<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/">
    <channel>
        <copyright>Copyright TechTarget - All rights reserved</copyright>
        <description></description>
        <docs>https://cyber.law.harvard.edu/rss/rss.html</docs>
        <generator>Techtarget Feed Generator</generator>
        <language>en</language>
        <lastBuildDate>Tue, 21 Apr 2026 22:59:41 GMT</lastBuildDate>
        <link>https://www.techtarget.com/searchcloudcomputing</link>
        <managingEditor>editor@techtarget.com</managingEditor>
        <item>
            <body>&lt;p&gt;Contact centers and their agents are a critical part of customer service. They're the ambassadors of the organization, responding to large call volumes daily, interacting with customers and collecting feedback to pass on to the business.&lt;/p&gt; 
&lt;p&gt;Modern contact center platforms increasingly use AI-driven analytics, speech recognition and sentiment analysis tools to monitor interactions in real time and identify opportunities to improve both agent performance and customer experience (CX).&lt;/p&gt; 
&lt;p&gt;A contact center monitoring program can help businesses &lt;a href="https://www.techtarget.com/searchcustomerexperience/feature/The-ultimate-guide-to-contact-center-modernization"&gt;transition the contact center from an expense center to a strategic asset&lt;/a&gt; by ensuring representatives effectively resolve customer issues along with&amp;nbsp;capturing valuable customer feedback. Many companies have a basic QA monitoring program but often struggle with transitioning to a more advanced one. Businesses should identify the benefits of an advanced quality monitoring program and implement key best practices to ensure the program's success.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="What is a contact center monitoring program?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;What is a contact center monitoring program?&lt;/h2&gt;
 &lt;p&gt;A basic contact center quality monitoring program consists of listening to phone calls between customers and contact center agents and &lt;a href="https://www.techtarget.com/searchcustomerexperience/answer/5-ways-to-improve-call-center-agent-performance"&gt;providing feedback to improve agent performance&lt;/a&gt;.&lt;/p&gt;
 &lt;p&gt;An advanced QA monitoring program adds three key elements:&lt;/p&gt;
 &lt;ol class="default-list"&gt; 
  &lt;li&gt;Provides insight into why customers call and facilitates action plans to address the root cause of customer inquiries.&lt;/li&gt; 
  &lt;li&gt;Identifies &lt;a href="https://www.techtarget.com/searchcustomerexperience/tip/Contact-center-challenges-and-how-to-overcome-them"&gt;customers who are frustrated with the company&lt;/a&gt; and might decide to do business with a competitor.&lt;/li&gt; 
  &lt;li&gt;Analyzes the tools that agents use and implements enhancements to those tools that improve the agent experience and provide more accurate and timely responses to customers.&lt;/li&gt; 
 &lt;/ol&gt;
 &lt;p&gt;&amp;nbsp;Many organizations now augment traditional QA monitoring programs with AI-driven analytics tools that automatically analyze call transcripts and customer sentiment.&lt;/p&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="What are the benefits of contact center monitoring?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;What are the benefits of contact center monitoring?&lt;/h2&gt;
 &lt;p&gt;A contact center is the place where the voice of the customer is heard. It's the one place in the organization where a large number of customers reach out and, in most cases, provide unsolicited feedback to the company. A well-designed contact center monitoring program provides a valuable opportunity to identify customer pain points and gather intelligence with the goal of improving products, services and overall CX.&lt;/p&gt;
 &lt;p&gt;Retaining existing customers is typically less expensive than acquiring new ones, so it's critical to &lt;a href="https://www.techtarget.com/searchcustomerexperience/tip/How-to-improve-the-contact-center-experience-for-customers"&gt;identify areas for improvement in the current customer&lt;/a&gt; base to increase retention and reduce costs. Contact center monitoring also provides real-time information at a much more granular level than either customer satisfaction or Net Promoter Score surveys, which are performed after the fact and have some level of bias, depending on who does or doesn't respond to a survey request.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineImages/crm-call_center_agent_characteristics.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineImages/crm-call_center_agent_characteristics_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineImages/crm-call_center_agent_characteristics_mobile.png 960w,https://www.techtarget.com/rms/onlineImages/crm-call_center_agent_characteristics.png 1280w" alt="Graphic listing key qualities of a contact center agent, including knowledgeable, detail-oriented, organized, flexible, empathetic and effective communicator." height="288" width="559"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Successful contact center agents combine interpersonal and organizational skills such as communication, empathy, flexibility and problem-solving to deliver strong customer service.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="How to start a contact center monitoring program"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;How to start a contact center monitoring program&lt;/h2&gt;
 &lt;p&gt;Starting and developing a contact center monitoring program require several steps, including the following:&lt;/p&gt;
 &lt;ol class="default-list"&gt; 
  &lt;li&gt;Identify the criteria that is monitored and scored, such as greeting, tone, call documentation and adherence to procedures.&lt;/li&gt; 
  &lt;li&gt;Develop a scorecard that measures the items to be monitored.&lt;/li&gt; 
  &lt;li&gt;Determine who performs the monitoring, such as a supervisor or QA analyst.&lt;/li&gt; 
  &lt;li&gt;Set the frequency of monitoring per agent and when the monitoring occurs.&lt;/li&gt; 
  &lt;li&gt;Develop a process to provide feedback to agents.&lt;/li&gt; 
  &lt;li&gt;Let the agents know the purpose of the monitoring program and how it works.&lt;/li&gt; 
  &lt;li&gt;Test the quality monitoring process end to end.&lt;/li&gt; 
 &lt;/ol&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="Contact center monitoring best practices"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Contact center monitoring best practices&lt;/h2&gt;
 &lt;p&gt;Successful quality monitoring programs typically include the following best practices.&lt;/p&gt;
 &lt;h3&gt;1. Define quality and the ideal customer interaction&lt;/h3&gt;
 &lt;p&gt;Contact center agents can't provide the proper service to customers if they don't know what the company expects of them. So, it's important for &lt;a href="https://www.techtarget.com/searchcustomerexperience/definition/contact-center-management"&gt;contact center management&lt;/a&gt; to train employees on what to say and do during a customer interaction before beginning the monitoring process. Scripts for agents are sometimes a contact center practice and other times a legal requirement, but they can help agents start off on the right foot by giving them a roadmap of what to say and how an interaction should be done. When scripts aren't a legal requirement, it's often beneficial to modify and use them as a guideline and make them less robotic-sounding to better serve customers.&lt;/p&gt;
 &lt;h3&gt;2. Decide what customer service metrics are most important&lt;/h3&gt;
 &lt;p&gt;Businesses shouldn't try to measure everything. Contact center managers need to &lt;a href="https://www.techtarget.com/searchcustomerexperience/tip/Top-7-call-center-agent-performance-metrics-to-track"&gt;decide what metrics they value the most&lt;/a&gt; and communicate them to their teams before beginning the quality monitoring process. Some metrics include first-contact resolution (&lt;a href="https://www.techtarget.com/searchcustomerexperience/definition/first-call-resolution-FCR"&gt;FCR&lt;/a&gt;), average handle time (AHT), average speed to answer, repeat call rate, calls answered per hour and agent utilization rate. If a contact center, for example, strives for FCR but also expects low AHT, it might be disappointed. The goal of FCR is to resolve customer issues with one phone call, eliminating the need for repeat calls and increasing customer satisfaction. But AHT might be longer as agents work to address the problem.&lt;/p&gt;
 &lt;h3&gt;3. Provide feedback to agents on 100% of monitored calls&lt;/h3&gt;
 &lt;p&gt;For calls that businesses monitor via analytics, a scorecard, which measures customer service and agent performance, should be sufficient. However, companies should &lt;a href="https://www.techtarget.com/searchcustomerexperience/tip/How-to-manage-remote-call-center-agents"&gt;provide agents with timely feedback and coaching&lt;/a&gt; on monitored calls instead of waiting for a monthly review. It's also important for companies to provide agents direct feedback from customers. Companies need to offer agents feedback and coaching in areas of strength and opportunity. Some contact center platforms now use AI-driven coaching tools that automatically identify performance trends and recommend targeted training opportunities for agents.&lt;/p&gt;
 &lt;h3&gt;4. Enable agents to listen to and score their own phone calls&lt;/h3&gt;
 &lt;p&gt;In many cases, agents are the toughest critics of their own work. They should have the opportunity to hear how they sound and interact with customers.&lt;/p&gt;
 &lt;h3&gt;5. Include side-by-side monitoring&lt;/h3&gt;
 &lt;p&gt;Side-by-side monitoring enables analysts and supervisors to interact with agents and ask questions immediately following a phone call. Contact center management can then gather additional valuable insight into specific actions during the customer interaction, including any gaps in the tools agents use.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineImages/searchcrm_callcenter.jpg"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineImages/searchcrm_callcenter_mobile.jpg" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineImages/searchcrm_callcenter_mobile.jpg 960w,https://www.techtarget.com/rms/onlineImages/searchcrm_callcenter.jpg 1280w" alt="Two contact center agents wearing headsets review information on a computer screen while other agents work at nearby stations."&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Supervisors and analysts often review agent interactions together during contact center monitoring to evaluate performance and identify coaching opportunities.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;h3&gt;6. Use a different quality form for each customer service channel&lt;/h3&gt;
 &lt;p&gt;Contact centers interact with customers across multiple channels, including phone, email, mobile apps, chat and social media. It's necessary to &lt;a href="https://www.techtarget.com/searchcustomerexperience/tip/Best-practices-for-contact-center-quality-assurance"&gt;create different QA forms for each channel&lt;/a&gt; to gather appropriate insights. On a QA monitoring form for phone calls, for example, one question might be about an agent's active listening skills. While that question is appropriate for a phone call, it might not provide any value for an email interaction.&lt;/p&gt;
 &lt;h3&gt;7. Save examples of excellent customer interactions&lt;/h3&gt;
 &lt;p&gt;Contact center managers monitoring agent performance inevitably come across some examples of excellent service and support that should be saved for later review and shared during training sessions. Contact centers can use these gold-standard examples as training tools for new agents and &lt;a href="https://www.techtarget.com/searchcustomerexperience/answer/Nine-skills-every-call-center-agent-job-requires"&gt;agents who need to brush up on their skills&lt;/a&gt; by highlighting the language and techniques that helped create outstanding CX.&lt;/p&gt;
&lt;/section&gt;                 
&lt;section class="section main-article-chapter" data-menu-title="Technologies to support advanced contact center monitoring"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Technologies to support advanced contact center monitoring&lt;/h2&gt;
 &lt;p&gt;A basic contact center monitoring program requires a technical foundation of quality monitoring software, which is included in many &lt;a href="https://www.techtarget.com/searchcustomerexperience/definition/contact-center-as-a-service-CCaS"&gt;contact center-as-a-service&lt;/a&gt; platforms and provided as a standalone tool by many vendors. This technology enables a team to listen to a sample of recorded phone calls and score each one using an electronic form.&lt;/p&gt;
 &lt;p&gt;The first step in enhancing a monitoring program is to add the capability of capturing contact center agents' computer screens when recording a call. Screen captures enable analysts to do the following:&lt;/p&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;Observe how agents interact with desktop tools.&lt;/li&gt; 
  &lt;li&gt;Identify areas where agents can improve a process or transaction.&lt;/li&gt; 
  &lt;li&gt;Determine how businesses can improve desktop systems and tools to streamline processes and improve CX.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;figure class="main-article-image half-col" data-img-fullsize="https://www.techtarget.com/rms/onlineImages/crm-call_center_technologies.jpg"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineImages/crm-call_center_technologies_half_column_mobile.jpg" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineImages/crm-call_center_technologies_half_column_mobile.jpg 960w,https://www.techtarget.com/rms/onlineImages/crm-call_center_technologies.jpg 1280w" alt="List of technologies aiding contact center monitoring" height="292" width="279"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Speech analytics software facilitates contact center monitoring.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;p&gt;The next step is to use &lt;a href="https://www.techtarget.com/searchcustomerexperience/definition/speech-analytics"&gt;speech analytics&lt;/a&gt; software to increase the number of calls monitored without requiring more staff to perform the function. Speech analytics can help increase the volume of quality monitors, especially at the agent level, and automate the call scoring process. With an increased number of monitors, patterns showing where an agent may be struggling with a specific type of inquiry can be more easily identified.&amp;nbsp;&lt;/p&gt;
 &lt;p&gt;Speech analytics provides several benefits beyond the ability to monitor a higher volume of calls. It can be used to identify the root cause of phone calls, which is more effective than analyzing disposition codes entered by an agent. Businesses can run a query, for example, that provides 100 calls in which customers have similar issues with a product. Analysts can listen to those calls, identify the root cause of a problem with a product or service, and resolve it.&amp;nbsp;&lt;/p&gt;
 &lt;p&gt;Speech analytics can also analyze phone calls for specific words, phrases, patterns and tones and provide reports. A word cloud, for example, is a collection of words depicting the frequency they appear in calls so companies can better identify customer expectations and sentiment communicated during calls. In more advanced real-time speech analytics, AI analytical capabilities are used in real time to identify calls in which the agent or &lt;a target="_blank" href="https://www.dialora.ai/blog/ai-voice-frustration-detection-call-centers" rel="noopener"&gt;customer is becoming frustrated&lt;/a&gt; and notify a supervisor to assist in handling the call.&lt;/p&gt;
 &lt;p&gt;Many modern contact center platforms also incorporate real-time agent assist tools that analyze conversations during live calls and recommend next best actions.&lt;/p&gt;
 &lt;p&gt;As contact center technology evolves, monitoring programs are becoming more data-driven and automated. Organizations that combine traditional monitoring practices with modern analytics tools can gain deeper insight into customer behavior and service gaps.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Editor's note:&lt;/b&gt; &lt;i&gt;This article was updated to reflect the latest developments in contact center monitoring tools, techniques and practices.&lt;/i&gt;&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Scott Sachs is president and founder of SJS Solutions, a consultancy that specializes in contact center strategy assessments and technology selection.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>A well-designed monitoring program identifies customer pain points and gathers valuable intelligence that can improve agent performance and CX, as well as products and services.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/customer_service03.jpg</image>
            <link>https://www.techtarget.com/searchcustomerexperience/tip/Best-practices-for-call-center-monitoring</link>
            <pubDate>Thu, 09 Apr 2026 10:00:00 GMT</pubDate>
            <title>Contact center monitoring best practices for CX leaders</title>
        </item>
        <item>
            <body>&lt;p&gt;Cloud backup has made it possible for organizations of any size to improve their data protection. At the same time, traditional local backup still has its place in the storage world. The decision to use one or the other -- or, in some instances, both -- comes down to an organization's specific needs.&lt;/p&gt; 
&lt;p&gt;In the cloud backup vs. local backup debate, both options have their advantages and disadvantages.&lt;/p&gt; 
&lt;p&gt;Cloud-based workloads have seen a huge surge in popularity. Not only are established vendors adding more cloud capabilities, but new cloud storage and backup vendors are appearing. The simplicity and scale of cloud computing can provide a backup solution for organizations that need protection.&lt;/p&gt; 
&lt;p&gt;However, local backup providers are not sitting still. Disk speeds continue to get faster, and tape storage capacities are growing. In addition, if an organization has used local backup for a long time, it can be a burden to move to the cloud. IT and executives should ask several questions about such a move, including whether the move makes sense operationally and financially, and whether they should consider a partial migration and keep some local backup.&lt;/p&gt; 
&lt;p&gt;Many organizations, especially enterprises, have a&amp;nbsp;&lt;a href="https://www.techtarget.com/searchdatabackup/tip/Hybrid-backups-reap-benefits-of-cloud-and-local-backup"&gt;mix of cloud and local backup&lt;/a&gt;. Both have pros and cons. For example, local file backup can be quicker for recovery purposes, but the cloud provides that off-site location in the event of a primary data center disaster. Local backup typically requires more in-house management and staff time.&lt;/p&gt; 
&lt;p&gt;To decide which method is best for your organization, weigh the pros and cons of cloud and local backups and how they match with your existing infrastructure.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="Cloud backup basics"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Cloud backup basics&lt;/h2&gt;
 &lt;p&gt;&lt;a href="https://www.techtarget.com/searchdatabackup/definition/cloud-backup"&gt;Cloud backup&lt;/a&gt;&amp;nbsp;involves copying data over a network to an off-site storage server, typically hosted by a service provider. The cloud backup vendor charges the customer based on elements such as capacity, bandwidth, number of users and data egress.&lt;/p&gt;
 &lt;p&gt;Cloud data backup options include&amp;nbsp;&lt;a href="https://www.techtarget.com/searchdatabackup/answer/What-are-some-public-cloud-backup-options-for-better-data-protection"&gt;backing up directly to a public cloud&lt;/a&gt;&amp;nbsp;such as AWS, Google or Microsoft Azure, or backing up to a service provider's private cloud.&amp;nbsp;The newer&amp;nbsp;&lt;a href="https://www.techtarget.com/searchdatabackup/definition/cloud-to-cloud-backup"&gt;cloud-to-cloud backup&lt;/a&gt;&amp;nbsp;involves backing up data that originates in the cloud -- in SaaS applications, such as Salesforce and Microsoft 365 -- to another cloud.&lt;/p&gt;
 &lt;div class="youtube-iframe-container"&gt;
  &lt;iframe id="ytplayer-0" src="https://www.youtube.com/embed/Lc-hY-uHgUU?autoplay=0&amp;amp;modestbranding=1&amp;amp;rel=0&amp;amp;widget_referrer=null&amp;amp;enablejsapi=1&amp;amp;origin=https://www.techtarget.com" type="text/html" height="360" width="640" frameborder="0"&gt;&lt;/iframe&gt;
 &lt;/div&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="Understanding local backup"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Understanding local backup&lt;/h2&gt;
 &lt;p&gt;Local backups are a longstanding form of&amp;nbsp;&lt;a href="https://www.techtarget.com/searchdatabackup/tip/The-pros-and-cons-of-on-site-backup"&gt;backing up data at an organization's primary site&lt;/a&gt;. Organizations typically use disk-based hardware for this backup. Backup software manages the copying of data to the hardware. Sometimes that software is integrated with the hardware, or it runs separately. Data reduction features, such as deduplication, decrease the amount of data backed up on the disk.&lt;/p&gt;
 &lt;p&gt;Tape was the more common traditional backup medium before disk took over in the early 2000s. In the&amp;nbsp;tape backup process, an organization moves data to a tape cartridge that resides in a library. Organizations &lt;a href="https://www.techtarget.com/searchdatabackup/tip/Storage-media-showdown-The-benefits-of-tape-vs-disk-backup"&gt;still use tape&lt;/a&gt; today, typically for immutable offline protection against ransomware and other cyber attacks, or for long-term archiving. LTO-10, the latest version of the Linear Tape-Open format, offers 75 TB of compressed capacity per cartridge.&lt;/p&gt;
