SlideShare a Scribd company logo
Cloud Application Discovery
Application Ecosystem
Application ecosystems are growing in size, scope and complexity……
SaaS
Cloud Application Discovery
Lift and shift
Rearchitect
Innovation
Shifting Landscape
‘Vendors are shifting their business models from on-
premises licensed software to public cloud-based
offerings, this trend will continue.’ - Gartner
Applications that are lifted and
shifted to the cloud can't take full
advantage of native cloud features -
may not be cost-effective.SaaSification
The SaaS Challenge
▪ Loss of Authority
▪ SaaS providers market direct to consumers
▪ Self selection – Consumerisation of IT
▪ Decentralised decision making
▪ Loss of Control
▪ Vendors define the architecture and deployment
▪ All that’s required is a browser and connectivity!
▪ Your data is managed by the vendor
▪ But IT retain Accountability
▪ Risk of security and regulatory infringement
▪ Fewer control points, reduced visibility
▪ Total dependence on many more vendors
Privacy Rectification Erasure Access Location
Is the data
adequately secured
and encrypted in
transit and at rest?
Who can access the
data, who stores
the data, can the
cloud provider
access it?
Is it easy to change
customer data on
request, do you
know where it is
located?
Can a customer’s data
be completely
deleted under your
control?
Is the data stored in
an approved
country with
adequate security and
privacy laws
Compliance
Can you prove that the SaaS applications your employees have
signed up to provide appropriate GDPR regulatory compliance ?
GDPR and SaaS
Criticality Threshold
Irreversibility Threshold
Discovery Rejection Withdrawn
Uncontrolled Adoption
Understanding Retirement
Unplanned Commitment
Adoption
Institutional
Lingering
Planned Commitment
Niche
Planned
Decline
Conscious
Uncoupling
Discovery Threshold
Cloud Adoption Lifecycle: Managed Adoption
Discovery: Evaluated by IT department as they test configurations, deployment, support processes
Understanding: Pilot with selected users who put the solution through it’s paces
Adoption: Controlled roll-out to departments and teams
Planned Commitment: In use across the organisation
Pilot
Rollout
Evaluation
Criticality Threshold
Irreversibility Threshold
Discovery Rejection Withdrawn
Uncontrolled Adoption
Understanding Retirement
Unplanned Commitment
Adoption
Institutional
Lingering
Planned Commitment
Niche
Planned
Decline
Conscious
Uncoupling
Discovery Threshold
Cloud Adoption Lifecycle: Viral Adoption
Discovery: Adopted by a single user, who immediately invites their colleagues to join
Uncontrolled Adoption: Makes the team’s life easier, they enthusiastically adopt it
Unplanned Commitment: Integral to the business, it’s impossible to imagine life without it
Network Effects
Viral Adoption
Independent Discovery
Take Back Control
Ampliphae Cloud Analytics Overview
Identify all the Cloud
Applications in use
within your
organisation.
Understand who uses
each application,
when, where and why.
Discovery
Highlight security,
regulatory and
commercial
considerations for
each Cloud
Application, and make
an appropriate
decision.
Governance
Block or optimise
access to individual
Cloud Applications.
Give your people the
information they need
to make informed
decisions.
Control
Continuously monitor
for new Cloud
Applications, and
audit cost and risk.
Cost and compliance
reporting
Audit Analyse
✓ Discover which applications your people are using
✓ Know where your data is stored
✓ Understand how secure it is and who can access it
✓ Govern and manage the vendors
✓ Control applications and activities in the Cloud
✓ Manage your risks and exposures
Deep insights into the
usage and adoption of
cloud applications.
Predict application
growth, identify
security threats and
anomalies
Cloud Application Discovery

