Seite 69 - Cloud Migration Version 2012 english

69 
and the utilization level in terms of computer performance or memory 
(
RAM, storage). After choosing a package of suitable KPIs it is equally 
significant to decide which measuring points to apply where. You always 
need to consider the fact that, when you integrate Cloud services, various 
companies will access a number of Cloud services by various providers at the 
same time (all of which are, say, represented on a single website). These 
Cloud services are supplied to the end user's screen by different servers 
from different datacentres across a multitude of network connections. 
Networks can be monitored using sensors at individual network nodes (e.g. 
routers); agents can be installed on servers and on other infrastructure 
devices (storage system) to provide monitoring data. Another option is an 
end‐to‐end monitoring System that simulates real user behaviour at regular 
intervals and thus provides objective Information about the suitability of 
your applications for end users. It is essential to handle performance 
monitoring within the client software protocol as it is unlikely that the Cloud 
service provider will allow the Cloud service users to install a generic 
management agent on the provider's own IT systems. 
All of these systems deliver different data types at different intervals and 
with different volumes. This data need to be collected, normalised, 
compacted and then correlated to be able to make a statement on the 
available performance. This can be a major challenge, and likely to become 
more complex as integration of heterogeneous systems increases. A number 
of companies (e.g. Compuware) offer software and services tailored for 
these requirements. 
3.2
Cloud Security 
3.2.1
Cloud Security: The big picture  
The use of IT has gone through radical change in recent years and will see 
increasingly radical change in the future. More and more enterprises are 
getting involved in the opportunities and risks of Cloud computing in all its 
different forms. This section is intended to discuss which hot topics would 
be wise to consider in the context of Cloud computing and what this will all 
mean for information security in particular.
23
23
An expanded version of this chapter can be found under