.vmware.com/emea-en/
<form class="search-form" method="get" action="https://blogs.vmware.com/emea-en/">
<label class="sr-only" for="s">Search</label>
<input class="search-field" placeholder="Search" name="s">
<input type="submit" value="Submit Search" class="search-submit btn">
</form>
POST https://blogs.vmware.com/emea-en/wp-comments-post.php
<form action="https://blogs.vmware.com/emea-en/wp-comments-post.php" method="post" id="commentform" class="comment-form" novalidate="">
<p class="comment-notes"><span id="email-notes">Your email address will not be published.</span> <span class="required-field-message">Required fields are marked <span class="required">*</span></span></p>
<div class="comment-form-comment"><label for="comment" class="sr-only">Comment</label> <textarea id="comment" name="comment" cols="45" rows="8" maxlength="65525" required="required"></textarea></div>
<div class="form-wrap">
<div class="form-left">
<div class="comment-form-author">
<label for="author" class="sr-only">Name</label>
<input id="author" placeholder="Name*" name="author" type="text" value="" size="30" maxlength="245" required="required">
</div>
<div class="comment-form-email">
<label for="email" class="sr-only">Email</label>
<input id="email" name="email" type="email" value="" size="30" placeholder="Email*" maxlength="100" aria-describedby="email-notes" required="required">
</div>
<div class="comment-form-url">
<label for="url" class="sr-only">Website</label>
<input id="url" name="url" type="url" value="" size="30" placeholder="Website" maxlength="200">
</div>
</div>
<div class="form-right">
<div class="comment-form-cookies-consent">
<label for="wp-comment-cookies-consent">
<input id="wp-comment-cookies-consent" name="wp-comment-cookies-consent" type="checkbox" value="yes"><span> Save my name, email, and website in this browser for the next time I comment</span></label>
</div>
</div>
</div>
<p class="form-submit"><input name="submit" type="submit" id="submit" class="submit" value="Post Comment"> <input type="hidden" name="comment_post_ID" value="87258" id="comment_post_ID">
<input type="hidden" name="comment_parent" id="comment_parent" value="0">
</p>
<p style="display: none;"><input type="hidden" id="akismet_comment_nonce" name="akismet_comment_nonce" value="49aa88168b"></p>
<p style="display: none;"></p><input type="hidden" id="ak_js" name="ak_js" value="1682595357996">
</form>
Text Content
Menu VMware EMEA Blog Search Search * VMware Blogs * Communities * RSS * Twitter * LinkedIn * YouTube * News & Highlights * Explore by SolutionToggle submenu * App Modernization * Digital Workspace * Multi-Cloud * Intrinsic Security * Virtual Cloud Network * Explore by Success Stories * VMware Explore * Partners * RSS * Twitter * LinkedIn * YouTube Virtual Cloud Network Intrinsic Security THE REAL RISK OF AVOIDING CLOUD SOVEREIGNTY VMware EMEA March 23, 2023 Share on: * Share on Twitter * Share on LinkedIn * Share on Facebook * Email this post 0 Guy Bartram, Director Product Marketing, Sustainability Ambassador Adopting cloud computing has become increasingly popular, with many organizations taking advantage of its benefits, such as reduced costs, improved flexibility, and scalability. However, with this increased adoption comes the need for increased attention to security, particularly regarding sensitive data, data classification, privacy, and Sovereign Clouds. Sovereign Clouds are managed and operated privately or through a third-party Sovereign Cloud Provider, such as a VMware Sovereign Cloud Provider, often used for sensitive data and applications. Sensitive data may have a broader scope than people realize and can vary depending on the context and the industry the company focuses on. For example, in healthcare, sensitive data might include medical records, while in finance, it might include financial records and credit scores. In government, it might include classified information related to national security. Unfortunately, many organizations still need to be more open to using Sovereign Clouds, despite the risks of avoiding them. This blog post will explore the risks of avoiding Sovereign Clouds and why considering them is essential. There could be several reasons why organizations are not adopting Sovereign Clouds: However, avoiding Sovereign Clouds and using Hyperscale clouds can pose several risks to an organization’s security and privacy. * Public clouds are typically owned and managed by third-party providers who may have different security controls and protocols than in your organization. This means your data could be vulnerable to unauthorized access, theft, or misuse by hackers, insiders, or other malicious actors. This is something recently highlighted by President Biden, that there needs to be regulation of the security practices in Public Cloud, which poses a considerable risk for sensitive data. * Public clouds often rely on shared infrastructure, meaning that the data and resources of multiple organizations are stored and processed on the same servers and networks. This increases the risk of data leakage or cross-contamination, where sensitive data could accidentally or