 &lt;p&gt;A new twist to the cloud backup vs. local backup story involves backing up SaaS data to a local device. In this case, data originating in the cloud -- such as Microsoft 365 emails -- is backed up to local storage.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/cloud_backup-cloud_vs_local_comparison.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/cloud_backup-cloud_vs_local_comparison_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/cloud_backup-cloud_vs_local_comparison_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/cloud_backup-cloud_vs_local_comparison.png 1280w" alt="Chart of cloud backup and local backup considerations" height="532" width="560"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;It's important to consider the many elements of cloud backup vs. local backup for your organization's data protection.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="Advantages and disadvantages of cloud backup"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Advantages and disadvantages of cloud backup&lt;/h2&gt;
 &lt;p&gt;Overall, cloud backup provides an additional layer of protection with minimal burden on staff. Although cloud backup is a popular mode of data protection with many advantages, pay attention to the disadvantages to make sure your organization is covered. Some areas of advantage can be considered disadvantageous in different situations.&lt;/p&gt;
 &lt;p&gt;The&amp;nbsp;&lt;a href="https://www.techtarget.com/searchdatabackup/tip/The-pros-and-cons-of-cloud-backup-technologies"&gt;advantages of cloud backup&lt;/a&gt;&amp;nbsp;include the following:&lt;/p&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Low entry costs.&lt;/b&gt;&amp;nbsp;Backing up to the cloud, especially in the beginning, is a cheap form of data protection. Although local backup storage devices could run in the thousands of dollars, the cost in money and time to set up a cloud backup account is minimal. Cloud backup is especially attractive to an organization that doesn't have the funds or resources for a separate disaster recovery site.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Wide-ranging accessibility.&lt;/b&gt;&amp;nbsp;A cloud backup is accessible from any internet-connected device, which is especially handy when an organization's primary site is down. Accessing a small amount of data is a quick process.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;An array of security features.&lt;/b&gt;&amp;nbsp;Cloud backup products offer a range of features to keep data safe.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Easy scalability.&lt;/b&gt;&amp;nbsp;&lt;a href="https://www.techtarget.com/searchstorage/tip/Cloud-storage-advantages-Solving-five-common-IT-problems"&gt;Cloud storage is essentially unlimited&lt;/a&gt;. Organizations can add cloud backup capacity with just a couple of clicks. In contrast, local backup requires acquiring and setting up another physical piece of hardware.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Easy management.&lt;/b&gt;&amp;nbsp;Cloud backup management generally takes less time and effort than local data backup, depending on the organization's needs and requests. Organizations just need to make sure they are OK with leaving management of the storage hardware in the hands of a service provider.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Simple disaster recovery.&lt;/b&gt;&amp;nbsp;If there's a failure or data loss event at a primary site, organizations can easily fail over to cloud-based disaster recovery as a service (&lt;a href="https://www.techtarget.com/searchdisasterrecovery/definition/disaster-recovery-as-a-service-DRaaS"&gt;DRaaS&lt;/a&gt;). This option provides disaster recovery to businesses that couldn't previously afford it.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;The following are some&amp;nbsp;potential downsides&amp;nbsp;of cloud backup:&lt;/p&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Cost accumulations.&lt;/b&gt;&amp;nbsp;Although a small amount of data is cheap, a lot of data stored over a long period of time steadily increases costs. A company must pay for its data backup storage every month. It's critical to keep a close eye on cloud backup expenses.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Latency.&lt;/b&gt;&amp;nbsp;The cloud can cause latency, especially if many users are trying to access the same data or cloud, or if an organization is trying to get a large volume of data out of the cloud.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Security issues.&lt;/b&gt;&amp;nbsp;Some organizations are still worried about the&amp;nbsp;&lt;a href="https://www.techtarget.com/searchdatabackup/answer/Whats-the-best-method-for-protecting-data-in-the-cloud"&gt;safety of keeping data in the cloud&lt;/a&gt;. Confirm that a cloud backup product has the necessary security elements, such as end-to-end encryption. In addition, just because a backup is in the cloud, that doesn't mean it's safe from cyber attacks, so be wary of a false sense of security.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Slow, costly restores.&lt;/b&gt;&amp;nbsp;Although DRaaS is fast and efficient, actually restoring data from the cloud can be a time-consuming and costly process, especially when it involves large volumes. Data egress fees can quickly make restorations expensive.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="Advantages and disadvantages of local backup"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Advantages and disadvantages of local backup&lt;/h2&gt;
 &lt;p&gt;Organizations must consider their data protection needs when comparing cloud and local backup options. While the cloud is a popular option and offers benefits, local backups might be a better choice for some organizations. The benefits of local backup include the following:&lt;/p&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;On-site accessibility.&lt;/b&gt;&amp;nbsp;It doesn't get much more accessible than having the backup data at your primary site. Disk-based backups in particular are typically continuous throughout the day, so a user can go back to a specific point in time.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Speed.&lt;/b&gt;&amp;nbsp;On-site disk is fast for backup and recovery operations.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Security control.&lt;/b&gt;&amp;nbsp;An organization has more control over local backup than data that's in the hands of a cloud provider.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;The following are some drawbacks of local backup:&lt;/p&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;High initial cost.&lt;/b&gt;&amp;nbsp;In comparing cloud backup vs. local backup, the expense of on-site hardware is generally far more than preparing for a cloud-based platform. Disks are expensive, so adding them can make a significant&amp;nbsp;&lt;a href="https://www.techtarget.com/searchdatabackup/tip/How-to-craft-a-strong-and-cost-effective-data-backup-budget"&gt;dent in the budget&lt;/a&gt;. In addition, the lifespan and durability of disk&amp;nbsp;&lt;a target="_blank" href="https://www.enterprisestorageforum.com/hardware/life-expectancy-of-a-drive/" rel="noopener"&gt;requires replacement from time to time&lt;/a&gt;&amp;nbsp;as well as routine maintenance.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Scalability difficulties.&lt;/b&gt;&amp;nbsp;With local backup, the process of adding space is more labor-intensive because the organization needs to acquire the additional storage and install it. Physically storing more data backups is more of a burden than just adding storage space in the cloud.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;High maintenance.&lt;/b&gt;&amp;nbsp;Local backup requires dedicated staff to maintain and manage it. When an organization uses cloud computing, IT staff is freed up to focus on other important tasks besides backup maintenance.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Cybersecurity issues.&lt;/b&gt;&amp;nbsp;If a cyber attack hits the primary data center, an organization should&amp;nbsp;&lt;a href="https://www.techtarget.com/searchdatabackup/feature/How-does-off-site-backup-stack-up-against-cloud-backup"&gt;use an off-site backup&lt;/a&gt;&amp;nbsp;-- whether it be on tape or in the cloud -- to make sure the restore is clean.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Disaster recovery issues.&lt;/b&gt;&amp;nbsp;If there's a disaster at the primary site, a local backup will not be helpful. However, if your organization has moved tapes off-site, those backups are valuable for disaster recovery.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="Bottom line: Which should you choose?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Bottom line: Which should you choose?&lt;/h2&gt;
 &lt;p&gt;When your organization analyzes cloud backup vs. local backup, consider all these positives and negatives and address the specific needs of the business.&lt;/p&gt;
 &lt;p&gt;Cloud backup clearly continues to gain traction in the market, and there are many options for businesses of any size. There are numerous reported cases of businesses ditching their legacy data backup platforms for a cloud-based product. However, the opposite is also true: Some organizations are choosing to &lt;a href="https://www.techtarget.com/searchdatabackup/tip/Is-cloud-backup-repatriation-right-for-your-organization"&gt;repatriate cloud backups&lt;/a&gt; back on-site.&lt;/p&gt;
 &lt;p&gt;Though not to the extent of&amp;nbsp;&lt;a href="https://www.techtarget.com/searchdatabackup/feature/Top-20-cloud-backup-services-for-2019"&gt;cloud backup products&lt;/a&gt;, local backup options are evolving as well. If you need a certain size of hardware for your data center, you can probably find it.&lt;/p&gt;
 &lt;p&gt;In many cases, and if the budget and resources are adequate, a hybrid backup approach is appropriate. This combination of cloud and local backup provides strong data protection. &amp;nbsp;&lt;/p&gt;
 &lt;p&gt;Make sure you carefully assess your organization's backup and recovery needs, research potential products and make a careful, informed decision about your backup platform. This includes consideration of data retention and recovery needs. The survival of your business could depend on it.&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Paul Crocetti is editorial director of Informa TechTarget's Infrastructure sites, which include SearchStorage, SearchDataCenter and SearchITOperations. Since starting at then-TechTarget in 2015, he has also served as editor on the SearchStorage, SearchDataBackup and SearchDisasterRecovery sites.&lt;/i&gt;&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Stephen J. Bigelow, senior technology editor at TechTarget, has more than 30 years of technical writing experience in the PC and technology industry.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>Cloud vs. local backup is an important discussion for IT leaders today. The cloud backup market is soaring, but traditional local backups also have much to offer.</description>
            <image>https://cdn.ttgtmedia.com/visuals/searchVMware/cloud/vmware_article_004.jpg</image>
            <link>https://www.techtarget.com/searchdatabackup/feature/Cloud-backup-vs-local-traditional-backup-advantages-disadvantages</link>
            <pubDate>Thu, 09 Apr 2026 00:00:00 GMT</pubDate>
            <title>Cloud vs. local backup: Which is right for your organization?</title>
        </item>
        <item>
            <body>&lt;p&gt;Securely sharing and synchronizing files across systems is a cornerstone of enterprise IT. Billions of transfers occur daily, involving files of all types, sizes and structures. Because legacy file transfer mechanisms lack built-in security features, organizations use secure file transfer services to ensure their data remains protected as it moves from point A to point B.&lt;/p&gt; 
&lt;p&gt;Let's dig deeper into secure file transfer services, leading tools on the market and how to choose the best option for your organization.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="How secure file transfer works"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;How secure file transfer works&lt;/h2&gt;
 &lt;p&gt;Secure file transfer services all have a common approach to protecting files: &lt;a href="https://www.techtarget.com/searchsecurity/definition/access-control"&gt;access control&lt;/a&gt;. How access control is achieved varies widely among products, but the basic idea is a shared secret between the sender and the recipient -- a hard-to-guess URL transferred via email, a password or integration with an enterprise &lt;a href="https://www.techtarget.com/searchsecurity/definition/identity-access-management-IAM-system"&gt;identity and access management&lt;/a&gt; system, for instance. This shared secret encrypts the file before transfer, and the recipient's computer uses the shared secret to decrypt the file.&lt;/p&gt;
 &lt;p&gt;To satisfy security requirements of today's enterprises, secure file transfer services need a two-pronged approach:&lt;/p&gt;
 &lt;ol class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Secure data. &lt;/b&gt;The data should have embedded security. &lt;a href="https://www.techtarget.com/searchsecurity/definition/encryption"&gt;Encryption&lt;/a&gt;, for example, ensures no one else on a network can access, read or modify the contents of a file as it moves between systems.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Secure delivery. &lt;/b&gt;Secure file transfer involves reliable delivery, such as &lt;a href="https://www.techtarget.com/searchnetworking/definition/TCP-IP"&gt;TCP/IP&lt;/a&gt;. Secure file transfer services use a variety of protocols and standards, ranging from Secure FTP (&lt;a href="https://www.techtarget.com/searchcontentmanagement/definition/Secure-File-Transfer-Protocol-SSH-File-Transfer-Protocol"&gt;SFTP&lt;/a&gt;) and Advanced Encryption Standard (&lt;a href="https://www.techtarget.com/searchsecurity/definition/Advanced-Encryption-Standard"&gt;AES&lt;/a&gt;) to vendor-specific proprietary protocols.&lt;/li&gt; 
 &lt;/ol&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="Pros and cons of secure file transfer services"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Pros and cons of secure file transfer services&lt;/h2&gt;
 &lt;p&gt;Secure file transfer services provide strong security for files and other data, and support compliance requirements such as &lt;a href="https://www.techtarget.com/searchdatabackup/feature/Principles-of-the-GDPR-explained"&gt;GDPR&lt;/a&gt; and &lt;a href="https://www.techtarget.com/healthtechsecurity/feature/What-is-the-HIPAA-Privacy-Rule"&gt;HIPAA&lt;/a&gt;. Services are highly scalable and reliable, making collaboration smoother.&lt;/p&gt;
 &lt;p&gt;The downside, however, is the technology's cost and complexity. Security teams often find the service difficult to deploy, experiencing compatibility issues across security protocols and performance issues during large-scale data transfers.&lt;/p&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="Types of secure file transfer services"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Types of secure file transfer services&lt;/h2&gt;
 &lt;p&gt;Basic secure file transfer services, such as those based on Secure Copy Protocol (SCP), have command-line interfaces and are best suited for IT rather than end users. They offer few features and are relatively inexpensive compared to other file transfer systems. Some consider this type of transfer advantageous because the organization maintains full control with no third-party -- e.g., &lt;a href="https://www.techtarget.com/searchcloudcomputing/feature/A-cloud-services-cheat-sheet-for-AWS-Azure-and-Google-Cloud"&gt;cloud provider&lt;/a&gt; -- involvement.&lt;/p&gt;
 &lt;p&gt;Secure file transfer services based on SFTP are typically more feature-rich than those based on SCP. SFTP-based file transfers often have GUIs available, making them easier to use. However, both SCP- and SFTP-based systems lack many of the features of more sophisticated file transfer systems.&lt;/p&gt;
 &lt;p&gt;Originally intended for end-user collaboration, &lt;a href="https://www.techtarget.com/searchstorage/feature/7-cloud-storage-and-file-sharing-services-to-consider"&gt;file hosting services&lt;/a&gt; offer access control and encryption features that enable users to email a link and be allowed secure access to a file hosted on the service.&lt;/p&gt;
 &lt;p&gt;The most advanced type of file transfer platform, managed file transfer (MFT), provides an intermediary system between sender and receiver, such as a dedicated server within the organization's facilities or a cloud-provided service. The file travels from the sender to the MFT repository, where it is strictly protected through access control measures, including encryption of the stored file. Transfer to the recipient from the MFT repository occurs later. This isolates the sender's system from the recipient's system and permits easier monitoring and tracking of repository and transfer usage.&lt;/p&gt;
 &lt;p&gt;Email also provides basic file transfer capabilities and should, therefore, be encrypted for security. Email encryption products support large file transfers via email.&lt;/p&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="Secure file transfer service features"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Secure file transfer service features&lt;/h2&gt;
 &lt;p&gt;Organizations investing in secure file transfer services should consider whether they need advanced features typically available with MFT offerings and, sometimes, from other types of file transfer services.&lt;/p&gt;
 &lt;h3&gt;Auditing&lt;/h3&gt;
 &lt;p&gt;Audit logs provide detailed activity and performance data that organizations can use to demonstrate compliance with data privacy standards and regulations. This is especially important if personally identifiable information, such as financial or health data, is in play.&lt;br&gt;&lt;br&gt;Legacy file transfer methods, such as SCP, have historically lacked auditing features. File hosting services typically offer at least some file transfer auditing capabilities, while most MFT platforms provide comprehensive audit logs.&lt;/p&gt;
 &lt;h3&gt;Automated scheduling&lt;/h3&gt;
 &lt;p&gt;Secure file transfer services offer a range of basic scheduling capabilities. &lt;br&gt;&lt;br&gt;More sophisticated systems can stagger file transfers to reduce demand on bandwidth or processing. By managing resource use, intelligent scheduling can save money and prevent inadvertent service denials.&lt;/p&gt;
 &lt;h3&gt;AI&lt;/h3&gt;
 &lt;p&gt;Many secure file transfer services include AI capabilities that can quickly identify and mitigate security threats before files are affected. AI can enhance the functionality of encryption algorithms and security key management, preventing many cyberattacks. Predictive capabilities analyze performance data to reduce downtime. AI also improves the organization's ability to comply with critical standards and regulations.&lt;/p&gt;
&lt;/section&gt;        
&lt;section class="section main-article-chapter" data-menu-title="Enterprise-level secure file transfer services"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Enterprise-level secure file transfer services&lt;/h2&gt;
 &lt;p&gt;The following enterprise-level secure file transfer services have a variety of features, ranging from basic to advanced, and some offer free demos as part of their pricing plans.&lt;/p&gt;
 &lt;p&gt;The tools profiled in this article were selected based on market research. Each has a sizable customer base, is under active development, and has numerous publicly available user reviews from verified purchasers. This list is organized alphabetically.&lt;/p&gt;
 &lt;h3&gt;Box Business&lt;/h3&gt;
 &lt;p&gt;&lt;b&gt;Type:&lt;/b&gt; File hosting service with optional AI-powered features&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Delivery:&lt;/b&gt; SaaS. Accessible via a browser-based UI; optional local application download for desktops and mobile devices.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;OSes:&lt;/b&gt; Android, iOS, macOS, Windows&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Protocols and standards supported:&lt;/b&gt; &lt;a href="https://www.techtarget.com/searchsecurity/definition/Transport-Layer-Security-TLS"&gt;TLS&lt;/a&gt;, passive FTP/FTP Secure/Explicit FTPS (Business and Enterprise tiers only; vendor does not recommend FTP/FTPS/FTPES as primary access method). Active FTP is not supported.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Features:&lt;/b&gt; Active Directory (&lt;a href="https://www.techtarget.com/searchwindowsserver/definition/Active-Directory"&gt;AD&lt;/a&gt;) and single sign-on (&lt;a href="https://www.techtarget.com/searchsecurity/definition/single-sign-on"&gt;SSO&lt;/a&gt;); audit logging; cloud storage; enterprise-friendly design; file synchronization and versioning; &lt;a href="https://www.techtarget.com/searchhealthit/definition/HIPAA"&gt;HIPAA&lt;/a&gt; and FedRAMP compliance (Enterprise tier); integrations with Microsoft 365, Google Workspace, Slack and 1,500+ other enterprise apps; threat detection (Enterprise Plus tier); workflow automation.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Max file size:&lt;/b&gt; 150 GB (Enterprise Plus tier)&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Pricing options:&lt;/b&gt; Multiple plans are available for individuals and businesses. Basic individual plans range from free to $15/user/month; business plans start at $15/user/month up to $50/user/month.&lt;/p&gt;
 &lt;h3&gt;IBM Sterling Secure File Transfer&lt;/h3&gt;