More Related Content

PDF
Level Up to a Seamless End-User Experience
PDF
Higher Efficiency and IT Empowerment with VMware vSphere with Operations Mana...
PDF
Virtualization Journey
PDF
New Model for IT: Cloud Service Provider
PPTX
Why SaaS BI
PPTX
08 july 2016
PPTX
Digital Operations Excellence - PagerDuty Summit Series Keynote
PPTX
Data Quality Solution
Level Up to a Seamless End-User Experience
Higher Efficiency and IT Empowerment with VMware vSphere with Operations Mana...
Virtualization Journey
New Model for IT: Cloud Service Provider
Why SaaS BI
08 july 2016
Digital Operations Excellence - PagerDuty Summit Series Keynote
Data Quality Solution

What's hot (20)

PDF
Scalar Security Roadshow April 2015
PPTX
Cloud Performance Monitoring: Medtronic's CareLink(R) Cloud Application
PDF
Scalar cloud study2016_slideshare
PDF
IT Service & Asset Management Better Together
PPTX
Why You (& Your Enterprise) Should Care About Shadow Clouds
PDF
Cloud Perspectives - Ottawa Seminar - Oct 6
PDF
Secure Mobility with Analytics for the Private Cloud
PDF
7 Best Practices to Protect Critical Business Information [Infographic]
PDF
Mobile Workspaces Go Where You Go [Infographic]
PPSX
Modern Datacenter_FY14_FINAL
PDF
5 Steps to Gov IT Modernization
PDF
Taming Your Hybrid Cloud - Doug Bourgeois
PDF
Future Proofing Your Mission - Samuel Gordy
PDF
Implementing next generation mobile app strategies with Seqrite MDM
PDF
If You Are Not Embedding Analytics Into Your Day To Day Processes, You Are Do...
PDF
The Future of Network Management
PPTX
Voyss Cloud-Based Managed Services Webinar 9-14-12
PDF
Cloud Adoption Trends
PDF
6 aproaches
PPTX
Open Data Center Alliance 2014 Member Survey on Cloud Adoption
Scalar Security Roadshow April 2015
Cloud Performance Monitoring: Medtronic's CareLink(R) Cloud Application
Scalar cloud study2016_slideshare
IT Service & Asset Management Better Together
Why You (& Your Enterprise) Should Care About Shadow Clouds
Cloud Perspectives - Ottawa Seminar - Oct 6
Secure Mobility with Analytics for the Private Cloud
7 Best Practices to Protect Critical Business Information [Infographic]
Mobile Workspaces Go Where You Go [Infographic]
Modern Datacenter_FY14_FINAL
5 Steps to Gov IT Modernization
Taming Your Hybrid Cloud - Doug Bourgeois
Future Proofing Your Mission - Samuel Gordy
Implementing next generation mobile app strategies with Seqrite MDM
If You Are Not Embedding Analytics Into Your Day To Day Processes, You Are Do...
The Future of Network Management
Voyss Cloud-Based Managed Services Webinar 9-14-12
Cloud Adoption Trends
6 aproaches
Open Data Center Alliance 2014 Member Survey on Cloud Adoption
Ad

Similar to Cloud Application Discovery (20)