intentionally be accessed or exposed to other users on the same platform. Shared platforms come at a functional cost, typically security and performance. Resource contention and degraded performance can exist depending on the underlying hypervisor used in the public cloud. Hyperscale clouds often limit the compute, network, and storage resources customers can use to work around this, resulting in high costs vs. resources and many customers moving workloads out of their cloud. Recent examples in the press are basecamp and 37Signals. * Public clouds are subject to legal and regulatory requirements that may not align with an organization’s security and compliance needs. For example, some public cloud providers may be subject to foreign laws such as U.S. Cloud Act or government surveillance such as FISA, which could compromise the confidentiality and integrity of the classified data. In Europe for example, the U.S. Cloud Act raises concerns about the privacy and data protection of EU citizens, as it potentially allows US authorities to access their personal data without sufficient safeguards or oversight. In summary, it conflicts with the EU’s General Data Protection Regulation (GDPR), which requires companies to obtain explicit consent from individuals to process their personal data and ensure adequate data protection measures are in place. Consider data as all forms, including metadata, telemetry data, accounting data and support data, the sphere of influence to consider here is much larger than you think. Exposure has been documented many times in the press. An excellent example of this is the 2022 Data Protection Impact Assessment (DPIA) from the Dutch ministry, stating “high risk related to unencrypted streaming and stored special categories of data” and: “There is a high data protection risk related to the possible access by US law enforcement and secret services to very sensitive and special categories of personal data. This risk occurs even though the Teams, OneDrive and SharePoint Content Data are already exclusively processed and stored in the EU, because access to this data can be ordered through US legislation such as the US CLOUD Act.” * The organization should control the management and visibility of its data as it is stored and processed in a third-party environment. Public cloud lack of standardization can limit the organization’s ability to audit, monitor, and enforce security policies and procedures. Public clouds are highly distributed and complex, making a comprehensive view nearly impossible. This is compounded by a shared responsibility model for security where customers are responsible for using the public cloud features to secure their own data. The public cloud is very good at rapid scaling, which can challenge keeping track of security policies over multiple resources. Finally, all public clouds have differing capabilities and toolsets, creating challenges with the levels of security possible but also the enforcement of security. Overall, the risks of putting any data in a public cloud can be significant, and organizations should carefully evaluate and mitigate these risks before deciding to use such services. However, is Sovereign Cloud a nirvana? Organizational concerns about Sovereign Clouds range from the availability, performance, and cost of Sovereign Cloud solutions to traditional cloud offerings. Are they correct? Availability Sovereign cloud solutions may have a different global reach and availability than traditional public cloud offerings; a view could be that this limits their ability to support geographically dispersed workloads and users. Sovereignty is not a global matter but a national one or shared regional in the EU, for example. Sovereign Cloud solutions ensure high availability within national geographies and data centers within the Sovereign region; going across borders would mean differing jurisdictions and laws about all aspects of data and cloud. Ensuring the availability of data and services is critical for operations that Sovereign Cloud providers manage, such as operations of national interest. Availability is a crucial aspect of the VMware Sovereign Cloud 20-point certification; VMware Sovereign Cloud partners must attest to providing data integrity and availability with redundant infrastructure and failover mechanisms to ensure that data and applications remain available in the attested territory in the event of a regional outage or disaster. Performance Sovereign Cloud solutions, as all cloud solutions, will have different levels of performance and scalability than public cloud offerings. This could be viewed as limiting their ability to handle high-volume, resource-intensive workloads. Sovereign Clouds are built and designed to meet sovereign customers’ needs; many Sovereign Clouds operate at very high levels of availability, exceeding hyperscale offering capabilities. Operations of National interest and specific verticals have unique application requirements, and valuable items such as autoscaling are available to VMware Sovereign Cloud providers. VMware has pioneered exceptional performance, including some