 &lt;p&gt;&lt;b&gt;Type:&lt;/b&gt; MFT&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Delivery:&lt;/b&gt; Enterprise software supporting traditional installation and containerized deployment; on-premises, cloud or hybrid.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;OSes:&lt;/b&gt; &lt;a href="https://www.techtarget.com/searchdatacenter/definition/Linux-operating-system"&gt;Linux&lt;/a&gt;, Linux on IBM Z, macOS, multiple &lt;a href="https://www.techtarget.com/searchdatacenter/definition/Unix"&gt;Unix&lt;/a&gt; platforms, Windows&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Protocols and standards supported:&lt;/b&gt; &lt;a href="https://docs.oracle.com/cd/E19398-01/820-1228/agfat/index.html" target="_blank" rel="noopener"&gt;Applicability Statement 2&lt;/a&gt; (AS2), FTP, FTPS, &lt;a href="https://www.odette.org/oftp2" target="_blank" rel="noopener"&gt;Odette FTP 2&lt;/a&gt; (OFTP2), &lt;a href="https://www.techtarget.com/searchsecurity/definition/Pretty-Good-Privacy"&gt;Pretty Good Privacy&lt;/a&gt;, SFTP&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Features:&lt;/b&gt; Automated inbound and outbound file transfers that work across protocols; file synchronization; intelligent, centralized management platform; RESTful APIs that support third-party integrations; scalable offering that supports a wide range of B2B file transfer requirements, for small businesses, midsize businesses and large enterprises. Key components include File Gateway, Connect:Direct, Control Center and Secure Proxy.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Max file size:&lt;/b&gt; Depends on the protocol: AS2 (2 GB), FTP (10 GB), FTPS (10 GB), OFTP2 (5 GB), SFTP (10 GB)&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Pricing options:&lt;/b&gt; Monthly and perpetual licensing options are available for three packages: Essentials, Standard and Premium. Contact IBM for pricing.&lt;/p&gt;
 &lt;h3&gt;pCloud Business&lt;/h3&gt;
 &lt;p&gt;&lt;b&gt;Type:&lt;/b&gt; Cloud-based file hosting service&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Delivery:&lt;/b&gt; SaaS. Accessible via a browser-based UI; optional local application download for desktops and mobile devices.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;OSes:&lt;/b&gt; Android, iOS, Linux, macOS, Windows&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Protocols and standards supported:&lt;/b&gt; TLS/SSL, AES-256; optional additional encryption uses 4,096-bit RSA for users' private keys and 256-bit AES for per-file and per-folder keys&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Features:&lt;/b&gt; Activity logging; cost-effective; support for enterprise-scale requirements; optional zero-knowledge client-side encryption; option to encrypt or not encrypt individual files; file sharing, synchronization and versioning; data backups; digital asset management via pCloud Branding; team-by-team and user-by-user access control.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Max file size:&lt;/b&gt; No limit&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Pricing options:&lt;/b&gt; pCloud Business offers monthly and annual licenses at $9.99/user/month and $7.99/user/month; Business Pro is available monthly and annually at $14.98 per user/month and $11.98/user/month. 30-day free trial available.&lt;/p&gt;
 &lt;h3&gt;Peer Global File Service&lt;/h3&gt;
 &lt;p&gt;&lt;b&gt;Type:&lt;/b&gt; Cloud-based distributed file management service&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Delivery:&lt;/b&gt; Software platform. Management hub is accessible via local application or browser. Software installation required for both management hub and agents.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;OSes:&lt;/b&gt; Linux, Windows&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Management hub -- Linux or Windows dedicated server&lt;/li&gt; 
  &lt;li&gt;Agents -- Windows file servers&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;&lt;b&gt;Protocols and standards supported:&lt;/b&gt; TCP/IP, TLS/SSL&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Features:&lt;/b&gt; Real-time and scheduled file replication; support for multisite file sharing across cloud, hybrid and on-premises environments; edge caching; integrations with all major storage platforms; central management console; comprehensive activity logs; AD integration; active-active file synchronization;&amp;nbsp; anomaly detection.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Max file size:&lt;/b&gt; No limit&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Pricing options:&lt;/b&gt; Custom pricing; contact Peer Software for more information.&lt;/p&gt;
 &lt;h3&gt;Progress ShareFile&lt;/h3&gt;
 &lt;p&gt;&lt;b&gt;Type:&lt;/b&gt; Secure file sharing and content collaboration platform, with some MFT-like capabilities&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Delivery:&lt;/b&gt; SaaS. Accessible via a browser-based UI; optional local application download for desktops and mobile devices.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;OSes:&lt;/b&gt; Android, iOS, macOS, Windows&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Protocols and standards supported:&lt;/b&gt; TLS/&lt;a href="https://www.techtarget.com/searchsecurity/definition/Secure-Sockets-Layer-SSL"&gt;SSL&lt;/a&gt;, FTP/FTPS.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Features:&lt;/b&gt; AD integration; SSO; activity logging; advanced security features, including remote device lock and wipe options; &lt;a href="https://www.techtarget.com/searchcloudcomputing/definition/cloud-access-security-broker-CASB"&gt;cloud access security broker&lt;/a&gt; integration for &lt;a href="https://www.techtarget.com/whatis/definition/data-loss-prevention-DLP"&gt;data loss prevention&lt;/a&gt;; centralized management platform; encrypted email (Advanced+ tiers); enterprise-friendly design; file synchronization and versioning; integration with Microsoft 365; HIPAA compliance configuration (Premium tier); plugins for Gmail and Outlook (Advanced+ tiers).&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Max file size:&lt;/b&gt; 100 GB (Advanced and Premium tiers)&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Pricing options:&lt;/b&gt; Pricing starts at $16/user/month and ranges up to $67.50/user/month&lt;/p&gt;
 &lt;h3&gt;Resilio Connect&lt;/h3&gt;
 &lt;p&gt;&lt;b&gt;Type:&lt;/b&gt; Peer-to-peer (P2P) file transfer and synchronization service&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Delivery:&lt;/b&gt; Software platform. Software installation required for both management console and endpoint agents. Browser-based UI.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;OSes:&lt;/b&gt;&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Management console -- &lt;a href="https://www.techtarget.com/searchdatacenter/tip/Discover-the-three-major-CentOS-clones"&gt;CentOS&lt;/a&gt;, Linux, Ubuntu, Windows&lt;/li&gt; 
  &lt;li&gt;Agents -- Android, FreeBSD, Linux, macOS, Windows&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;&lt;b&gt;Protocols and standards supported:&lt;/b&gt; Proprietary P2P protocol based on BitTorrent&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Features:&lt;/b&gt; Audit logging; support for transferring or replicating millions of files across multiple locations and diverse networks and systems; automated, intelligent scheduling; central management console; integrations with other enterprise IT tools; file sharing, synchronization and versioning; job prioritization; cloud storage support; remote endpoint agent upgrades; effective for large, multilocation enterprises; can scale to support thousands of endpoints and millions of files.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Max file size:&lt;/b&gt; No limit&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Pricing options:&lt;/b&gt; Custom pricing; contact Resilio for more information.&lt;/p&gt;
 &lt;h3&gt;Tresorit SecureCloud for Business&lt;/h3&gt;
 &lt;p&gt;&lt;b&gt;Type:&lt;/b&gt; Cloud storage and file hosting service&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Delivery:&lt;/b&gt; SaaS. Accessible via desktop application, mobile application and browser-based UI.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;OSes:&lt;/b&gt; Android, iOS, Linux, macOS, Windows&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Protocols and standards supported:&lt;/b&gt; TLS; AES-256; clientside encryption using a zeroknowledge model&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Features:&lt;/b&gt; Zero-knowledge end-to-end encryption (&lt;a href="https://www.techtarget.com/searchsecurity/definition/end-to-end-encryption-E2EE"&gt;E2EE&lt;/a&gt;), including browser-based access; Gmail and Outlook integrations; enterprise application support; file synchronizing and versioning; encrypted cloud storage; compliant with HIPAA and GDPR (Business and Enterprise tiers).&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Max file size:&lt;/b&gt; 15 GB (Business tier), 10 GB (Professional tier) 20 GB (Enterprise tier)&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Pricing options:&lt;/b&gt; Tresorit offers a 14-day free trial. Licenses are available monthly and annually: Business $24/user/month or $19/user/month billed annually, Professional $33.99/user/month or $27.49/user/month billed annually. Custom enterprise-level pricing is also available; contact Tresorit for more information.&lt;/p&gt;
 &lt;p&gt;Tresorit also offers a free, standalone file transfer app, Tresorit Send, which includes E2EE. Users can upload up to 100 files at a time -- max 5 GB -- and shared each file 10 times. Shared files are available for a maximum of seven days.&lt;/p&gt;
&lt;/section&gt;                                                              
&lt;section class="section main-article-chapter" data-menu-title="How to choose a secure file transfer service"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;How to choose a secure file transfer service&lt;/h2&gt;
 &lt;p&gt;Here's some helpful guidance on selecting the appropriate system for your organization's needs:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Review business requirements.&lt;/b&gt; Data management teams should periodically discuss technology requirements with business unit leaders and senior management to identify trends and initiatives.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Review historical performance data.&lt;/b&gt; Analyze data from existing file transfer systems to flag metrics and identify trends that might inform the selection process.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Prepare forecasts of file transfer and other IT trends.&lt;/b&gt; Use historical performance data to generate forecasts, which can be invaluable when preparing for a change in a major IT system. Compelling forecast data can help justify future investments.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Discuss secure file transfer services with other IT leaders.&lt;/b&gt; Speak with IT leaders in other organizations to gauge their experience with other file transfer services.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Research and examine available systems.&lt;/b&gt; Vet suitable file transfer system candidates, including current vendors.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Prepare a request for proposal.&lt;/b&gt; If accepting competitive bids, prepare a formal RFP that specifies the organization's current file transfer activities, plus short-, medium- and long-term needs. The RFP should include the requirements for a service-level agreement.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Send out the RFP and consider a bidders' conference.&lt;/b&gt; It can be useful to gather bidders in person or virtually to discuss the RFP and understand service and support models.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Select the best product and initiate a project plan.&lt;/b&gt; Once the system has been selected, prepare a project plan to facilitate installation, testing, acceptance and rollout.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Test before official rollout.&lt;/b&gt; A pilot phase ensures the new system performs as stated and that users are comfortable with it.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Organize and conduct user training.&lt;/b&gt; Working with the vendor, prepare and deliver training to all employees.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;Use the &lt;a href="https://www.techtarget.com/searchsoftwarequality/definition/software-development-life-cycle-SDLC"&gt;software development lifecycle&lt;/a&gt; as a framework for selecting and implementing a new file transfer system. Once the system is in production, set regular review and audit times and brief management on the findings.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;&lt;i&gt;Paul Kirvan, FBCI, CISA, is an independent consultant and technical writer with more than 35 years of experience in business continuity, disaster recovery, resilience, cybersecurity, GRC, telecom and technical writing.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>With so many options, finding the best secure file transfer service can feel daunting. Discover top tools and what you need to make the right decision for your business.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/folder-files11.jpg</image>
            <link>https://www.techtarget.com/searchsecurity/tip/8-secure-file-transfer-services-for-the-enterprise</link>
            <pubDate>Thu, 19 Mar 2026 15:16:00 GMT</pubDate>
            <title>Secure file transfer services: Types, tools and selection tips</title>
        </item>
        <item>
            <body>&lt;p&gt;Businesses are migrating workloads to the public cloud and implementing private clouds in-house. As these forms of cloud computing continue to expand, large and small businesses are focused on a&amp;nbsp;&lt;a href="https://www.techtarget.com/searchcloudcomputing/definition/hybrid-cloud"&gt;hybrid cloud&lt;/a&gt;&amp;nbsp;strategy to bridge the two models and form a hybrid cloud environment to support ever-more complex computing demands, such as AI and data sovereignty.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="What is hybrid cloud?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;What is hybrid cloud?&lt;/h2&gt;
 &lt;p&gt;A hybrid cloud is a logical construct that establishes an operational connection between a&amp;nbsp;&lt;a href="https://www.techtarget.com/searchcloudcomputing/definition/private-cloud"&gt;private cloud&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a href="https://www.techtarget.com/searchcloudcomputing/definition/public-cloud"&gt;public cloud&lt;/a&gt;. Typically, an individual business builds and operates a private cloud intended solely for its own benefit. The cloud might be implemented within the local data center or provided as a third-party service.&lt;/p&gt;
 &lt;p&gt;A public cloud is typically a&amp;nbsp;major multi-tenant cloud provider,&amp;nbsp;such as Amazon Web Services (&lt;a href="https://www.techtarget.com/searchaws/definition/Amazon-Web-Services"&gt;AWS&lt;/a&gt;), Microsoft &lt;a href="https://www.techtarget.com/searchcloudcomputing/definition/Windows-Azure"&gt;Azure&lt;/a&gt; or &lt;a href="https://www.techtarget.com/searchcloudcomputing/definition/Google-Cloud-Platform"&gt;Google Cloud&lt;/a&gt;,&amp;nbsp;as well as countless other SaaS providers. A hybrid cloud exists when an operational relationship is established between a public and private cloud to create a single, ubiquitous, interoperable logical cloud entity.&lt;/p&gt;
 &lt;p&gt;In more practical terms, a hybrid cloud is an amalgamation of technologies that include an on-premises data center, in-house or third-party private cloud and public cloud services. These technologies are connected through a&amp;nbsp;&lt;a href="https://www.techtarget.com/searchnetworking/definition/WAN-wide-area-network"&gt;WAN&lt;/a&gt;&amp;nbsp;and integrated through orchestration techniques to move data and&amp;nbsp;&lt;a href="https://www.techtarget.com/searchdatacenter/definition/workload"&gt;workloads&lt;/a&gt;&amp;nbsp;seamlessly between private infrastructure and public clouds as computing needs or cost models change.&lt;/p&gt;
 &lt;p&gt;Ideally, a hybrid cloud provides businesses with competitive advantages, such as greater flexibility, as well as alternatives for workload deployment without unwanted tradeoffs, such as migrating traditional VM workloads to cloud instances or developing cloud-native applications tied to a specific provider's services.&lt;/p&gt;
 &lt;h3&gt;Why hybrid clouds can be challenging to build and maintain&lt;/h3&gt;
 &lt;p&gt;Enterprises have no direct control over the public cloud, so they must architect a private cloud to be compatible with the intended public cloud -- or even multiple clouds. Compatibility includes suitable compute, storage and networking hardware, along with compatible virtualization and private infrastructure software, such as&amp;nbsp;&lt;a href="https://www.techtarget.com/searchcloudcomputing/definition/OpenStack"&gt;OpenStack&lt;/a&gt;, to provide a desired array of private cloud services, network services, enterprise workloads and so on. This setup requires the substantial expertise of enterprise cloud architects and engineers.&lt;/p&gt;
 &lt;p&gt;As an alternative, some private clouds rely on predesigned infrastructure platforms provided by the public cloud provider. Examples include Azure Stack, Azure Arc, AWS Outposts and Google Anthos. Once deployed in a private cloud setting, these platforms offer a native interconnection to the broader public cloud -- Azure, AWS or Google -- to provide a faster and more convenient path to a hybrid cloud environment.&lt;/p&gt;
 &lt;p&gt;The most critical consideration is implementing a private cloud software stack compatible with the target public cloud's APIs and services. Without this compatibility, workloads and data can't move seamlessly from private to public clouds and back.&lt;/p&gt;
&lt;/section&gt;         
&lt;section class="section main-article-chapter" data-menu-title="What are the benefits of a hybrid cloud?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;What are the benefits of a hybrid cloud?&lt;/h2&gt;
 &lt;p&gt;Even though there's considerable investment and effort involved, these eight main hybrid cloud benefits make hybrid cloud architecture compelling for many enterprises.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/hybrid_clouds_benefits-f.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/hybrid_clouds_benefits-f_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/hybrid_clouds_benefits-f_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/hybrid_clouds_benefits-f.png 1280w" alt="Chart showing eight benefits of hybrid cloud." height="189" width="559"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;These eight benefits make building a hybrid cloud infrastructure worthwhile for businesses.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;h3&gt;1. Cost control&lt;/h3&gt;
 &lt;p&gt;A business must be prudent about the workloads and services that run in its private infrastructure. A private cloud is typically deployed with an on-premises data center infrastructure that the enterprise controls and operates, requiring a significant investment of capital, equipment and talent to deploy and maintain. Although a private cloud can parse and provision local resources in a cloud-like manner, its infrastructure is still relatively limited compared to the vast global infrastructure of a public cloud provider.&lt;/p&gt;
 &lt;p&gt;An enterprise can mitigate costs with a&amp;nbsp;&lt;a href="https://www.techtarget.com/searchcloudcomputing/tip/Review-these-hybrid-cloud-connectivity-best-practices"&gt;connection between its private cloud and a public cloud&lt;/a&gt;. When local demand stresses capacity, the business draws upon additional public cloud resources to help smooth those spikes in demand. Similarly, the public cloud suits temporary, experimental or general-purpose workloads the company doesn't want to source, set up and manage in-house, such as disaster recovery. It's best to use finite private cloud resources to host sovereign or critical workloads and data -- or simply run workloads where the costs are lowest.&lt;/p&gt;
 &lt;p&gt;Public cloud resources and services can also reduce hardware costs within an on-premises data center. For example, a business that uses a server and storage within a public cloud doesn't purchase or maintain that server locally. The public cloud provider shoulders those costs.&lt;/p&gt;
 &lt;p&gt;The cost benefits of hybrid cloud also provide clarity about where the money goes. A hybrid cloud can make it easy to divide IT consumption into capital and operational costs. Enterprises can use tools and practices, such as FinOps, to monitor cloud usage; obtain detailed reports on utilization by department, manager, workload or other criteria; and quantify the costs of cloud services for closer inspection and oversight.&lt;/p&gt;
 &lt;h3&gt;2. Flexibility and scalability&lt;/h3&gt;
 &lt;p&gt;Flexibility is a core premise of cloud computing. A private cloud provides some provisioning and scaling agility, but the resources available in a physical data center are still limited by the individual organization's budget and capabilities. In contrast, public cloud users can immediately deploy compute and storage instances -- as well as related services -- globally without resource constraints. But &lt;a href="https://www.techtarget.com/searchcloudcomputing/tip/Plan-for-repatriation-on-day-one-with-a-hybrid-cloud-strategy"&gt;expect at least some migration preparation&lt;/a&gt; work to move a local workload from private infrastructure to the public cloud or from a public cloud back to the private cloud.&lt;/p&gt;
 &lt;p&gt;Consistency is one of the main benefits of hybrid cloud. It's easier to create, shift and scale workloads and resources if the private cloud offers instance types and services similar to those available in the chosen public cloud. This consistency enables enterprises to provision and use private cloud resources when it's appropriate and cost-effective, draw upon additional resources from the public cloud when necessary, and then release those additional resources in the cloud when demand or needs shift.&lt;/p&gt;
 &lt;h3&gt;3. Security&lt;/h3&gt;
 &lt;p&gt;Security is a core focus for many enterprise IT teams. Data and the workloads that access it are vital business assets. Traditionally, this requires a strong level of control over the IT infrastructure and its operation.&lt;/p&gt;