PDF
BATbern48_How Zero Trust can help your organisation keep safe.pdf
PDF
Cloud App Security Customer Presentation.pdf
PDF
Blocking Viral SaaS Adoption is Blocking Innovation - Novosco & Amplipahe
PDF
Migrating to the Cloud - From Preparation to Operation copy.pdf
PPTX
How to Overcome Network Access Control Limitations for Better Network Security
PDF
SOC 2 and SaaS Compliance- A Strategic Approach to Secure Cloud Transformatio...
PPTX
Empired Convergence 2017 - Keeping Pace, Staying Safe in the Digital World
PDF
Improve_Application_Availability_and_Performance_Sales_Crib_Sheet.pdf
PPTX
SOC 2 and SaaS Compliance- A Strategic Approach to Secure Cloud Transformatio...
PDF
Moving Beyond Remote Access: Discover the Power of Zero Trust Network Access
PPTX
Embracing secure, scalable BYOD with Sencha and Centrify
PPTX
cloud Resilience
PPT
Auditing in the Cloud
PDF
How Zero Trust Changes Identity & Access
PPTX
Zero Trust and Data Security
PDF
How to Monitor Digital Dependencies Across Your Modern IT Stack
PDF
How to Monitor Digital Dependencies Across Your Modern IT Stack
PDF
How it pros buy cloud servers
PPTX
Simplifying Security Management in the Virtual Data Center
PDF
The Essential Roadmap For Effective Cloud Migration.pdf
BATbern48_How Zero Trust can help your organisation keep safe.pdf
Cloud App Security Customer Presentation.pdf
Blocking Viral SaaS Adoption is Blocking Innovation - Novosco & Amplipahe
Migrating to the Cloud - From Preparation to Operation copy.pdf
How to Overcome Network Access Control Limitations for Better Network Security
SOC 2 and SaaS Compliance- A Strategic Approach to Secure Cloud Transformatio...
Empired Convergence 2017 - Keeping Pace, Staying Safe in the Digital World
Improve_Application_Availability_and_Performance_Sales_Crib_Sheet.pdf
SOC 2 and SaaS Compliance- A Strategic Approach to Secure Cloud Transformatio...
Moving Beyond Remote Access: Discover the Power of Zero Trust Network Access
Embracing secure, scalable BYOD with Sencha and Centrify
cloud Resilience
Auditing in the Cloud
How Zero Trust Changes Identity & Access
Zero Trust and Data Security
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT Stack
How it pros buy cloud servers
Simplifying Security Management in the Virtual Data Center
The Essential Roadmap For Effective Cloud Migration.pdf
Ad

More from Novosco (20)

PDF
Novosco Zero day protection webinar
PPTX
Novosco: Citrix tips and best practices
PDF
Cloudy with a Chance of Failure - Novosco
PDF
Novosco Building IT Resilience Webinar
PDF
Lets talk data security
PPTX
Let talk Citrix
PPTX
Webinar: Lets talk Office 365
PPTX
Software Defined Networking - Huawei, June 2017
PPTX
VMware vSAN - Novosco, June 2017
PPTX
Network Security - Fortinet, Dublin June 2017
PPTX
Let's Talk Webinar - Disaster Recovery for Business
PDF
Novosco software defined storage webinar
PDF
Novosco ransomware webinar presentation
PPTX
Prevention is not enough
PPTX
The Trouble with Saas and Hybrid Cloud
PDF
Dell EMC Spanning
PDF
Microsoft Azure
PDF
Microsoft Office 365
PDF
Novosco Hosted Skype for Business
PDF
Evolution of hybrid cloud
Novosco Zero day protection webinar
Novosco: Citrix tips and best practices
Cloudy with a Chance of Failure - Novosco
Novosco Building IT Resilience Webinar
Lets talk data security
Let talk Citrix
Webinar: Lets talk Office 365
Software Defined Networking - Huawei, June 2017
VMware vSAN - Novosco, June 2017
Network Security - Fortinet, Dublin June 2017
Let's Talk Webinar - Disaster Recovery for Business
Novosco software defined storage webinar
Novosco ransomware webinar presentation
Prevention is not enough
The Trouble with Saas and Hybrid Cloud
Dell EMC Spanning
Microsoft Azure
Microsoft Office 365
Novosco Hosted Skype for Business
Evolution of hybrid cloud

Recently uploaded (20)

PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Modernizing your data center with Dell and AMD
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Encapsulation_ Review paper, used for researhc scholars
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Empathic Computing: Creating Shared Understanding
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
KodekX | Application Modernization Development
PDF
Machine learning based COVID-19 study performance prediction
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
cuic standard and advanced reporting.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
Big Data Technologies - Introduction.pptx
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
Review of recent advances in non-invasive hemoglobin estimation
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Modernizing your data center with Dell and AMD
Dropbox Q2 2025 Financial Results & Investor Presentation
Unlocking AI with Model Context Protocol (MCP)
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Reach Out and Touch Someone: Haptics and Empathic Computing
Encapsulation_ Review paper, used for researhc scholars
“AI and Expert System Decision Support & Business Intelligence Systems”
Empathic Computing: Creating Shared Understanding
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
KodekX | Application Modernization Development
Machine learning based COVID-19 study performance prediction
NewMind AI Monthly Chronicles - July 2025
Diabetes mellitus diagnosis method based random forest with bat algorithm
cuic standard and advanced reporting.pdf
Building Integrated photovoltaic BIPV_UPV.pdf
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Big Data Technologies - Introduction.pptx
Per capita expenditure prediction using model stacking based on satellite ima...