faster than bare metal capabilities (see Tanzu Kubernetes example). For a long time, VMware has had technologies to avoid performance issues inherent in virtualized environments and has outperformed public cloud services. For a great example of this, see this report from a VMware Cloud Provider Expedient. Cost Sovereign cloud solutions may be more expensive than traditional cloud offerings due to higher operational costs, lower economies of scale, and the need to maintain specialized infrastructure and talent. Cost is a critical cloud component, and VMware Cloud Providers work on a pure consumption model. Unlike hyperscale cloud, where you must purchase reserved instances, you can have a resource pool of compute and storage and use as much or little as you need. Resource pooling is one option for cost-sensitive Sovereign customers, even those that want dedicated hardware and private clouds can quickly scale out without incurring significant costs. Sovereign Clouds deal in security and compliance; Sovereign Cloud partners invest significantly in the enhanced vetting of personal, infrastructure and systems aligned to the data classification and industry vertical, that you will not find available in Hyperscale clouds. If you choose a VMware Sovereign Cloud Provider, they can offer secure, shared infrastructure and dedicated isolated private clouds. Both come with full automated lifecycle management and can reduce cost dramatically, have a look at the VCF TCO calculator to see for yourself. Granted, regional cloud providers do not have economies of scale like public cloud providers, but in terms of volume, many Sovereign Cloud partners have very large Cloud estates. For example, OVH Cloud in France builds its own hardware and has 100,000’s workloads running in its environments. Lastly, specialized infrastructure and talent are where VMware Sovereign Cloud partners excel; this is undoubtedly a good thing. Most VMware Cloud Providers deliver managed services, which require operational skills in many different areas, unlike Public Cloud vendors who do not. VMware Cloud Providers, especially Sovereign partners, can help you on your cloud journey, skilled and resourced appropriately to support your business, not just be an infrastructure endpoint. Innovation Sovereign Cloud solutions may have a different level of innovation and feature development than traditional cloud offerings, limiting their ability to keep pace with evolving business needs and technology trends. VMware doesn’t just mean vSphere. VMware’s portfolio of solutions is extensive in capabilities and supports workloads, apps, containers, and data science solutions. VMware Sovereign Clouds must be innovative, most governments and industry verticals have vital requirements to get ahead of the pack, and innovation is mandated in their cloud. Thinking about this differently, public clouds, to be resident, must limit their portfolios to only those that can be resident, separated from SaaS control planes, and this limits innovation. VMware has always offered disconnected solutions; everything runs in the region, in jurisdiction already, so you are automatically gaining control of your cloud. Innovation can be seen in 1 or 2 ways; that which is out of the box (SaaS and PaaS) and that which must be built using new infrastructure and services. An out-of-the-box solution, such as an industrialized cloud solution, could be great to get going quickly. Still, it is potentially a considerable concern for compliance and security. Whereas building a solution to meet your needs offers the opportunity to consider compliance and security from the get-go (which should be a best practice). With data compliance, regulation and governance of data privacy and industrialized data still evolving, it is better to innovate and involve all lines of business to build the right solution. VMware Sovereign Cloud providers offer GPU, AI, ML, Kubernetes, App marketplaces, secure app portfolios, integrated pipeline solutions, and much more to ensure your needs to innovate are covered but, most importantly, secure. Overall, a VMware Sovereign Cloud can provide greater control, security, and flexibility for governments and verticalized organizations that require unique or specialized cloud computing services. Many Sovereign Cloud partners are multi-cloud brokers, promoting the “right cloud for the application” aligned to data classification and security requirements. They can be a one-stop shop for customers who need multiple clouds and hybrid operating models. Get Cloud piece of mind and find out more about Sovereign Cloud; https://www.vmware.com/cloud-solutions/sovereign-cloud.html VMWARE EMEA RELATED ARTICLES Virtual Cloud Network THE REAL RISK OF AVOIDING CLOUD SOVEREIGNTY VMware EMEA March 23, 2023 Success Stories OCUCO PROVIDES CUSTOMERS WITH EFFICIENCY AND SECURITY THANKS TO VMWARE CLOUD DIRECTOR VMware EMEA March 8, 2023 Multi-Cloud THE POWER OF APPS IN A MULTI-CLOUD WORLD VMware EMEA February 14, 2023 Multi-Cloud WHAT DOES YOUR DATA JOURNEY LOOK LIKE? VMware EMEA February 7, 2023 Intrinsic Security WHY SECURITY SHOULD BE AN ASSET IN