 &lt;p&gt;A main security concern with public cloud is that the infrastructure is the exclusive property of the cloud provider, and its infrastructure is typically &lt;i&gt;multi-tenant&lt;/i&gt;, or shared among various users. The cloud user can't see or control the entire cloud infrastructure. Additionally, the cloud provider takes on responsibilities to secure users' environments in the cloud but is rarely responsible when a breach or other malicious activity occurs. Security responsibilities are shared between cloud users and providers -- a relationship typically referred to as the &lt;i&gt;shared responsibility mode&lt;/i&gt;l.&lt;/p&gt;
 &lt;p&gt;In many cases, the best way to protect data is to&amp;nbsp;&lt;a href="https://www.techtarget.com/searchcloudcomputing/tip/Evaluate-on-premises-vs-cloud-computing-pros-and-cons"&gt;keep it on-premises&lt;/a&gt;. The most sensitive data and critical workloads stay within the owned data center on a private infrastructure where the organization's IT staff maintains and safeguards the assets. With a combined public and private environment, enterprises gain some common hybrid cloud oversight. Best practices and tools, such as Trend Micro Deep Security, McAfee hybrid cloud security products and IBM hybrid cloud infrastructure, can help organizations monitor, discover and report&amp;nbsp;security issues across hybrid cloud environments.&lt;/p&gt;
 &lt;h3&gt;4. Compliance&lt;/h3&gt;
 &lt;p&gt;One advantage of public cloud is its global reach and abundant nature. Ideally, networking, storage and computing technologies support most workload operations from data centers located almost anywhere, even at the network edge. It should not matter where a workload and data reside in the public cloud provider's fleet of data centers. But geopolitical boundaries can come into play, with&amp;nbsp;regulatory limitations on where companies store data&amp;nbsp;-- a concept called&amp;nbsp;&lt;i&gt;&lt;a href="https://www.techtarget.com/searchcloudcomputing/tip/A-data-sovereignty-primer-for-cloud-admins"&gt;data sovereignty&lt;/a&gt;&lt;/i&gt; -- and operate computing workloads. That complicates the move to purely public cloud for some multinational organizations.&lt;/p&gt;
 &lt;p&gt;Regulatory compliance presents other challenges, such as protecting and retaining data, which can vary by industry. Regulatory compliance often demands direct control over the storage and processing of sensitive or personally identifiable information. These regulatory demands can often be met with a hybrid cloud infrastructure.&lt;/p&gt;
 &lt;p&gt;With a hybrid cloud, a business can operate sensitive workloads in its private cloud and move data to and from suitable data centers across the public cloud as the regulatory landscape changes or as data and workloads evolve. In a big data processing project, for example, a company can collect personally identifiable customer data in a private cloud, sanitize it in-house and send it to a public cloud application for processing or analysis.&lt;/p&gt;
 &lt;h3&gt;5. Uniformity&lt;/h3&gt;
 &lt;p&gt;Hybrid clouds, in theory, support greater standardization in IT management practices. But in practice, organizations often struggle to create that uniformity. An IT staff doesn't want to assemble and operate a private infrastructure framework, then develop workflows and cobble together services that are hopefully consistent enough with a public cloud provider to make the hybrid setup work. That's a time-consuming, error-prone and expensive endeavor.&lt;/p&gt;
 &lt;p&gt;Public cloud providers have become more sensitive to the importance and benefits of hybrid cloud as well as the challenges of integrating private and public environments. Top cloud providers offer various services that focus on hybrid needs:&lt;/p&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;AWS Outposts&lt;/b&gt; offers capabilities for a hybrid cloud setup based on AWS services.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Microsoft Azure Stack&lt;/b&gt; enables a business to deploy Azure capabilities in on-premises systems.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Google Anthos&lt;/b&gt; doesn't directly extend Google Cloud Platform services on-premises; it uses Kubernetes, containers and plugins to deploy services and workloads in different locations.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;VMware Cloud on AWS&lt;/b&gt; is a partnership designed so users can integrate their on-premises VMware environments with Amazon's cloud.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;These offerings provide prepackaged hardware and software stacks that can be easily deployed within the users' data center to create a private cloud that's already interoperable with the providers' broader public cloud&amp;nbsp;platform. This saves businesses considerable time, expertise and investment.&lt;/p&gt;
 &lt;p&gt;As public cloud providers embrace hybrid cloud management, businesses don't need to construct a complete environment top to bottom. Instead, they simply extend the virtualized data center into familiar cloud services. The disadvantage here is vendor lock-in; enterprise users might experience challenges employing multi-cloud hybrid paradigms or face stark limitations when building or configuring their own local cloud infrastructure.&lt;/p&gt;
 &lt;h3&gt;6. Agility&lt;/h3&gt;
 &lt;p&gt;Clouds are designed to make provisioning and scaling much faster than traditional physical or virtualized environments. This "on-demand-for-as-long-as-it's-needed" agility played a huge role in public cloud adoption. Private clouds seek to replicate this kind of agile behavior.&lt;/p&gt;
 &lt;p&gt;When public and private clouds are merged into a hybrid cloud, that speed and agility take on an entirely new meaning. Businesses can stand up new workloads and data sets on demand and make strategic choices about where to deploy those resources across the hybrid cloud depending on factors such as cost, scale and performance.&lt;/p&gt;
 &lt;p&gt;A business deploying an application in the private cloud, for example, could scale up the application by deploying a second iteration of the workload in a public cloud data center located within a different geopolitical area that can provide better performance for local users while maintaining data sovereignty requirements for all parties involved. Such goals are almost impossible with traditional data centers and workloads.&lt;/p&gt;
 &lt;div class="youtube-iframe-container"&gt;
  &lt;iframe id="ytplayer-0" src="https://www.youtube.com/embed/Zae3jApGq-U?autoplay=0&amp;amp;modestbranding=1&amp;amp;rel=0&amp;amp;widget_referrer=null&amp;amp;enablejsapi=1&amp;amp;origin=https://www.techtarget.com" type="text/html" height="360" width="640" frameborder="0"&gt;&lt;/iframe&gt;
 &lt;/div&gt;
 &lt;h3&gt;7. Continuity and risk management&lt;/h3&gt;
 &lt;p&gt;Business continuity -- the ability to continue functioning during disruption -- is&amp;nbsp;&lt;a href="https://www.techtarget.com/searchdisasterrecovery/tip/Business-continuity-maturity-model-An-at-a-glance-guide"&gt;often a primary element of regulatory compliance&lt;/a&gt;. Another way that a hybrid cloud enhances business continuity is by supporting application, data and disaster recovery tasks to protect against system failures, security issues and physical disasters, such as fires, earthquakes and acts of war.&lt;/p&gt;
 &lt;p&gt;A business, for instance, could replicate a critical workload's data from a local application to a public cloud, ensuring that the data remains available or can be restored in the event of data loss at the application. In a more sophisticated example, a business might scale or migrate a busy application from its private cloud to the public cloud to accommodate a spike in user traffic. Such tactics are ideally suited to hybrid cloud environments and can avert workload performance problems and disruptions, further improving UX.&lt;/p&gt;
 &lt;p&gt;Risk management is another vital consideration. All enterprise applications and data resources carry some risk in terms of access, security, performance, and reliability. Hybrid clouds give businesses the control and agility needed to seamlessly locate applications and data according to changing business and technology needs.&lt;/p&gt;
 &lt;p&gt;A hybrid cloud lets an enterprise decide where to locate its applications and data, and how to best provision the required resources and services to achieve the most desirable outcome for the business and its application users. For example, private and public clouds can implement strong security services, such as authentication and authorization, to ensure only appropriate employees or partners can access data.&lt;/p&gt;
 &lt;h3&gt;8. Promotes innovation&lt;/h3&gt;
 &lt;p&gt;Recent years have seen a strong emphasis on cloud computing as a driver of business innovation. The underlying idea behind "innovation" is the use of technology to create new opportunities. In this case, hybrid cloud computing can enable an enterprise to use it in ways that enhance business efficiency, manage costs, implement regulatory frameworks, and even drive new revenue.&lt;/p&gt;
 &lt;p&gt;One example of this innovation is in machine learning (ML) and AI projects. AI platforms are appearing across industries, and it's commonplace for a modern enterprise to deploy several AI platforms -- often while refining and developing others. But AI platforms are particularly challenging in their infrastructure requirements. ML and AI demand considerable computing power, especially when training vast data sets.&lt;/p&gt;
 &lt;p&gt;Today, an enterprise can deploy an AI platform in a public cloud, using the cloud's enormous infrastructure for training and testing. It can then migrate that trained platform back to the private cloud for production deployment, where it can control and manage the platform locally. In this context, cloud computing is a &lt;a target="_blank" href="https://aibusiness.com/cloud-computing/the-role-of-cloud-infrastructure-in-unlocking-ai-s-potential" rel="noopener"&gt;fundamental enabler of AI innovation&lt;/a&gt;.&lt;/p&gt;
&lt;/section&gt;                                       
&lt;section class="section main-article-chapter" data-menu-title="What are the disadvantages of a hybrid cloud?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;What are the disadvantages of a hybrid cloud?&lt;/h2&gt;
 &lt;p&gt;Although the potential hybrid cloud benefits can be compelling, numerous&amp;nbsp;&lt;a href="https://www.computerweekly.com/news/365535626/Prepare-for-hybrid-cloud-headaches"&gt;hybrid cloud disadvantages need to be considered&lt;/a&gt; -- mainly related to complexity issues.&lt;/p&gt;
 &lt;h3&gt;1. Architectural complexity&lt;/h3&gt;
 &lt;p&gt;Designing and implementing a hybrid cloud is a detailed undertaking and often requires the service of a skilled cloud architect. While the underlying servers, storage and networking hardware can be relatively straightforward, the private infrastructure software stack can be complicated to master. Cloud architects must build resources and services within that private tech stack and understand the intended public cloud so resources and services align and interoperate. That raises the bar for change management as well as software stack patches and upgrades.&lt;/p&gt;
 &lt;p&gt;Ultimately, the key to a successful hybrid cloud is interoperability. A private cloud often must operate in the same ways as its associated public cloud to ensure seamless operation. If a business, for example, chooses to build a private cloud to interoperate with a public cloud, such as AWS, the private cloud must possess some level of compatibility with AWS and its services. As a result, private clouds might be forced to make software and architectural choices that could be difficult or suboptimal for the business. Packaged private clouds, such as AWS Outposts, ease these technical challenges but lock the business further into the provider's architecture.&lt;/p&gt;
 &lt;h3&gt;2. Security complexity&lt;/h3&gt;
 &lt;p&gt;Hybrid clouds can be strikingly difficult to configure and secure. IT staff must implement and manage authentication and security for private -- or local -- workloads and data as well as comprehensive authentication and access control for public -- or global -- cloud resources and services. Security settings for the two realms must remain consistent and complementary, and a change in one cloud might need to be reflected in the other. Oversights, inconsistencies or errors can expose vital data and critical workloads to unauthorized access and loss.&lt;/p&gt;
 &lt;p&gt;Clear security policies and practices will help by defining security settings and standards. Automation can be an essential tool in deploying and enforcing security policies to avoid oversights and human error. Still, security impacts regulatory compliance and requires comprehensive knowledge of private and public cloud architectures to implement, monitor and test thoroughly.&lt;/p&gt;
 &lt;h3&gt;3. Troubleshooting complexity&lt;/h3&gt;
 &lt;p&gt;Problems in a hybrid cloud environment can be troublesome to isolate and mitigate. Administrators rely on detailed logs and tools to identify problems, and the troubleshooting process can vary between private systems and public clouds depending on where the trouble occurs. Efficient troubleshooting can require the services of highly experienced administrators and cloud engineers. For example, a private cloud offers complete visibility into the private infrastructure and software stack, while a public cloud only offers the visibility and control supported by native providers' and third-party tools. Limited visibility might require some public cloud troubleshooting to involve support staff from the public cloud provider.&lt;/p&gt;
 &lt;p&gt;Tools matter. Effective troubleshooting across a hybrid cloud&amp;nbsp;&lt;a href="https://www.techtarget.com/searchcloudcomputing/feature/Top-enterprise-hybrid-cloud-management-tools-to-review"&gt;demands well-integrated tools&lt;/a&gt;&amp;nbsp;that ideally support a single-pane-of-glass approach to enable observability and reporting with actionable alerting, no matter where the issue occurs.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/weighing_hybrid_cloud_connectivity_factors-f.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/weighing_hybrid_cloud_connectivity_factors-f_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/weighing_hybrid_cloud_connectivity_factors-f_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/weighing_hybrid_cloud_connectivity_factors-f.png 1280w" alt="Graphic showing six parameters of hybrid cloud connectivity: bandwidth, latency, availability and reliability, security, costs, and monitoring and reporting." height="426" width="560"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Six key parameters in hybrid cloud connectivity.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;h3&gt;4. Complex cost structures&lt;/h3&gt;
 &lt;p&gt;Cloud cost structures can be notoriously difficult to master. Public cloud costs are stunningly granular, making it difficult to align costs with storage, applications or users. Private cloud costs are much closer to traditional infrastructure, but there are still cost complexities in the integration between public and private clouds, such as the costs of public cloud data exfiltration or the use of API calls. All of these costs can vary with usage.&lt;/p&gt;
 &lt;p&gt;Cloud cost management is often a team sport using highly experienced cross-disciplinary teams engaged in FinOps practices -- plus a suite of cloud cost-monitoring tools to predict costs and then break cloud billing into meaningful business operations.&lt;/p&gt;
&lt;/section&gt;               
&lt;section class="section main-article-chapter" data-menu-title="Hybrid cloud best practices"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Hybrid cloud best practices&lt;/h2&gt;
 &lt;p&gt;Enterprises can adopt several tactics to help mitigate the disadvantages of a hybrid cloud and enhance the success of any hybrid cloud project.&lt;/p&gt;
 &lt;h3&gt;Align goals and start small&lt;/h3&gt;
 &lt;p&gt;Business initiatives fail most often when they are approached with a shortage of time, talent and direction. Organizations new to hybrid cloud technologies should first understand &lt;i&gt;why&lt;/i&gt; a hybrid cloud is needed and objectively consider how such an endeavor aligns with business goals. Overlooking this simple benchmark can doom a costly hybrid cloud project from the start.&lt;/p&gt;
 &lt;p&gt;Next, hybrid clouds can be complex and will require human expertise to implement, refine, scale and manage. There's a huge difference between an IT admin who can deploy a workload in a public cloud versus an experienced engineer who can design and implement a fully realized hybrid cloud. Survey the available talent pool and hire the people who can make that project a success.&lt;/p&gt;
 &lt;p&gt;Finally, start small. The idea is to limit initial investments and demonstrate the business value of a hybrid cloud relative to simpler, more direct opportunities (the "low-hanging fruit"). This proves the technology, builds skills and expertise, enables refinement and optimization, and increases the likelihood of success for more complex or demanding hybrid cloud mechanics.&lt;/p&gt;
 &lt;h3&gt;Understand security&lt;/h3&gt;
 &lt;p&gt;The team responsible for implementing and managing a hybrid cloud environment should master cloud configuration and security. Invest in training and expertise to secure both the private infrastructure and the intended public cloud. Those configurations must work together seamlessly, but the knowledge base to accomplish that can't be gleaned overnight.&lt;/p&gt;
 &lt;p&gt;Some organizations spend considerable time and effort experimenting, developing, and refining proof-of-principle deployments before they architect a deployment for production. Companies should also carefully document and manage security to maintain business and regulatory compliance.&lt;/p&gt;
 &lt;h3&gt;Move workloads with care&lt;/h3&gt;
 &lt;p&gt;A hybrid cloud's flexibility doesn't eliminate the&amp;nbsp;&lt;a href="https://www.techtarget.com/searchcloudcomputing/tip/Five-keys-to-an-effective-hybrid-cloud-migration-strategy"&gt;need for strategic decisions about workload deployment&lt;/a&gt;. Not all workloads are appropriate for each cloud type. Business and regulatory concerns might require that some critical workloads remain in a local data center, while other workloads may be suitable or ideal for public cloud deployment.&lt;/p&gt;
 &lt;p&gt;Organizations must understand where that line is for their own business and industry and make deployment decisions accordingly. Cloud data exfiltration can also pose unexpectedly high costs, so once data is in a public cloud, moving it to a private cloud can be a budget-busting affair.&lt;/p&gt;
 &lt;p&gt;Similarly, not all workloads are suited for all cloud environments, and the costs of moving data sets from the public cloud can quickly become prohibitive. Legacy workloads might still require more traditional local data center infrastructure and management. IT staff must allow for private cloud and traditional data center infrastructure to operate simultaneously.&lt;/p&gt;
 &lt;h3&gt;Use automation and orchestration&lt;/h3&gt;
 &lt;p&gt;Clouds are not intended to be manually controlled entities. Private infrastructure, public clouds and the hybrid clouds created from them depend on substantial automation to implement services and resources as uniform, consistent processes. Automation, when paired with orchestration, performs tasks with little -- if any -- human intervention.&lt;/p&gt;
 &lt;p&gt;For example, clouds are frequently based on container technologies and platforms, such as Docker and Kubernetes. &lt;a href="https://www.techtarget.com/searchcloudcomputing/tip/Ways-to-use-AI-for-cloud-infrastructure-management"&gt;AI is increasingly responsible&lt;/a&gt; for these automation and orchestration tasks, and it should be approached with careful attention to operational efficiency and cost control.&lt;/p&gt;
 &lt;h3&gt;Implement monitoring and observability&lt;/h3&gt;
 &lt;p&gt;The adage "You can't manage what you can't see" is particularly true for hybrid clouds. Organizations depend on a variety of tools within the private cloud and&amp;nbsp;&lt;a target="_blank" href="https://www.gartner.com/reviews/market/cloud-management-tooling" rel="noopener"&gt;tools&lt;/a&gt;&amp;nbsp;supporting the desired public cloud provider to achieve observability across the entire hybrid cloud environment.&lt;/p&gt;
 &lt;p&gt;Comprehensive monitoring is crucial to ensure workload availability, health and reliability as well as to gauge performance, no matter where those assets are deployed. Monitoring and observability provide a sound justification for scaling -- adjusting the costly resources allocated to the workload -- and offer objective measures for troubleshooting when problems arise.&lt;/p&gt;
 &lt;h3&gt;Use encryption&lt;/h3&gt;
 &lt;p&gt;Data is an organization's most valuable asset. Encrypting that data at rest and in flight can help mitigate loss or theft when intruders manage to slip past a security vulnerability. Comprehensive encryption should be standard practice within private cloud and public cloud storage.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Editor's note:&lt;/b&gt; This article was originally published in 2023 and was updated in 2026 to include more information on hybrid cloud.&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Stephen J. Bigelow, senior technology editor at TechTarget, has more than 30 years of technical writing experience in the PC and technology industry.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>Why choose between public cloud and private systems when you can have both? With hybrid cloud, enterprises can address workload requirements, business demands and budgetary needs.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/security_a292905838.jpg</image>
            <link>https://www.techtarget.com/searchcloudcomputing/tip/Top-5-benefits-of-hybrid-cloud</link>
            <pubDate>Tue, 17 Mar 2026 16:45:00 GMT</pubDate>
            <title>Top 8 benefits of hybrid cloud for business</title>
        </item>
        <item>
            <body>&lt;p&gt;To this day, there's no single cloud solution. Cloud technologies have expanded, matured and proliferated to support the most demanding business needs and use cases.&lt;/p&gt; 