Cloud Application Discovery

  • 2. Application Ecosystem Application ecosystems are growing in size, scope and complexity…… SaaS
  • 4. Lift and shift Rearchitect Innovation Shifting Landscape ‘Vendors are shifting their business models from on- premises licensed software to public cloud-based offerings, this trend will continue.’ - Gartner Applications that are lifted and shifted to the cloud can't take full advantage of native cloud features - may not be cost-effective.SaaSification
  • 5. The SaaS Challenge ▪ Loss of Authority ▪ SaaS providers market direct to consumers ▪ Self selection – Consumerisation of IT ▪ Decentralised decision making ▪ Loss of Control ▪ Vendors define the architecture and deployment ▪ All that’s required is a browser and connectivity! ▪ Your data is managed by the vendor ▪ But IT retain Accountability ▪ Risk of security and regulatory infringement ▪ Fewer control points, reduced visibility ▪ Total dependence on many more vendors
  • 6. Privacy Rectification Erasure Access Location Is the data adequately secured and encrypted in transit and at rest? Who can access the data, who stores the data, can the cloud provider access it? Is it easy to change customer data on request, do you know where it is located? Can a customer’s data be completely deleted under your control? Is the data stored in an approved country with adequate security and privacy laws Compliance Can you prove that the SaaS applications your employees have signed up to provide appropriate GDPR regulatory compliance ? GDPR and SaaS
  • 7. Criticality Threshold Irreversibility Threshold Discovery Rejection Withdrawn Uncontrolled Adoption Understanding Retirement Unplanned Commitment Adoption Institutional Lingering Planned Commitment Niche Planned Decline Conscious Uncoupling Discovery Threshold Cloud Adoption Lifecycle: Managed Adoption Discovery: Evaluated by IT department as they test configurations, deployment, support processes Understanding: Pilot with selected users who put the solution through it’s paces Adoption: Controlled roll-out to departments and teams Planned Commitment: In use across the organisation Pilot Rollout Evaluation
  • 8. Criticality Threshold Irreversibility Threshold Discovery Rejection Withdrawn Uncontrolled Adoption Understanding Retirement Unplanned Commitment Adoption Institutional Lingering Planned Commitment Niche Planned Decline Conscious Uncoupling Discovery Threshold Cloud Adoption Lifecycle: Viral Adoption Discovery: Adopted by a single user, who immediately invites their colleagues to join Uncontrolled Adoption: Makes the team’s life easier, they enthusiastically adopt it Unplanned Commitment: Integral to the business, it’s impossible to imagine life without it Network Effects Viral Adoption Independent Discovery
  • 10. Ampliphae Cloud Analytics Overview Identify all the Cloud Applications in use within your organisation. Understand who uses each application, when, where and why. Discovery Highlight security, regulatory and commercial considerations for each Cloud Application, and make an appropriate decision. Governance Block or optimise access to individual Cloud Applications. Give your people the information they need to make informed decisions. Control Continuously monitor for new Cloud Applications, and audit cost and risk. Cost and compliance reporting Audit Analyse ✓ Discover which applications your people are using ✓ Know where your data is stored ✓ Understand how secure it is and who can access it ✓ Govern and manage the vendors ✓ Control applications and activities in the Cloud ✓ Manage your risks and exposures Deep insights into the usage and adoption of cloud applications. Predict application growth, identify security threats and anomalies