YOUR INNOVATION TOOLBOX VMware EMEA January 31, 2023 Intrinsic Security EMPLOYEE SURVEILLANCE: MONITORING OR SPYING? VMware EMEA January 27, 2023 Intrinsic Security ARE SECURITY FEARS GOING TO DRIVE WORKERS BACK TO THE OFFICE FIVE DAYS A WEEK? VMware EMEA January 25, 2023 App Modernization WELCOME TO THE WONDERFUL WORKSHOP OF HEALTHCARE VMware EMEA January 24, 2023 App Modernization THE FUTURE OF HEALTHCARE WAS YESTERDAY VMware EMEA January 17, 2023 Intrinsic Security WHY DISASTER RECOVERY IS NOW A C-SUITE CONVERSATION VMware EMEA January 16, 2023 Virtual Cloud Network PUTTING THE POS INTO POSITIVE RETAIL EXPERIENCES VMware EMEA December 12, 2022 News & Highlights DELIVERING HIGH-VALUE CLOUD SERVICES TO ON-PREMISES WORKLOADS WITH VMWARE VSPHERE+ VMware EMEA December 1, 2022 COMMENTS LEAVE A REPLY CANCEL REPLY Your email address will not be published. Required fields are marked * Comment Name Email Website Save my name, email, and website in this browser for the next time I comment Company About Us Executive Leadership News & Stories Investor Relations Customer Stories Diversity, Equity & Inclusion Environment, Social & Governance Careers Blogs Communities Acquisitions Office Locations VMware Cloud Trust Center COVID-19 Resources Support VMware Customer Connect Support Policies Product Documentation Compatibility Guide Terms & Conditions California Transparency Act Statement Twitter YouTube Facebook LinkedIn Contact Sales -------------------------------------------------------------------------------- © 2023 VMware, Inc. Terms of Use Your California Privacy Rights Privacy Accessibility Site Map Trademarks Glossary Help Feedback Cookies Settings WE CARE ABOUT YOUR PRIVACY We use cookies to provide you with the best experience on our website, to improve usability and performance and thereby improve what we offer to you. Our website may also use third-party cookies to display advertising that is more relevant to you. By clicking on the “Accept All” button you agree to the storing of cookies on your device. If you close the cookie banner, only strictly necessary cookies will be stored on your device. If you want to know more about how we use cookies, please see our Cookie Policy. Cookies Settings Accept All Cookies COOKIE PREFERENCE CENTER * GENERAL INFORMATION ON COOKIES * STRICTLY NECESSARY * PERFORMANCE * FUNCTIONAL * ADVERTISING * SOCIAL MEDIA GENERAL INFORMATION ON COOKIES When you visit our website, we use cookies to ensure that we give you the best experience. This information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies by clicking on the different category headings to find out more and change your settings. However, blocking some types of cookies may impact your experience on the site and the services we are able to offer. Further information can be found in our Cookie Policy. STRICTLY NECESSARY Always Active Strictly necessary cookies are always enabled since they are essential for our website to function. They enable core functionality such as security, network management, and website accessibility. You can set your browser to block or alert you about these cookies, but this may affect how the website functions. For more information please visit www.aboutcookies.org or www.allaboutcookies.org. Cookies Details PERFORMANCE Performance Performance cookies are used to analyze the user experience to improve our website by collecting and reporting information on how you use it. They allow us to know which pages are the most and least popular, see how visitors move around the site, optimize our website and make it easier to navigate. Cookies Details FUNCTIONAL Functional Functional cookies help us keep track of your past browsing choices so we can improve usability and customize your experience. These cookies enable the website to remember your preferred settings, language preferences, location and other customizable elements such as font or text size. If you do not allow these cookies, then some or all of these services may not function properly. Cookies Details ADVERTISING Advertising Advertising cookies are used to send you relevant advertising and promotional information. They may be set through our site by third parties to build a profile of your interests and show you relevant advertisements on other sites. These cookies do not directly store personal information, but their function is based on uniquely identifying your browser and internet device. Cookies Details SOCIAL MEDIA Social Media Social media cookies are intended to facilitate the sharing of content and to improve the user experience. These cookies can sometimes track your activities. We do not control social media cookies and they do not allow us to gain access to your social media accounts. Please refer to the relevant social media platform’s privacy policies for more information. Cookies Details Back Button COOKIE LIST Filter Button Consent Leg.Interest checkbox label label checkbox label label checkbox label label * View Third Party Cookies * Name cookie name Clear checkbox label label Apply Cancel Confirm My Choices Allow All word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1