&lt;p&gt;The proliferation of cloud technologies is particularly confusing to businesses new to cloud adoption, and they're sometimes baffled by the distinction between&amp;nbsp;&lt;a href="https://www.techtarget.com/searchcloudcomputing/definition/multi-cloud-strategy"&gt;&lt;i&gt;multi-cloud&lt;/i&gt;&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a href="https://www.techtarget.com/searchcloudcomputing/definition/hybrid-cloud"&gt;&lt;i&gt;hybrid cloud&lt;/i&gt;&lt;/a&gt;. Each type of cloud has a distinct definition and purpose.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="What is multi-cloud?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;What is multi-cloud?&lt;/h2&gt;
 &lt;p&gt;Although the public cloud infrastructure and services can be similar among public cloud vendors, public clouds are not directly interchangeable or interoperable. Each public cloud offers a unique set of computing resources and services that are accessed using unique APIs. Every public cloud attempts to be ubiquitous, but differences do exist. And every cloud presents tradeoffs for different business use cases. When a company migrates to the public cloud, that business might eventually adopt a multi-cloud strategy that engages multiple public cloud vendors.&lt;/p&gt;
 &lt;p&gt;A multi-cloud technology strategy involves two or more cloud computing&amp;nbsp;&lt;a href="https://www.techtarget.com/searchcloudcomputing/definition/Cloud-management-platform"&gt;platforms&lt;/a&gt;&amp;nbsp;or cloud vendors to handle various business tasks. The ultimate goal of any multi-cloud strategy is to match the business need with the specific strength of each public cloud. A business might perform some tasks or&amp;nbsp;&lt;a href="https://www.techtarget.com/searchcloudcomputing/tip/Compare-AWS-Azure-and-Google-Cloud-IAM-services"&gt;host certain types of applications&lt;/a&gt;&amp;nbsp;on AWS; another set of tasks, apps and data on&amp;nbsp;Google Cloud&amp;nbsp;Platform (GCP); and yet other tasks on&amp;nbsp;Microsoft Azure&amp;nbsp;-- all while utilizing cloud applications hosted through various third-party SaaS providers.&lt;/p&gt;
 &lt;p&gt;A multi-cloud approach can be extensive and complex, depending on the number of clouds involved and the ways a business consumes each cloud resource or service. For example, a business might employ a public cloud provider's IaaS to host its&amp;nbsp;&lt;a href="https://www.techtarget.com/searchdatacenter/definition/workload"&gt;workloads&lt;/a&gt;. At the same time, it could use specialized SaaS or PaaS providers for business services, such as productivity tools (Microsoft 365), employee expense tracking and reporting (Concur Expense) and so on, where each service is its own cloud.&lt;/p&gt;
 &lt;h3&gt;Benefits of multi-cloud&lt;/h3&gt;
 &lt;p&gt;So, why undertake such complexity? There are compelling reasons why a business might explore a multi-cloud approach, including the following:&lt;/p&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Reducing local infrastructure.&lt;/b&gt;&amp;nbsp;A business outsources some or all its on-premises infrastructure to third-party providers to shed the burdens of hardware, software, maintenance and support -- for example, moving business email from an in-house exchange server to Microsoft Exchange Online.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Using specific services.&lt;/b&gt;&amp;nbsp;Clouds often specialize in ways that complement the provider's business background and strengths. A business, for example, might use one cloud provider to host a test and development workload but use a different cloud provider's more mature artificial intelligence (AI) and machine learning (ML) services.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Managing costs.&lt;/b&gt;&amp;nbsp;Local infrastructure requires a capital investment, no matter how or whether it's used. Cloud resources and services employ a pay-as-you-go model in which costs scale based on actual use. A SaaS platform, for example, might charge based on the number of users (seats), while other cloud services charge based on usage or recurring monthly fees. These costs are well documented by providers, and businesses can see that money is spent cost-effectively. Similarly, a business can opt to shift workloads between multiple clouds as costs -- and potential cost savings -- allow.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Improving resilience and compliance.&lt;/b&gt;&amp;nbsp;A business must run and remain secure in the face of disruption; this is a central tenet of today's regulatory compliance and business continuity environment. A business might deploy a redundant workload in two or more clouds to handle more application traffic and&amp;nbsp;&lt;a href="https://www.techtarget.com/searchdisasterrecovery/tip/When-is-a-change-to-multi-cloud-the-right-resilience-move"&gt;enhance resilience&lt;/a&gt;. If one cloud goes offline, the other cloud can continue to function and support the workload.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Fostering innovation.&lt;/b&gt;&amp;nbsp;Every cloud is different and provides unique strengths and services that other competing providers might not. Adopting a multi-cloud strategy enables a business to engage the unique capabilities of different cloud providers simultaneously rather than facing an undesirable tradeoff of one cloud versus another.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Avoiding cloud vendor lock-in.&lt;/b&gt;&amp;nbsp;Dependency on a third-party service provider can become a vulnerability for any modern enterprise. Changes in costs, services, functionality, support and other factors can render a business relationship difficult, forcing a costly and disruptive shift in cloud strategy. Using multiple public cloud vendors enables in-house staff to develop expertise with multiple clouds simultaneously and can potentially ease disruptions to the business relationship.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Supporting data sovereignty.&lt;/b&gt; As governments recognize the strategic importance of computing resources, the potential vulnerabilities of global interdependence are driving the demands for data and workload sovereignty -- ensuring that data is stored and workloads are operated within established boundaries. Multi-cloud strategies can support these demands through the global footprints of their geographically distributed data centers and availability zones.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/networking-multi_vs_hybrid_cloud.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/networking-multi_vs_hybrid_cloud_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/networking-multi_vs_hybrid_cloud_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/networking-multi_vs_hybrid_cloud.png 1280w" alt="Diagram illustrating hybrid IT vs. hybrid cloud vs. multi-cloud deployment strategies." height="374" width="560"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Enterprises can deploy and manage traditional IT on-premises or integrate with varying levels of cloud services, including hybrid and multi-cloud models.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;h3&gt;Challenges of multi-cloud&lt;/h3&gt;
 &lt;p&gt;The complexities of a multi-cloud approach extend beyond juggling resources, services and third-party providers. Organizations that embrace a multi-cloud environment potentially face some new risks and challenges&amp;nbsp;&lt;a href="https://www.techtarget.com/searchcloudcomputing/tip/Evaluate-on-premises-vs-cloud-computing-pros-and-cons"&gt;rarely posed by on-premises infrastructure&lt;/a&gt;:&lt;/p&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Security complexity.&lt;/b&gt;&amp;nbsp;An organization with multiple cloud providers and environments must grapple with multiple security configurations and authentication mechanisms to ensure user security and the security of sensitive data. It might be impractical to establish a common security configuration or workflow for all cloud providers. Also, there might be a high risk of security vulnerabilities in multi-cloud environments.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Monitoring and management.&lt;/b&gt; Every cloud is different, with unique interfaces, APIs and tools. As such, there is no single unifying standard for cloud monitoring and management. This creates major operational overhead and silos, forcing IT staff to use different platforms for monitoring and management. This often leaves some portions of the multi-cloud environment poorly managed. Observing cloud performance, diagnosing cloud bottlenecks and achieving unified visibility across different cloud environments can be a significant problem.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Regulatory standards.&lt;/b&gt;&amp;nbsp;Although multi-cloud strategies can enhance compliance in areas such as workload resilience, there are other threats to regulatory compliance. These can include&amp;nbsp;improper data storage locations, breaches in data sovereignty regulations or inadequately secured personally identifiable information in one or more cloud provider locations.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Network security.&lt;/b&gt;&amp;nbsp;With workloads and data in clouds, it's unavoidable that sensitive business data traverses a public network, such as the internet. Businesses must take careful precautions to ensure the security of all cloud-related data through encryption, which might be appropriate for data at rest and in flight.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Provider disruption.&lt;/b&gt;&amp;nbsp;A business must consider the implications of network and provider disruption and devise contingency plans. &lt;a href="https://www.techtarget.com/searchcloudcomputing/feature/Cloud-outages-expected-to-be-the-new-normal-in-2026"&gt;Understand the impacts of an internet outage&lt;/a&gt; between the business and provider, a malicious attack on the provider, a deprecation of needed services or even the effects of a provider merger, acquisition or bankruptcy. It might be necessary to find another suitable cloud provider or repatriate the service in-house.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Lack of multi-cloud skills. &lt;/b&gt;Every cloud provider uses unique APIs, resources and pricing structures. This demands the direct intervention of seasoned IT professionals with expertise using multiple cloud platforms, such as AWS, Azure and GCP. It can be even more difficult to find professionals capable of getting multiple clouds to work together effectively.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;h3&gt;Multi-cloud management tools&lt;/h3&gt;
 &lt;p&gt;Any organization with a multi-cloud approach must recognize the resources and services it uses, understand their configurations and monitor their performance.&lt;/p&gt;
 &lt;p&gt;IT teams can use tools to handle multiple clouds from a single interface. These tools support a wide array of cloud platforms, such as AWS and Azure, as well as complementary tools, such as Kubernetes to manage container-based workloads. Multi-cloud management tools also should support strong abstraction, orchestration and automation; handle security, such as identity management and data encryption; control policy governance and compliance; monitor performance of the infrastructure and applications; and help manage costs, often using FinOps-related principles and techniques.&lt;/p&gt;
 &lt;p&gt;There are&amp;nbsp;&lt;a href="https://www.techtarget.com/searchcloudcomputing/tip/Evaluate-these-9-multi-cloud-management-platforms"&gt;numerous tools and platforms currently available&lt;/a&gt;&amp;nbsp;to help a business manage multi-cloud environments. Tools and platforms can also vary greatly in their purpose, benefits and interoperability with existing software toolchains. The following list offers a sampling of varied multi-cloud management tools:&lt;/p&gt;
 &lt;p&gt;&lt;iframe title="Popular multi-cloud management offerings" aria-label="Table" id="datawrapper-chart-MGsCC" src="https://datawrapper.dwcdn.net/MGsCC/1/" scrolling="no" frameborder="0" style="width: 0; min-width: 100% !important; border: none;" height="1963" data-external="1"&gt;&lt;/iframe&gt;&lt;/p&gt;
 &lt;p&gt; &lt;script type="text/javascript"&gt;window.addEventListener("message",function(a){if(void 0!==a.data["datawrapper-height"]){var e=document.querySelectorAll("iframe");for(var t in a.data["datawrapper-height"])for(var r,i=0;r=e[i];i++)if(r.contentWindow===a.source){var d=a.data["datawrapper-height"][t]+"px";r.style.height=d}}});&lt;/script&gt; &lt;/p&gt;
 &lt;p&gt;It's worth noting that many multi-cloud tools might be used in hybrid cloud environments where the private cloud portion of a hybrid cloud is simply treated as just another cloud to be managed. In other cases, hybrid clouds might also employ management tools that are native to the underlying private cloud software stack, such as those available in&amp;nbsp;&lt;a href="https://www.techtarget.com/searchcloudcomputing/definition/OpenStack"&gt;OpenStack&lt;/a&gt;. Similarly, a hybrid cloud might employ vendor-specific tools, such as tools included with AWS Outposts or Google Cloud Anthos.&lt;/p&gt;
&lt;/section&gt;                  
&lt;section class="section main-article-chapter" data-menu-title="What is hybrid cloud?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;What is hybrid cloud?&lt;/h2&gt;
 &lt;p&gt;A hybrid cloud technology strategy merges a private cloud, on-premises infrastructure or both with a public cloud environment to create a single cloud computing environment that combines the best characteristics of local and cloud enterprise computing.&lt;/p&gt;
 &lt;p&gt;A business might create a private cloud to support self-service resource provisioning for software developers or run an important cloud-native application locally. The company can also&amp;nbsp;&lt;a href="https://www.techtarget.com/searchcloudcomputing/tip/Review-these-hybrid-cloud-connectivity-best-practices"&gt;connect that private cloud to a public cloud&lt;/a&gt;&amp;nbsp;to gain extra resources or use specialized services unique to the public cloud provider. It's this integration of private and public clouds that creates a hybrid cloud.&lt;/p&gt;
 &lt;h3&gt;Types of hybrid clouds&lt;/h3&gt;
 &lt;p&gt;The key to a hybrid cloud is uniformity: consistent access and delivery of resources and services that smoothly integrate public and private clouds. There are two popular approaches to establishing a uniform hybrid cloud infrastructure.&lt;/p&gt;
 &lt;p&gt;The traditional approach is to build a private cloud stack by using common platforms, such as OpenStack, that can integrate with a public cloud. These are sometimes referred to &lt;i&gt;heterogeneous&lt;/i&gt;&amp;nbsp;hybrid clouds because the resulting infrastructure includes technologies and platforms from multiple providers.&lt;/p&gt;
 &lt;p&gt;Another approach is to use specialized appliances that contain the software stack and services specifically designed to integrate with the desired public cloud. Examples include Azure Stack, Google Cloud Anthos and AWS Outposts. These are sometimes called &lt;i&gt;homogeneous&lt;/i&gt;&amp;nbsp;hybrid clouds because the resulting hybrid infrastructure incorporates technologies from a single public cloud provider. Homogeneous hybrid clouds are typically quicker and easier to implement than heterogeneous hybrid clouds, and they are well-supported by the cloud provider.&lt;/p&gt;
 &lt;p&gt;An enterprise must consider the costs, performance and management requirements, as well as the technology roadmap, when choosing the hybrid cloud program that best fits its needs.&lt;/p&gt;
 &lt;h3&gt;Benefits of hybrid cloud&lt;/h3&gt;
 &lt;p&gt;Organizations might &lt;a href="https://www.techtarget.com/searchcloudcomputing/tip/Five-keys-to-an-effective-hybrid-cloud-migration-strategy"&gt;add a hybrid cloud strategy&lt;/a&gt;&amp;nbsp;for a variety of reasons, including the following:&lt;/p&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Cost management.&lt;/b&gt;&amp;nbsp;Infrastructure is a sunk cost, and some workloads and data always require local infrastructure. So, a business might choose to build a private cloud with on-premises systems that are fast and flexible. Meanwhile, an organization can relocate other workloads and data to the public cloud as needed to take advantage of the pay-as-you-go or pay-per-use models. Merging these public and private clouds into a consistent&amp;nbsp;&lt;a href="https://www.techtarget.com/searchcloudcomputing/tip/Top-5-benefits-of-hybrid-cloud"&gt;hybrid cloud enables easy migration&lt;/a&gt;&amp;nbsp;of workloads and data as cost benefits allow.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Control.&lt;/b&gt; Some data and workloads are simply inappropriate for the public cloud yet benefit from cloudlike flexibility and self-service. Hybrid clouds let sensitive data and critical workloads remain on local infrastructure where the enterprise has direct control. Growing needs for data and workload sovereignty also benefit from hybrid environments where data and workloads can be kept within established geopolitical boundaries.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Flexibility.&lt;/b&gt;&amp;nbsp;Enterprises implementing a private cloud can benefit from a cloud computing environment, preserve direct control over the actual computing infrastructure and data resources in-house, and draw upon public cloud resources as desired.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Security and compliance.&lt;/b&gt;&amp;nbsp;Some workloads and data must run on local infrastructure for security, compliance and regulatory requirements. A hybrid cloud enables a business to establish and apply consistent security and compliance processes to address regulatory concerns. Hybrid clouds can also be used to replicate data and workloads between private and public clouds, supporting comprehensive backups, redundancy and effective recovery from disruptions.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Increased scalability.&lt;/b&gt;&amp;nbsp;Workloads might need flexibility to add or drop resources as traffic ebbs and flows. Hybrid clouds enable workloads and data to shift between private and public clouds as demand dictates.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Improved business agility.&lt;/b&gt;&amp;nbsp;Competitive advantages, new business opportunities and faster time to market usually rely on rapid infrastructure provisioning to support activities such as new workload testing, deployment and migration. A hybrid cloud strategy is uniquely suited to this agility. Staff can provision resources on a private cloud and then move workloads and data between public and private clouds.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;h3&gt;Challenges of hybrid cloud&lt;/h3&gt;
 &lt;p&gt;While a well-designed hybrid cloud can offer compelling benefits for a busy enterprise, there are also&amp;nbsp;&lt;a href="https://www.computerweekly.com/news/365535626/Prepare-for-hybrid-cloud-headaches"&gt;various hybrid cloud drawbacks&lt;/a&gt;&amp;nbsp;to consider:&lt;/p&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Lack of capability.&lt;/b&gt;&amp;nbsp;Building a hybrid cloud from scratch, especially a cobbled-together heterogeneous hybrid cloud, can be technically challenging and time-consuming. Not all hybrid cloud projects are successful or meet the organization's expectations. A business must possess solid employee skills and tools before it embarks on a hybrid cloud initiative and proceed in carefully orchestrated phases.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Costs.&lt;/b&gt;&amp;nbsp;While hybrid clouds can benefit overall cost management, it's still expensive to keep and maintain additional private cloud infrastructure, plus develop new workflows and guidelines for private and hybrid cloud use. Consider all the costs when planning a hybrid cloud project.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Management issues.&lt;/b&gt;&amp;nbsp;Visibility is a crucial element of any infrastructure. It enables a business to understand what workloads are present, how they are running and where they are located. The abstraction of a cloud environment doesn't alleviate issues regarding business continuity or data sovereignty. It requires careful management practices and policies using a&amp;nbsp;&lt;a href="https://www.techtarget.com/searchcloudcomputing/feature/Top-enterprise-hybrid-cloud-management-tools-to-review"&gt;variety of tools capable of overseeing a hybrid cloud environment&lt;/a&gt;.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Security.&lt;/b&gt; The presence of two distinct computing and data storage environments can pose serious challenges for security and compliance. Understanding and securing data between environments is difficult, and this can easily result in data breaches and regulatory violations, such as with GDPR or HIPAA.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Integration problems.&lt;/b&gt;&amp;nbsp;The whole point of a hybrid cloud is to integrate a private and public cloud, but that alone can be one of the biggest challenges. Homogeneous hybrid cloud products make this considerably easier. In addition, the hybrid cloud might require maintenance to keep up with changes and updates to the public cloud provider's infrastructure or software stack. Homogeneous hybrid clouds can also result in vendor lock-in, which is typically undesirable -- especially with rapidly changing business and computing needs.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Network disruption.&lt;/b&gt;&amp;nbsp;Hybrid clouds depend on&amp;nbsp;&lt;a href="https://www.techtarget.com/searchnetworking/definition/WAN-wide-area-network"&gt;WAN&lt;/a&gt;&amp;nbsp;connectivity. Any disruptions can render the hybrid cloud inoperative.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;div class="youtube-iframe-container"&gt;
  &lt;iframe id="ytplayer-0" src="https://www.youtube.com/embed/BBjeGX-xbiQ?autoplay=0&amp;amp;modestbranding=1&amp;amp;rel=0&amp;amp;widget_referrer=null&amp;amp;enablejsapi=1&amp;amp;origin=https://www.techtarget.com" type="text/html" height="360" width="640" frameborder="0"&gt;&lt;/iframe&gt;
 &lt;/div&gt;
&lt;/section&gt;               
&lt;section class="section main-article-chapter" data-menu-title="Multi-cloud vs. hybrid cloud: What are the key differences?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Multi-cloud vs. hybrid cloud: What are the key differences?&lt;/h2&gt;
 &lt;p&gt;While hybrid cloud and multi-cloud deployment models differ in purpose and infrastructure, they do have some similarities. Hybrid cloud and multi-cloud do the following:&lt;/p&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;Provide flexibility and redundancy.&lt;/li&gt; 
  &lt;li&gt;Enable a business to deploy highly tailored infrastructures.&lt;/li&gt; 
  &lt;li&gt;Support the transition of capital investments into operational expenses.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;By the same token, they have important distinctions:&lt;/p&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;Hybrid clouds always involve public and private clouds, whereas multi-clouds typically involve public clouds -- IaaS, PaaS and SaaS.&lt;/li&gt; 
  &lt;li&gt;Hybrid clouds connect a private and public cloud to establish a single ubiquitous environment, including management, while multi-clouds don't rely on such interoperability, even though some level of interoperability can be achieved.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="Can a hybrid cloud be multi-cloud?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Can a hybrid cloud be multi-cloud?&lt;/h2&gt;
 &lt;p&gt;Given their similarities and differences, hybrid cloud and multi-cloud are typically regarded as separate approaches or architectures, each with its own purpose. But hybrid clouds and multi-clouds &lt;a target="_blank" href="https://learn.microsoft.com/en-us/azure/cloud-adoption-framework/scenarios/hybrid/strategy" rel="noopener"&gt;can coexist&lt;/a&gt;.&lt;/p&gt;
 &lt;p&gt;A business can build a private cloud for internal use, merge that private cloud with a public cloud to create a hybrid cloud, and add or integrate multiple other clouds -- whether IaaS, PaaS or SaaS -- to deliver specific resources or services to the business. Similarly, a business could create a hybrid cloud with one public cloud provider but also consume the resources and services of other public clouds outside the hybrid cloud environment.&lt;/p&gt;
 &lt;p&gt;It's theoretically possible to create a hybrid multi-cloud, but this would require a private cloud that integrates with two or more public clouds simultaneously. In practice, the complex technical hurdles involved in such simultaneous integrations are rarely worth the effort. Only the largest and most technically adept enterprises with demanding hybrid project requirements should consider such an endeavor.&lt;/p&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="Multi-cloud, hybrid cloud and AI"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Multi-cloud, hybrid cloud and AI&lt;/h2&gt;
 &lt;p&gt;The dramatic development of ML and AI &lt;a href="https://www.techtarget.com/searchcloudcomputing/feature/AI-will-heavily-influence-cloud-related-decisions"&gt;has brought new attention to the question&lt;/a&gt; of multi-cloud and hybrid cloud selection.&lt;/p&gt;
 &lt;p&gt;Ultimately, both approaches will support ML and AI use cases, but the choice must involve considerations previously discussed here. Hybrid and multi-cloud strategies can both offer flexible foundations for AI by enabling organizations to select the costs, features, control and performance appropriate for the AI use case.&lt;/p&gt;
 &lt;p&gt;For example, a hybrid cloud strategy might connect public clouds for dedicated AI services and advanced computing resources, such as &lt;a href="https://www.techtarget.com/whatis/feature/GPUs-vs-TPUs-vs-NPUs-Comparing-AI-hardware-options"&gt;GPUs and neural processing units&lt;/a&gt;, while connecting a private cloud to keep sensitive data local. Conversely, a multi-cloud strategy can be better when a business seeks specialized services for different AI workloads, such as selecting one cloud for cost-effective scalability and another for varied computing models.&lt;/p&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="How to choose which cloud is best for your business"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;How to choose which cloud is best for your business&lt;/h2&gt;
 &lt;p&gt;The general criteria for choosing a hybrid or multi-cloud strategy can be reduced to a matter of ownership or control. The choice isn't always obvious or easy, but it should always be driven by specific business needs and goals.&lt;/p&gt;
 &lt;h3&gt;When to choose a hybrid cloud strategy&lt;/h3&gt;
 &lt;p&gt;A business requires cloud flexibility, resources and services but is obligated -- by choice, industry practices or regulatory standards -- to host certain data or workloads locally and can't place them outside the organization's on-premises data centers or direct geopolitical control. For example, a business wants to build cloud-native applications and host some applications in the public cloud but must run certain critical workloads locally. In such cases, building a private cloud for those internal cloud transformations and blending the private cloud with a public cloud for its scope and extended service offerings might be an ideal solution.&lt;/p&gt;
 &lt;h3&gt;When to choose a multi-cloud strategy&lt;/h3&gt;
 &lt;p&gt;A business requires services, resources, infrastructure or cost models provided by specific cloud providers. For example, a business might opt for VM and storage instances from one public cloud provider; business applications, such as productivity or finance, from various SaaS providers; and perhaps AI and ML cloud services or language cloud services from other cloud providers. In these cases, the business doesn't need or desire on-premises cloud capabilities, and a multi-cloud&amp;nbsp;strategy&amp;nbsp;might be a suitable solution.&lt;/p&gt;
 &lt;p&gt;Always choose a cloud architecture based on specific business needs and goals. There is no "best" cloud model. Rather, understand the complexities and challenges that each cloud option presents.&lt;/p&gt;
 &lt;p&gt;&lt;strong&gt;Editor's note: &lt;/strong&gt;This article originally published in 2023 and was updated in 2026 to update the list of popular platforms and tools.&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Stephen J. Bigelow, senior technology editor at TechTarget, has more than 30 years of technical writing experience in the PC and technology industry.&lt;/i&gt;&lt;/p&gt;
 &lt;p&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>As businesses digitally transform across increasingly distributed environments, know the benefits, challenges, similarities and differences between hybrid cloud and multi-cloud.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/cloud_g1265279914.jpg</image>
            <link>https://www.techtarget.com/searchcloudcomputing/feature/Multi-cloud-vs-hybrid-cloud-and-how-to-know-the-difference</link>
            <pubDate>Wed, 11 Mar 2026 15:15:00 GMT</pubDate>
            <title>Multi-cloud vs. hybrid cloud: The main difference</title>
        </item>
        <item>
            <body>&lt;p&gt;Amazon announced in early 2025 that it planned to spend approximately &lt;a href="https://www.techtarget.com/searchenterpriseai/news/366619057/Amazon-to-spend-100B-in-AWS-AI-infrastructure"&gt;$100 billion on AWS infrastructure&lt;/a&gt; for the year, owing largely to rising AI demand. But did that investment pay off in a banner year for the cloud giant?&lt;/p&gt; 
&lt;p&gt;Last year in AWS was one of highs and lows, according to Corey Quinn, chief cloud economist at the cloud cost consultancy Duckbill.&lt;/p&gt; 
&lt;p&gt;"AWS got its mojo back in some ways," said Quinn, who also curates the weekly newsletter &lt;i&gt;Last Week in AWS&lt;/i&gt;, where he provides commentary on recent AWS news and developments.&lt;/p&gt; 
&lt;p&gt;In this episode of &lt;i&gt;IT Ops Query&lt;/i&gt;, Quinn underscored the company's &lt;a href="https://www.techtarget.com/searchitoperations/news/366636033/AWS-AI-Factories-target-hybrid-cloud-AI-infrastructure"&gt;progress with its AI initiatives&lt;/a&gt;, noting that AWS seems to have become comfortable enough with its AI program that it can refocus on its other strengths, such as infrastructure, production workloads and databases.&lt;/p&gt; 
&lt;p&gt;"The fact that they talk about [AI] less is a strong signal that they actually know what they're up to now," he said.&lt;/p&gt; 
&lt;p&gt;But the hyperscaler also faced its share of challenges in the past year. Quinn cited a "talent exodus," a drop in morale and multiple critical security issues, including a &lt;a href="https://www.techtarget.com/searchsoftwarequality/news/366628167/What-Amazon-Q-prompt-injection-reveals-about-AI-security"&gt;prompt injection attack on Amazon Q&lt;/a&gt; Developer's extension for VS Code, along with two significant issues flagged by security researchers in AWS CodeBuild.&lt;/p&gt; 
&lt;p&gt;In July 2025, AWS suffered a prompt injection attack in the Amazon Q Developer for Visual Studio Code extension, which integrates the &lt;a href="https://www.techtarget.com/searchenterpriseai/news/366583032/Amazon-Q-GenAI-assistant-out-for-developers-AWS-users"&gt;Amazon Q generative AI assistant&lt;/a&gt; into the VS Code editor. An AWS security bulletin published July 23 stated: "The threat actor was able to commit malicious code into the extension's open source repository that was automatically included in a release."&lt;/p&gt; 
&lt;blockquote class="main-article-pullquote"&gt;
 &lt;div class="main-article-pullquote-inner"&gt;
  &lt;figure&gt;
   The fact that they talk about [AI] less is a strong signal that they actually know what they're up to now.
  &lt;/figure&gt;
  &lt;figcaption&gt;
   &lt;strong&gt;Corey Quinn&lt;/strong&gt;Chief cloud economist, Duckbill
  &lt;/figcaption&gt;
  &lt;i class="icon" data-icon="z"&gt;&lt;/i&gt;
 &lt;/div&gt;
&lt;/blockquote&gt; 
&lt;p&gt;The first CodeBuild vulnerability, also &lt;a target="_blank" href="https://aws.amazon.com/security/security-bulletins/aws-2025-016/" rel="noopener"&gt;revealed in July 2025&lt;/a&gt;, required multiple conditions -- including improperly secured code repositories and poorly scoped access controls -- to be exploitable, according to AWS. But a successful exploit could have given attackers an access token for an entire source code repository, and if the access token had write permissions, the threat actor could commit malicious code to the repository.&lt;/p&gt; 
&lt;p&gt;Then, in January 2026, researchers at cloud security platform Wiz reported they had uncovered a vulnerability in a "subtle misconfiguration" in CodeBuild CI that attackers could use to gain admin access to the AWS JavaScript SDK, which powers the AWS Console. According to Wiz, attackers could have exploited this flaw -- &lt;a target="_blank" href="https://www.cybersecuritydive.com/news/critical-flaw-in-aws-console-risked-compromise-of-build-environment/809745/" rel="noopener"&gt;dubbed CodeBreach&lt;/a&gt; -- to enact a "platform-wide compromise" affecting every AWS account.&lt;/p&gt; 
&lt;p&gt;"You'd think that after the first CodeBuild issue last year, they really would have gone over everything and touched it with a fine-tooth comb," Quinn said. "And maybe they did, but they missed the thing again. And it starts to shake confidence."&lt;/p&gt; 
&lt;p&gt;Watch this episode of &lt;a href="https://www.techtarget.com/searchitoperations/series/IT-Ops-Query"&gt;&lt;i&gt;IT Ops Query&lt;/i&gt;&lt;/a&gt; to dive into more of Quinn's highlights and lowlights for the last year in AWS; advice for enterprise IT buyers dealing with the cloud vendor; the developments he's following in 2026; and what he hopes will -- and won't -- happen with AWS in the year ahead.&lt;/p&gt; 
&lt;p&gt;&lt;i&gt;Kate Murray is a managing editor with Informa TechTarget's Infrastructure editorial team. She joined the company as an associate managing editor of e-products in 2020.&lt;/i&gt;&lt;/p&gt; 
&lt;transcript&gt; 
 &lt;p&gt;Beth Pariseau: From Informa TechTarget, I'm Beth Pariseau, and this is IT Ops Query.&lt;/p&gt; 
 &lt;p&gt;This podcast distills the signal from the noise about enterprise software development and platform engineering. Each week, we'll talk to expert guests about the latest tech industry news and trends that engineering and IT leaders need to know.&lt;/p&gt; 
 &lt;p&gt;Don't forget to subscribe to IT Ops Query for more conversations on AI and the future of the enterprise digital workspace.&lt;/p&gt; 
 &lt;p&gt;Corey Quinn is the chief cloud economist at Duckbill, where he specializes in helping companies improve their AWS bills, quote, 'by making them smaller and less horrifying,' end quote, according to his website bio.&lt;/p&gt; 
 &lt;p&gt;He also hosts the &lt;i&gt;Screaming in the Cloud&lt;/i&gt; and &lt;i&gt;AWS Morning Brief&lt;/i&gt; podcasts and curates the weekly newsletter &lt;i&gt;Last Week in AWS&lt;/i&gt;. He is also the only podcast guest of mine, so far, whose face is a sticker on my laptop.&lt;/p&gt; 
 &lt;p&gt;Welcome, Corey.&lt;/p&gt; 
 &lt;p&gt;Corey Quinn: Thank you. It's a pleasure to be here to once again indulge my ongoing love affair with the sound of my own voice.&lt;/p&gt; 
 &lt;p&gt;Pariseau: Well, we're happy to have you and the sound of your voice. So, let's talk about last year in AWS. What do you think was the most significant development for enterprises and AWS infrastructure?&lt;/p&gt; 
 &lt;p&gt;Quinn: AWS got its mojo back in some ways. They stopped running their mouths about AI to the exclusion of all else -- because they actually got good at it -- and started shipping things that are useful to customers and then started seeing adoption. AWS, historically, has talked the most about that, which it is the most insecure about. So, the fact that they talk about it less is a strong signal that they actually know what they're up to now.&lt;/p&gt; 
 &lt;p&gt;Pariseau: Cool. OK.&lt;/p&gt; 
 &lt;p&gt;Quinn: And they can talk about things like databases again.&lt;/p&gt; 
 &lt;p&gt;Pariseau: Yeah.&lt;/p&gt; 
 &lt;p&gt;Quinn: And the actual production workloads that people care about.&lt;/p&gt; 
 &lt;p&gt;Pariseau: Right.&lt;/p&gt; 
 &lt;p&gt;Quinn: For our customers, somewhere between 5% and 7% aggregate is their AI services spend, if we're being honest about what AI service spend is. You can squint at anything hard enough these days and call it AI.&lt;/p&gt; 
 &lt;p&gt;Pariseau: Yes, for sure. I actually saw one of your recent last posts was about how AWS has to prove that they can still operate. Can you expound on that a little bit?&lt;/p&gt; 
 &lt;p&gt;Quinn: Sure, the part of the challenge that AWS has had has been that they're very good at the things that are very hard. With the overinvestment right now that we're seeing in 'We're building out AI data centers, it'll be done in a year' -- yeah, taking a warehouse and running two power lines to it, and then dragging some fiber and calling it good, back the truck full of servers up, does not a data center make. And there are a lot of things that are so into the weeds now that many companies are considering data center projects when they don't actually know what those things are.&lt;/p&gt; 
 &lt;p&gt;So, it's a lot of pretenders right now. AWS has always been great at this, and when they say that something is a data center, they mean it. There's a reason that building out a region is a multibillion-dollar investment, and it's not because AWS is bad at negotiating. It's because this stuff is really hard, particularly at scale.&lt;/p&gt; 
 &lt;p&gt;Everyone else who is not so diligent on this -- there are exceptions, Google is very good at this, Microsoft could be if they, you know, got out of their own way -- but a lot of the pretenders are not. All the Oracle stuff that they're talking about? OK, sure, that seems likely. They have a chance to shine from a reliability perspective. And that's the stuff they are good at.&lt;/p&gt; 
 &lt;p&gt;One of the counterpoints, of course, is that they are seeing a talent exodus. Morale is at a ridiculous low for a variety of reasons. Many of them appear to be unforced errors on the part of AWS. So, as institutional knowledge walks out the door, it's hard to backfill. So, what does that mean? You're going to find out.&lt;/p&gt; 
 &lt;p&gt;Pariseau: Right. And then, what stood out to you in databases with AWS last year?&lt;/p&gt; 
 &lt;p&gt;Quinn: They finally stopped with the cheap shots at Oracle. I mean, not that everyone doesn't love a good cheap shot at Oracle. The problem is everyone except AWS can make them because, in their case, it's punching down. It's giving too much attention to someone that's noisy.&lt;/p&gt; 
 &lt;p&gt;They are also doing some interesting stuff. Aurora DSQL is really neat. It's probably their second true serverless database, the first being DynamoDB. The problem is that it is impossible to understand the pricing. And the fact that I'm the person saying that should count for a lot.&lt;/p&gt; 
 &lt;p&gt;One of their great distinguished engineers, or senior principal engineers -- I'm sorry, they're both -- these are still people that should strap auxiliary brain packs on because they're too smart for a single brain, they're great at this. And I had a long conversation with one of them and read the blog post that he put out in his personal blog. Like, 'Here's how to do a quick test, and here's the pricing.' So, I did the exact same thing, and the numbers were different.&lt;/p&gt; 
 &lt;p&gt;Pariseau: No…&lt;/p&gt; 
 &lt;p&gt;Quinn: Yeah, it's non-deterministically priced, which means the only way to figure out what it's gonna cost for any, and on any axis is 'Well, we're gonna build on top of it and find out,' which is terrifying.&lt;/p&gt; 
 &lt;p&gt;Pariseau: Yeah.&lt;/p&gt; 
 &lt;p&gt;Quinn: Well, it turns out it was really expensive, oops.&lt;/p&gt; 
 &lt;p&gt;Pariseau: Right. Funny that.&lt;/p&gt; 
 &lt;p&gt;Quinn: Yeah.&lt;/p&gt; 
 &lt;p&gt;Pariseau: So, what do you think was the most overlooked story about AWS last year, infrastructure-wise?&lt;/p&gt; 
 &lt;p&gt;Quinn: That's a good one because I live in a very rarefied space, and I pay inordinate amounts of attention to things. You picked a heck of a day to have this conversation.&lt;/p&gt; 
 &lt;p&gt;Pariseau: Yeah?&lt;/p&gt; 
 &lt;p&gt;Quinn: They had a security issue with CodeBuild, where things weren't going super well, and a malicious prompt was injected into their VS Code tooling. Great.&lt;/p&gt; 
 &lt;p&gt;This morning, as we record this, Wiz found another issue where they could get admin access to the JavaScript SDK for AWS due to a bad regex parsing.&lt;/p&gt; 
 &lt;p&gt;Pariseau: Yikes.&lt;/p&gt; 
 &lt;p&gt;Quinn: And you'd think that after the first CodeBuild issue last year, they really would have gone over everything and touching it with a fine-tooth comb. And maybe they did, but they missed the thing again. And it starts to shake confidence.&lt;/p&gt; 
 &lt;p&gt;Pariseau: Yeah, yeah. Although, it seems like every day there's some new breach, right?&lt;/p&gt; 
 &lt;p&gt;Quinn: There is, and it seems that companies are not responsible for this. I mean, look at how many breaches Azure has had over the years, and it seems like that's not something people talk about in polite company.&lt;/p&gt; 
 &lt;p&gt;Pariseau: Right, yeah. True. I've been asking for years what is it gonna take in cybersecurity, really? And I have yet to hear the answer or see the answer.&lt;/p&gt; 
 &lt;p&gt;Quinn: Strict liability? Jail sentences? I mean, there's not anything much shorter that matters. You take a look at any widely publicized breach, and look at the company a year or two later, their stock price is up. At this point, I'm set for credit monitoring if I live to be 300 years old.&lt;/p&gt; 
 &lt;p&gt;Pariseau: Yeah, yeah, I mean it is funny from a consumer standpoint. It's like 'I never gave permission for this data to be collected in the first place' in many cases.&lt;/p&gt; 
 &lt;p&gt;So, anyhow, getting back to AWS, what should enterprise IT buyers know that they don't know about dealing with AWS?&lt;/p&gt; 
 &lt;p&gt;Quinn: Dear. They tend to be very cookie-cutter templated. When you're doing large-scale negotiations, they know exactly what you're likely to say, how they're going to respond to any exigency that comes out. There's a reason that we assess companies with the contract negotiation piece of it. There's also weird incentive structures at play, where just because AWS talks a lot about a thing, it doesn't mean that's a thing you need or should be working on, that it is not your to-do list.&lt;/p&gt; 
 &lt;p&gt;The majority of spend, overwhelmingly, is still the basic building blocks. It's EC2 instances, it's S3 storage, it's data transfer, it's RDS and it's disks. That's it. Everything else is sort of layered on top of that in nice-to-have kind of ways. People also tend to start by going deep into something like EC2, which is an enormous service, and they assume every service goes that deep. It doesn't. A lot of them, you can pick up what you need to know in less than a day. That is something that I think turns people off to it.&lt;/p&gt; 
 &lt;p&gt;AWS also is beset with bad user experience, and the natural takeaway from this is 'Oh, I'm dumb and bad at how the cloud is supposed to work.' No, you're not. It's just the interface is terrible, it's not intuitive, and they do you no favors. Stick with it, we all feel that way. There's a support group, it's called All of Us, and we meet at the bar.&lt;/p&gt; 
 &lt;p&gt;Pariseau: Yeah, I've heard it described like Home Depot, you know? Every part you could possibly need is there, but you gotta know how to put them together.&lt;/p&gt; 
 &lt;p&gt;Quinn: Right, and it used to be that you could go and talk to the people at Home Depot, like 'Hey, I'm building a gazebo, can you help?' And now, instead of that, it's getting harder to do that because now they start shoving overconfident -- and also wrong -- robots at you.&lt;/p&gt; 
 &lt;p&gt;Pariseau: Yikes. You mentioned they kind of got things together with AI. I mean, is there anything that they're doing there that is helpful for people?&lt;/p&gt; 
 &lt;p&gt;Quinn: Yes. This is where I think the wheels fall off of a lot of their narrative. It's what I believe and not what they want to say. Something like Bedrock, which runs a bunch of different models as infrastructure, is terrific. It is where AWS is at its best, providing infrastructure-level platform things and APIs that are hardened that you can work with in a variety of ways that we're all sort of mostly used to.&lt;/p&gt; 
 &lt;p&gt;They are great at infrastructure. They are not going to be the ones that release models that change our lives. They are going to be where those models are trained and where those models are run. They are the infrastructure substrate for a lot of these things.&lt;/p&gt; 
 &lt;p&gt;I've been saying forever that Amazon's fate, that I don't believe they can escape, is to become the next generation of infrastructure backbone providers. If NTT goes dark for a day, the entire internet is having a bad day, but most people don't know who NTT is because all the stuff that we care about, all the stuff where the value is derived, rides on top of their rails. Similar to if the power company goes away for a while, we're all gonna have a bad time, but they don't capture the value either. Instead, at least where I live in San Francisco, they just try to burn the cities down from time to time.&lt;/p&gt; 
 &lt;p&gt;Pariseau: Every so often, just to mix things up&lt;/p&gt; 
 &lt;p&gt;Quinn: Just to keep us on our toes. It's basically to shore up the battery backup market.&lt;/p&gt; 
 &lt;p&gt;Pariseau: Yeah, right. And so, as we enter this new year, aside from ongoing security breaches, is there any story about AWS that you're tracking so far?&lt;/p&gt; 
 &lt;p&gt;Quinn: Well, the one that came out today, which is still unfolding, is of interest. From a security perspective, I try and stay away from it these days just because there are people who cover that beat better than I do, and they -- and I tend to get ahead of my skis too easily on these spaces, but seeing the messaging around it is interesting. Seeing how there's an entire new field of, effectively, prompt injection as an attack. At least back when I was focusing on the security space, telling the computer, as a string literal, 'Trust me, bro,' was not a threat vector. It is now. And that's something that requires a fair bit of thought.&lt;/p&gt; 
 &lt;p&gt;Pariseau: It is, and at the same time, I think this happens with a lot of new technologies, but especially AI. A previous guest here talked about AI giving us 'security amnesia.' You know, all of a sudden it's all new again, you know? But the same principles should apply.&lt;/p&gt; 
 &lt;p&gt;Quinn: That's a fantastic perspective. The challenge, as well, is isolation of duties. Yesterday I wrote a blog post about how if you email me or my digital assistant, Billy the Platypus -- he's snarky and obnoxious and will just tear into you, that's sort of the point of this. I think it's funny and it's great that people have tried prompt injections, and they've failed. Great, because I do have some thought in how I build these things. But also, it's not hooked up to the client database, it doesn't have context into other emails in other threads that it can drag in for this -- just because that seems dumb.&lt;/p&gt; 
 &lt;p&gt;Pariseau: Right, and I would love to see some example replies from Billy, by the way.&lt;/p&gt; 
 &lt;p&gt;Quinn: Yeah, I need to do a follow-up on that. I think enough people have asked for this that it's worth doing.&lt;/p&gt; 
 &lt;p&gt;Pariseau: I really wanna see it. As someone who gets a lot of the similar emails myself, I would love to see what his replies are.&lt;/p&gt; 
 &lt;p&gt;Quinn: It was funny, my business partner saw this come out when I was testing it on him. He's like, 'Do you have an auto responder turned on in your email?'&lt;/p&gt; 
 &lt;p&gt;'No. Why?'&lt;/p&gt; 
 &lt;p&gt;'Are you sure?'&lt;/p&gt; 
 &lt;p&gt;It's like, oh no, I explicitly allow it to email you. It doesn't like you.&lt;/p&gt; 
 &lt;p&gt;Pariseau: Oh, I see.&lt;/p&gt; 
 &lt;p&gt;Quinn: It was great. And then he was trying to figure out like, 'This is great, what gating is there?' He was trying to figure out without insulting me -- 'Are you sending this to customers?' Usually no, but thank you for asking. I'm not completely around the bend yet. Ask again in a week.&lt;/p&gt; 
 &lt;p&gt;Pariseau: Yeah, yep. Another question that I tend to ask folks that spend a lot of time looking at something, like you do with AWS, is what you hope will and won't happen with AWS in the coming year. So, what do you think?&lt;/p&gt; 
 &lt;p&gt;Quinn: AWS has gotten boring, and I kind of like that. I feel like they have mostly exhausted the problem space of the infrastructure platform offerings.&lt;/p&gt; 
 &lt;p&gt;I started &lt;i&gt;Last Week in AWS&lt;/i&gt; in a time when there were big gaps in the platform that were being addressed at a pretty consistent clip. One week, you could not replicate encrypted RDS snapshots between regions, and then you could. That was a big unlock for people, and separating out that signal from noise was important.&lt;/p&gt; 
 &lt;p&gt;That doesn't happen nearly as much anymore. The platform is mature. The big news today that came out that -- not quite as big as a security breach -- is that they've gone generally available with their launch of their EU Sovereign region. OK, great. I'm not particularly worried about anything there. That is regulatory checkboxing and remarkably little else from where I see things.&lt;/p&gt; 
 &lt;p&gt;Pariseau: Right. OK, so what would be bad in 2026?&lt;/p&gt; 
 &lt;p&gt;Quinn: If AWS falls down the rabbit hole of trying to let marketing drive the bus instead of what actually is there. Whenever they get worried, they let marketing get ahead of their skis, and it ends in disaster because they're not good at messaging.&lt;/p&gt; 
 &lt;p&gt;If they lean too far into trying to do what all their other technical peers are doing, that becomes a problem. And I think that the corrosive force eroding Amazon in many ways is advertising. If we start seeing third-party ads in the console, for example, that becomes a problem. They experimented with this in marketplace search, and then I saw them stop doing it because apparently no one uses that for product discovery, surprise.&lt;/p&gt; 
 &lt;p&gt;I think that that is a challenge because it -- we've seen this with Amazon.com, where originally in the early days, it would, you search for a thing, and it would suggest the best thing for you. Now it suggests the best thing for Amazon, and those are not congruent all the time.&lt;/p&gt; 
 &lt;p&gt;Pariseau: So, you know, another kind of evergreen question that I have is what it's gonna take for people to actually implement multi-AZ or multi-region resilience, rather than considering that an insurance policy and being surprised when their cloud region goes down. Do you think that'll ever happen?&lt;/p&gt; 
 &lt;p&gt;Quinn: Does it need to? We take a look at individual AZ availability. It's been trending up and to the right, and not every workload needs to be highly available, highly durable. If I park my insane Billy-the-Platypus thing inside of a single AZ and it goes down for a few hours, does that really matter? I mean, I've gotta be honest with you, the front end lives on a container in the next room on my home Kubernetes cluster. It's a 10-node Raspberry Pi cluster, but it's all plugged into the same power strip, so let's not kid ourselves here about what the durability story really is on this. That's fine, I'm not directly deriving revenue from this thing, email is not expecting an instantaneous response to stuff.&lt;/p&gt; 
 &lt;p&gt;Not everyone's workload matches that. I think that people are getting it wrong when they start trying to go multi-region or multi-AZ or, heaven forbid, multi-cloud. And with a lot of work and at great expense, they have replaced a single point of failure with multiple single points of failure.&lt;/p&gt; 
 &lt;p&gt;Pariseau: Good point. Yeah, you had a session at KubeCon about multi-cloud being a myth that I unfortunately wasn't able to make it to, but I did note that. So, we hear a lot about multi-cloud becoming more of a thing because of AI. So, what's your take?&lt;/p&gt; 
 &lt;p&gt;Quinn: Yes, and.&lt;/p&gt; 
 &lt;p&gt;Pariseau: OK.&lt;/p&gt; 
 &lt;p&gt;Quinn: Individual workloads like training jobs, terrific. You need basically a bunch of very expensive GPUs, access to data and a network to get those things talking to each other. That is a highly portable workload. Most people's applications are not that. They're stateful data stores, databases, latency requirements and the rest that tie into it.&lt;/p&gt; 
 &lt;p&gt;So, when we see multi-cloud in the wild, which every company has some multi-cloud story going on, it's different workloads. It's different components living in different places, and that is normal. I'm not suggesting anyone should do otherwise in there. But 'I'm gonna build this one application that needs to run globally across multiple providers' -- you've got to design that in from the beginning, or you're never gonna get that.&lt;/p&gt; 
 &lt;p&gt;Pariseau: Right. Yeah, yeah, absolutely. And another thing that's making waves in infrastructure, which I'm covering, is the memory shortage and how that's affecting storage. Do you think any of that is gonna surface in the cloud?&lt;/p&gt; 
 &lt;p&gt;Quinn: There's already been a 15% hike in capacity for ML blocks that AWS charges. They update that on a quarterly basis. This is the first time I've seen it go up, so that's of interest.&lt;/p&gt; 
 &lt;p&gt;We will see how that shakes out. Earlier today in the news, I saw that they've taken a stake in an Arizona copper mine.&lt;/p&gt; 
 &lt;p&gt;Pariseau: Wow.&lt;/p&gt; 
 &lt;p&gt;Quinn: The fact that they're now controlling some of the raw materials to build the thing and -- OK, that is vertical integration at a scale I hadn't considered previously.&lt;/p&gt; 
 &lt;p&gt;Pariseau: True. So, I don't know, what am I thinking not to ask you about? I'm sure there's plenty that is on your mind these days.&lt;/p&gt; 
 &lt;p&gt;Quinn: I think that a question I've gotten a lot has been, alright, are we in a bubble? Obviously, yes, clearly. How is it going to end? I don't know, but I do see some of the early signs of it.&lt;/p&gt; 
 &lt;p&gt;I suspect OpenAI will not survive. I think that Anthropic is likelier to. But OpenAI has signed enormous cloud deals with every hyperscaler. It feels like they're trying to make themselves systemically important. Oh, OK, great, but if you do the numbers on this, I'm on the Anthropic side of the fence. I use Claude for a lot of stuff. I pay $200 a month for their max plan. And it's useful, I get value out of it all the time. I'm not gonna spend $5,000 a month on that. But I, and a lot of other people, would have to in order for that to start capturing a lot of the value.&lt;/p&gt; 
 &lt;p&gt;The unspoken -- and I believe will remain unfulfilled -- promise of a lot of this AI revolution has been pitching your boss that, 'All right, we're gonna lay you [off], we're gonna get rid of you, and then we're gonna take your salary and split it between the boss and the AI company.' And that doesn't really work. The companies I have seen that are charging salary-equivalent replacements for their AI tooling have a heavy row to hoe just because, out of the box, these models and tools are getting more capable almost by the week.&lt;/p&gt; 
 &lt;p&gt;Pariseau: And, well, but that would be, you know, good to hear for a lot of IT pros that are worried about job security.&lt;/p&gt; 
 &lt;p&gt;Quinn: Jobs change, they always change. But the industrial revolution did not lead to mass reductions in the number of people in the workforce; it shifted the nature of what a lot of that work was.&lt;/p&gt; 
 &lt;p&gt;We're seeing similar trends right now in the way that software development is being done. I would not want to be entering the space right now. I think it is so highly in flux that I don't know how you would get a toehold. I'm also not anywhere near that part of my career, so I'm not a good source of advice, so I don't sound off about it.&lt;/p&gt; 
 &lt;p&gt;I think that there are -- the genie is out of the bottle and it's not going back.&lt;/p&gt; 
 &lt;p&gt;Pariseau: True.&lt;/p&gt; 
 &lt;p&gt;Quinn: Even if these companies go away, local models are good enough to get to the 80th percentile that frontier models can today, and that's not slowing down anytime soon. That is something that is going to be baked into a bunch of different workflows.&lt;/p&gt; 
 &lt;p&gt;So, how do we start reconciling that? How do we start grappling with that as a society? I don't know.&lt;/p&gt; 
 &lt;p&gt;What I haven't heard is a bunch of stories that, 'Well, if only we had several trillion dollars' worth of data centers doing more AI stuff, then we could solve problem X.' The AI capacity we have already seems like it's looking at striving for a business model. And a lot of them are effectively just wrappers around the foundation models that are gaining these capabilities pretty consistently.&lt;/p&gt; 
 &lt;p&gt;Pariseau: Yeah.&lt;/p&gt; 
 &lt;p&gt;Quinn: Every time they make an announcement and a swath of startups goes out of business.&lt;/p&gt; 
 &lt;p&gt;Pariseau: Yeah, there are some people that I've talked to that think this is the year the rubber hits the road, at least in the enterprise in terms of needing to see some kind of real-world ROI.&lt;/p&gt; 
 &lt;p&gt;Quinn: Yeah, everyone talks about their big AI experiments and investments -- again, about 7% of spend -- and OK, we have a bunch of small pilots going, and if they work? Companies are not foolish; they will deploy these. I have several customers who have, but the majority of PoCs are, 'OK, this is interesting.' But the value is not necessarily there.&lt;/p&gt; 
 &lt;p&gt;There's also a social component to this. You can theoretically -- let's take the easy example. Let's talk about support. AWS has revamped some of its support to be AI-forward. Every customer I talked to, without exception, hates the thing when they have to talk to a chatbot about this. The right way, if I were building an AI-powered support offering, is that the AI agents would be assisting the human support rep on the other side.&lt;/p&gt; 
 &lt;p&gt;The one alternate approach I would take is, 'Hey' -- like almost a Clippy style -- 'it looks like you're about to submit a support ticket.' Perhaps 'it's broke' is not the best way to frame this in the way of a meaningful response. It provides, 'What are you doing? What are you expecting to happen and why, and what's happening instead? Give me those three things, and we can get there a lot faster.'&lt;/p&gt; 
 &lt;p&gt;Like that is a sort of assistance that becomes helpful. But people don't want to replace the humans that they interact with with computers, by and large.&lt;/p&gt; 
 &lt;p&gt;Pariseau: Right, because people loved Clippy so much.&lt;/p&gt; 
 &lt;p&gt;Quinn: Oh yeah. What's also weird is the blowback against AI in a lot of different places. I was reading a blog post I wrote, and I'm like, 'This does read heavily like AI wrote it.' But I published it in 2020. So, I'm not entirely sure what to make of that. I wasn't time traveling, but a lot of the things -- 'It's not X, it's Y,' I've been using em dashes for almost two decades now -- like, I'm not changing because AI does a thing.&lt;/p&gt; 
 &lt;p&gt;Pariseau: I mean, it didn't come up with any of that on its own.&lt;/p&gt; 
 &lt;p&gt;Quinn: Right.&lt;/p&gt; 
 &lt;p&gt;Pariseau: It probably saw that very post in some capacity.&lt;/p&gt; 
 &lt;p&gt;Quinn: Where people have a problem with AI is when it's trying to pass off as something else. I use it for my images for slide presentations all the time, and people don't object to it. Because what I have found is when you use AI images to replace stock photography of a picture of a landscape, great, crowd shot, whatever. That's just laziness.&lt;/p&gt; 
 &lt;p&gt;If you're gonna use AI, do the sort of thing that you're not gonna be able to create easily in any other way. Like, cool, I want a picture of a data center. It's currently on fire, and we're gonna put a giraffe right in the hot aisle. Because you can't get that in any reasonable other way. And if you're doing it for a quick slide presentation at a community event, I'm not gonna commission an artist to draw this thing eight weeks in advance because I don't plan that far ahead for anything.&lt;/p&gt; 
 &lt;p&gt;Pariseau: Sure, sure, and be transparent about it, you know?&lt;/p&gt; 
 &lt;p&gt;Quinn: Yes, exactly.&lt;/p&gt; 
 &lt;p&gt;Pariseau: Yeah, yeah. Well, interesting times, as they say.&lt;/p&gt; 
 &lt;p&gt;Quinn: Yeah, I had stickers I was giving away at my booth this year that was, like, pictures of five-legged dogs, people with extra hands, and it was all illustrated by a human that we hired to draw in the shape of crappy AI, and it was great. It needs a bit more exposition. We should have told the story a bit better because people just think it's AI-generated stickers. It's not.&lt;/p&gt; 
 &lt;p&gt;My wife gave me a calendar for the holidays where it was all AI-generated imagery. It's like, no, I want this taken back. And I'm more of a positive AI person than she is, not that I'm beyond the pale here. And she said, 'Well, I don't understand why you don't like that.' Because I can generate prompts and create calendars, too. This is just like the next stage of some random dropshipper. There's no creativity that went into it. Just printing it out and then selling it like this is not terrific. If we're going to do that, I'll do a custom one on Shutterstock or something like that, and we'll use inside jokes and pictures of our family and the rest, and we'll have real fun with it.&lt;/p&gt; 
 &lt;p&gt;Pariseau: Right.&lt;/p&gt; 
 &lt;p&gt;Quinn: That's how I would do it. But I'm not going to just pay some random slop merchant $20 for a calendar that they didn't care much to do anything with.&lt;/p&gt; 
 &lt;p&gt;Pariseau: Yeah. What's the enterprise cloud equivalent that you would warn people to stay away from that they're being sold right now?&lt;/p&gt; 
 &lt;p&gt;Quinn: An awful lot of, right now -- from my perspective, the rule of thumb that I'm taking on this is when people talk about their tool being an AI tool, tread cautiously. Because it's similar to when AWS was launching Graviton, their own custom Arm-based silicon processors. And they were talking about, 'Ooh, our managed database service now uses Graviton,' and it's, OK, slow your roll here.&lt;/p&gt; 
 &lt;p&gt;As a consumer of this, I'm calling a PostgreSQL API -- yes, that's how I pronounce it. And I don't care as long as it hits a price-performance window, whether it's done by Intel, by Arm or by an army of overworked elves who type very quickly and are good at doing math and retrieval. I just want the result. How you do the thing matters so much less to me than the value and the result that comes out of it.&lt;/p&gt; 
 &lt;p&gt;So, the companies that are doing good things with AI aren't slapping a 'Now with AI' label across the front of it. It's just how things get done. We're building a software platform at Duckbill. AI is not built into the platform itself, but we are using AI to build it on our side with AI-assisted coding, because that is how development is working across the board. We're still very careful what makes it into production. This is AWS billing and contract stuff. We're not foolish, and there are hard guardrails on what the AI can look at and not because we're, again, not fools.&lt;/p&gt; 
 &lt;p&gt;But we are not advertising that, it's just how business is being done these days. And if there is an AI story, given that we're targeting enterprises here, we'd have to obviously disclose that, and that becomes a whole series of conversations.&lt;/p&gt; 
 &lt;p&gt;Pariseau: Right.&lt;/p&gt; 
 &lt;p&gt;Quinn: But we're not training on their data, nor do we ever expect to. If it's 'We're gonna use AI to get this interesting result,' terrific. The way to position this, disclosures aside, is 'Here's an interesting result we can get. Is that of value?' Because how we do it on the back end is irrelevant. We do not care that a person or a robot did a thing, we care that a thing happened. When you talk about the how, you're generally talking to other practitioners and enthusiasts; when you talk about the result, you are talking to customers.&lt;/p&gt; 
 &lt;p&gt;Pariseau: We will end on that note. Thank you so much for taking the time, Corey. It's great to talk to you.&lt;/p&gt; 
 &lt;p&gt;Quinn: Thank you, Beth. It's always a pleasure.&lt;/p&gt; 
 &lt;p&gt;Pariseau: Thank you for tuning in to IT Ops Query. To learn more about enterprise software development and platform engineering, explore our content on Informa TechTarget sites. Find us on YouTube at our channel, Eye on Tech. Subscribe to our podcast to receive the latest episodes as they drop. And if you liked what you heard today, give us a rating and review on Apple, Spotify or wherever you're listening. Thank you for joining us.&lt;/p&gt; 
&lt;/transcript&gt;</body>
            <description>In this episode of IT Ops Query, Duckbill's Corey Quinn discusses the highs and lows of last year in AWS, advice for enterprise IT buyers dealing with the cloud giant and more.</description>
            <link>https://www.techtarget.com/searchcloudcomputing/video/Last-year-in-AWS-with-Corey-Quinn</link>
            <pubDate>Mon, 09 Mar 2026 15:34:00 GMT</pubDate>
            <title>Last year in AWS with Corey Quinn</title>
        </item>
        <item>
            <body>&lt;p&gt;Many company executives and contact center leaders know about the struggles to protect customer data. With increased distractions or assessing how new technology, like AI, can improve contact center services, company leaders can't lose focus on emerging security threats that could compromise data.&lt;/p&gt; 
&lt;p&gt;Contact center security must remain a focal point to protect customer data and enhance customer confidence when interacting with an organization, which is key to&amp;nbsp;&lt;a href="https://www.techtarget.com/searchcustomerexperience/tip/How-to-improve-the-contact-center-experience-for-customers"&gt;better customer relationships and experiences&lt;/a&gt;.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="The increasing importance of contact center security"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;The increasing importance of contact center security&lt;/h2&gt;
 &lt;p&gt;Contact center security must be front and center when developing and implementing a strategic customer experience framework. Organizations that don't employ proper security controls could risk serious negative consequences, such as the following:&lt;/p&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Financial.&lt;/b&gt;&amp;nbsp;A security or data breach can result in lost business revenue and fines levied by various entities that significantly affect the bottom line.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Reputation.&lt;/b&gt;&amp;nbsp;Customers who feel their personal data isn't secure or who have been&amp;nbsp;&lt;a href="https://www.techtarget.com/searchsecurity/feature/10-types-of-security-incidents-and-how-to-handle-them"&gt;affected by security incidents&lt;/a&gt;, such as identity theft, might no longer do business with the organization or post their concerns on various social channels. The goodwill and positive reputation an organization builds over time is one of the biggest drivers to acquiring and retaining customers.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Business disruption.&lt;/b&gt;&amp;nbsp;Resources dedicated to running the business must be redirected to research and resolve the incident and improve security protocols.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="Types of contact center security best practices"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Types of contact center security best practices&lt;/h2&gt;
 &lt;p&gt;To avoid security problems, businesses need to implement a contact center security checklist that covers three categories: technology, customer and business best practices.&lt;/p&gt;
 &lt;h3&gt;Technology best practices&lt;/h3&gt;
 &lt;p&gt;In order to protect customer data and maintain security, companies and their contact centers should implement the following technology checklist:&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Encrypt data.&lt;/b&gt;&amp;nbsp;&lt;a href="https://www.techtarget.com/searchsecurity/definition/encryption"&gt;Encryption&lt;/a&gt;&amp;nbsp;translates an organization's stored or transmitted data into different forms, which require a specific key to translate it back into its original format. Organizations often encrypt data to protect specific customer records, including medical, credit card or personal information.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Update technology.&lt;/b&gt;&amp;nbsp;Keeping technology current ensures systems and components have the latest safeguards in place. Bad actors continuously test systems, looking for cracks that let them access data. Key practices to update technology include antivirus software,&amp;nbsp;&lt;a href="https://www.techtarget.com/searchsecurity/answer/Testing-a-security-patch"&gt;installing software patches&lt;/a&gt;&amp;nbsp;and eliminating legacy systems that vendors no longer support.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Minimize data availability and access.&amp;nbsp;&lt;/b&gt;More data is being stored each day. And, with more individuals given access to that information, an organization multiplies its risk of a potential data breach. Best practices to minimize availability and access to data include the following:&lt;/p&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;Restrict the number of people who can access sensitive information.&lt;/li&gt; 
  &lt;li&gt;Use system permissions to manage who can access specific data.&lt;/li&gt; 
  &lt;li&gt;Automate session timeout rules.&lt;/li&gt; 
  &lt;li&gt;Delete employee access to accounts as soon as the person leaves the organization.&lt;/li&gt; 
  &lt;li&gt;Mask sensitive data to limit the information displayed to employees. For example, place asterisks over the first five digits of a Social Security number.&lt;/li&gt; 
  &lt;li&gt;Use alternate technologies to capture sensitive information. For example, send a caller to an&amp;nbsp;&lt;a href="https://www.techtarget.com/searchcustomerexperience/definition/Interactive-Voice-Response-IVR"&gt;interactive voice response&lt;/a&gt;&amp;nbsp;system to enter credit card information.&lt;/li&gt; 
  &lt;li&gt;Limit the storage of critical information. For example, delete data after a customer provides a credit card number in a transaction. This scenario represents a tradeoff between customer convenience and data security.&lt;/li&gt; 
  &lt;li&gt;Use firewalls and intrusion detectors to prevent and report attempted and unauthorized activity.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;&lt;b&gt;Perform regular data backups.&amp;nbsp;&lt;/b&gt;Regular&amp;nbsp;&lt;a href="https://www.techtarget.com/searchdatabackup/definition/backup"&gt;data backups&lt;/a&gt;&amp;nbsp;should be established to minimize data loss and provide the ability to recreate customer records in the event of a security breach.&lt;/p&gt;
 &lt;div class="youtube-iframe-container"&gt;
  &lt;iframe id="ytplayer-0" src="https://www.youtube.com/embed/https://youtu.be/SuNtmCgIhiM?si=2yJAWZLY8lMdBmBy?autoplay=0&amp;amp;modestbranding=1&amp;amp;rel=0&amp;amp;widget_referrer=null&amp;amp;enablejsapi=1&amp;amp;origin=https://www.techtarget.com" type="text/html" height="360" width="640" frameborder="0"&gt;&lt;/iframe&gt;
 &lt;/div&gt;
 &lt;h3&gt;Customer best practices&lt;/h3&gt;
 &lt;p&gt;Businesses should institute the following&amp;nbsp;&lt;a href="https://www.techtarget.com/searchcustomerexperience/tip/How-to-fit-customer-experience-security-into-your-strategy"&gt;customer-related best practices to protect customer data&lt;/a&gt;:&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Maintain transparency.&amp;nbsp;&lt;/b&gt;Companies must be transparent with customers, including telling them why the business requires sensitive data and how it uses and&amp;nbsp;protects that information. Effective transparency goes beyond typical privacy statements, and organizations should share this information in an easy-to-understand format.&lt;/p&gt;
 &lt;p&gt;Transparency improves customer confidence, which instills a higher level of trust in the organization. Additionally, if an organization can teach its customers how to protect themselves -- like how to monitor credit card usage -- they feel better about sharing information.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Use authentication protocols.&amp;nbsp;&lt;/b&gt;Authentication aims to prove somebody is the person they claim to be. In the past, typical&amp;nbsp;&lt;a href="https://www.techtarget.com/searchsecurity/tip/Use-these-6-user-authentication-types-to-secure-networks"&gt;authentication protocols&lt;/a&gt;&amp;nbsp;used single-factor authentication that required users to enter a single piece of identifying information, such as a password. Many organizations have shifted to multifactor authentication, where users must enter multiple pieces of identifying information, like a password and an additional code. In many cases, the system sends the code to a user's mobile device.&lt;/p&gt;
 &lt;p&gt;Voice authentication is a lesser-used technology. As the technology improves, it should become a more viable customer identification tool.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/call_center_compliance_checklist-f.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/call_center_compliance_checklist-f_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/call_center_compliance_checklist-f_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/call_center_compliance_checklist-f.png 1280w" alt="Contact center checklist for data security and compliance." height="266" width="560"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;This compliance checklist ensures contact center agents keep customer data safe.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;h3&gt;Business best practices&lt;/h3&gt;
 &lt;p&gt;Organizations should adhere to the following business-related procedures to protect customer data:&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Train employees.&amp;nbsp;&lt;/b&gt;Organizations need to&amp;nbsp;&lt;a href="https://www.techtarget.com/searchcustomerexperience/tip/Best-practices-for-call-center-agent-training-programs"&gt;continuously train contact center agents&lt;/a&gt;&amp;nbsp;to ensure they understand how easily bad actors can steal customer data. Employee training should focus on specific behaviors to protect customer data along with understanding the process to communicate suspicious activity. Training should include the following:&lt;/p&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;Follow smart practices to maximize password strength, like avoiding easily identifiable information.&lt;/li&gt; 
  &lt;li&gt;Shred documents with personal information and don't leave written notes around. Eliminate the need for paper documents wherever possible.&lt;/li&gt; 
  &lt;li&gt;Limit the information sent electronically to customers, like personal medical information.&lt;/li&gt; 
  &lt;li&gt;Don't open attachments or access links unless they come from a reliable source.&lt;/li&gt; 
  &lt;li&gt;Follow facility physical security protocols whether working on-site or remotely.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;&lt;b&gt;Implement improved remote work practices.&lt;/b&gt; Remote employees create new security gaps that can be addressed by the following measures:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Require the use of company-issued devices.&lt;/li&gt; 
  &lt;li&gt;Develop requirements and monitor compliance for home network security and data access.&lt;/li&gt; 
  &lt;li&gt;Don't allow third-party listening systems in the remote workplace.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;&lt;b&gt;Share responsibility for data security.&amp;nbsp;&lt;/b&gt;Everyone, even individuals outside of the contact center, is responsible for customer data security. Organizations can practice broad ownership of customer data security in many ways, including the following:&lt;/p&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;Monitor and&amp;nbsp;&lt;a href="https://www.techtarget.com/searchcustomerexperience/tip/How-to-train-agents-on-call-center-fraud-detection"&gt;report suspicious activity&lt;/a&gt;.&lt;/li&gt; 
  &lt;li&gt;Restrict unauthorized hardware or software and access to questionable websites and documents.&lt;/li&gt; 
  &lt;li&gt;Bring unattended sensitive documents to leadership.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;&lt;b&gt;Use security expertise.&amp;nbsp;&lt;/b&gt;Security expertise is critical to stay ahead of malicious actors. Organizations must bring on staff or use consulting firms that specialize in cybersecurity and other security-related matters.&lt;/p&gt;
 &lt;p&gt;Protecting an organization from security breaches and managing sensitive information isn't a part-time job, and ensuring the proper controls are in place -- and keeping an eye on the future -- requires dedicated effort and expertise.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Test security controls.&amp;nbsp;&lt;/b&gt;Organizations must continuously test their technologies and processes to protect customer data. Business leaders should never assume everything will work as planned, especially when dealing with human behaviors and sophisticated bad actors. Examples of testing security controls include the following:&lt;/p&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;Implement&amp;nbsp;&lt;a href="https://www.techtarget.com/searchcio/definition/security-audit"&gt;security audits&lt;/a&gt;, including security log reviews if a breach occurs.&lt;/li&gt; 
  &lt;li&gt;Scan for malware and other unauthorized software regularly.&lt;/li&gt; 
  &lt;li&gt;Perform office and home workstation reviews to ensure agents follow security best practices.&lt;/li&gt; 
  &lt;li&gt;Include the testing of security controls and the recovery process as part of the overall business continuity planning.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;&lt;b&gt;Prepare for a security breach.&amp;nbsp;&lt;/b&gt;Customers are more likely to feel confident in the recovery process if an organization quickly controls a breach and has an action plan to protect customers. Security breach preparation should be included in&amp;nbsp;&lt;a href="https://www.techtarget.com/searchdisasterrecovery/definition/Business-Continuity-and-Disaster-Recovery-BCDR"&gt;disaster recovery and business continuity plans&lt;/a&gt;&amp;nbsp;with specific actions outlining how and when to notify employees and customers, and how to support continued operations.&lt;/p&gt;
 &lt;p&gt;Business executives and contact center leaders should not get distracted by other initiatives. As security threats become more sophisticated, CX leaders should always prioritize contact center security.&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Scott Sachs is president and founder of SJS Solutions, a consultancy that specializes in contact center strategy assessments and technology selection.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>Follow this comprehensive contact center security checklist that encompasses technology safeguards, customer data protection procedures and common business sense.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/security_a135187239.jpg</image>
            <link>https://www.techtarget.com/searchcustomerexperience/tip/Call-center-security-best-practices-to-protect-customer-data</link>
            <pubDate>Fri, 06 Mar 2026 02:30:00 GMT</pubDate>
            <title>A guide to contact center security best practices</title>
        </item>
        <item>
            <body>&lt;p&gt;Modern hybrid cloud frameworks extend public cloud services into private infrastructure. While these capabilities make building a &lt;a href="https://www.techtarget.com/searchcloudcomputing/definition/hybrid-cloud"&gt;hybrid cloud&lt;/a&gt; easier, the bigger challenge is assembling a tool set that enables effective management of hybrid cloud infrastructure and workloads over the long term -- specifically, by helping to streamline tasks such as hybrid cloud administration, performance optimization, cost management and security.&lt;/p&gt; 
&lt;p&gt;Correct tools are essential, especially as hybrid cloud becomes the default deployment model. According to VMware's "Private Cloud Outlook 2025: The Cloud Reset" &lt;a href="https://www.vmware.com/docs/private-cloud-outlook-2025"&gt;report&lt;/a&gt;, 92% of enterprises run a blend of private and public clouds. Additionally, 75% of respondents said this blended approach is an intentional strategy, which suggests that organizations value the flexibility of a hybrid cloud environment to meet specific use cases.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="Why hybrid cloud management matters"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Why hybrid cloud management matters&lt;/h2&gt;
 &lt;p&gt;In recent years, &lt;a href="https://www.techtarget.com/searchcloudcomputing/definition/public-cloud"&gt;public cloud&lt;/a&gt; vendors have rolled out a new generation of frameworks for hybrid cloud creation -- most notably, Azure Stack Hub and HCI, Azure Arc, AWS Outposts and Google Cloud Anthos. At the same time, more conventional hybrid cloud management platforms, such as VMware Cloud Foundation and Cisco Intersight, continue to thrive. In addition, Kubernetes can be useful as a platform for hybrid cloud management, especially for organizations that use Kubernetes services, like Elastic Kubernetes Service (EKS) Anywhere, to manage workloads deployed on private infrastructure using Amazon's managed Kubernetes service.&lt;/p&gt;
 &lt;p&gt;These platforms provide a centralized way to deploy and administer workloads across a cloud environment that mixes private infrastructure with public cloud resources. Integration between these entities is a significant improvement over earlier hybrid cloud architectures, which more closely resembled a &lt;a href="https://www.techtarget.com/searchcloudcomputing/definition/private-cloud"&gt;private cloud&lt;/a&gt; and a public cloud running side by side. Modern tooling has made creating a hybrid cloud environment easier than ever.&lt;/p&gt;
 &lt;p&gt;Yet, hybrid cloud management remains a major challenge, and the platforms and frameworks mentioned above don't fully solve it. They simplify and centralize the deployment of public cloud services on private infrastructure, but they don't always address hybrid cloud management requirements, such as workload provisioning, log aggregation and analysis, and governance enforcement. These tasks often require additional functionality beyond what's available in hybrid cloud frameworks.&lt;/p&gt;
 &lt;div class="youtube-iframe-container"&gt;
  &lt;iframe id="ytplayer-0" src="https://www.youtube.com/embed/Zae3jApGq-U?autoplay=0&amp;amp;modestbranding=1&amp;amp;rel=0&amp;amp;widget_referrer=null&amp;amp;enablejsapi=1&amp;amp;origin=https://www.techtarget.com" type="text/html" height="360" width="640" frameborder="0"&gt;&lt;/iframe&gt;
 &lt;/div&gt;
 &lt;h3&gt;The importance of visibility in hybrid cloud&lt;/h3&gt;
 &lt;p&gt;Hybrid clouds are, by their nature, especially complex and not fully centralized. Because they mix private and public cloud infrastructure and services, they make it harder to centralize monitoring and management than would be the case with a cloud environment that includes only private or only public resources.&lt;/p&gt;
 &lt;p&gt;Hybrid cloud management demands an especially deep level of visibility. Visibility ensures that organizations have an accurate, continuously updated understanding of the status of all their cloud infrastructure and workloads, including both the private and public cloud components.&lt;/p&gt;
 &lt;p&gt;The lack of effective hybrid cloud visibility can create challenges, such as the following:&lt;/p&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;Service disruptions resulting from failure to detect outages or performance anomalies across the various workloads hosted within a hybrid cloud.&lt;/li&gt; 
  &lt;li&gt;The inability to predict or optimize cloud spending due to poor visibility into the costs of both the private and public cloud infrastructure.&lt;/li&gt; 
  &lt;li&gt;Security risks, which could arise due to inconsistent access controls and governance policies across the private and public parts of the cloud environment.&lt;/li&gt; 
  &lt;li&gt;Difficulty modernizing or migrating hybrid cloud workloads because of a lack of understanding of where each workload resides, what its requirements are and so on.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;          
&lt;section class="section main-article-chapter" data-menu-title="3 types of hybrid cloud management tools"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;3 types of hybrid cloud management tools&lt;/h2&gt;
 &lt;p&gt;The hybrid cloud management landscape is complex. Tools have overlapping functionality. And, since there are multiple approaches to implementing a hybrid cloud architecture -- such as building it directly on top of cloud infrastructure or using a platform like Kubernetes as an abstraction layer -- not all tools apply to all hybrid cloud configurations.&lt;/p&gt;
 &lt;p&gt;That said, hybrid cloud management tools are generally categorized as one of three types of tools:&lt;/p&gt;
 &lt;ol type="1" start="1" class="default-list"&gt; 
  &lt;li&gt;Native tools built into frameworks for building a hybrid cloud.&lt;/li&gt; 
  &lt;li&gt;Third-party tools that integrate with hybrid environments but are not natively included in them.&lt;/li&gt; 
  &lt;li&gt;Tools for managing the physical infrastructure that serves as the foundation for hybrid clouds.&lt;/li&gt; 
 &lt;/ol&gt;
 &lt;h3&gt;1. Native hybrid cloud management tools&lt;/h3&gt;
 &lt;p&gt;The first category of management tools consists primarily of public cloud services that can extend into hybrid cloud environments. For example, if AWS Outposts is used to build a hybrid cloud architecture, the AWS public cloud's standard management tools -- including CloudWatch and CloudTrail -- can be used to help monitor the hybrid environment and manage logs. The Azure Stack suite of products provides a similar experience by integrating with Microsoft Azure public cloud's standard monitoring tools. Anthos does this as well, using Google Cloud Console.&lt;/p&gt;
 &lt;p&gt;Platforms such as VMware Cloud Foundation and Kubernetes can be tied into some public cloud vendors' services, too. But, for the most part, they don't extend public cloud management tooling into hybrid environments. Instead, users manage hybrid environments via the native tooling that's built into the platforms, such as kubectl on Kubernetes. That said, some integrations between these platforms and public cloud platforms exist. For example, it's possible to use the AWS Identity and Access Management framework to govern some permissions within Kubernetes environments hosted by using Amazon EKS, a Kubernetes service available through the Amazon cloud.&lt;/p&gt;
 &lt;h3&gt;2. Third-party hybrid cloud monitoring and management tools&lt;/h3&gt;
 &lt;p&gt;Because of limitations in native hybrid cloud management tools, it's sometimes necessary to add third-party management tools. These tools can offer broader, richer functionality. They also offer the advantage of working across multiple cloud platforms at once, which is usually not the case when using cloud provider tools. This capability makes third-party hybrid cloud tools useful for businesses whose cloud strategy includes &lt;a href="https://www.techtarget.com/searchcloudcomputing/feature/Multi-cloud-vs-hybrid-cloud-and-how-to-know-the-difference"&gt;multiple public clouds in addition to a hybrid cloud&lt;/a&gt;.&lt;/p&gt;
 &lt;h3&gt;3. Physical infrastructure integration and management&lt;/h3&gt;
 &lt;p&gt;Hybrid cloud management isn't just about digital assets. It also extends to the physical hardware that hosts hybrid clouds. It's necessary to keep track of the servers, which hardware resources they provide and whether they're adequate to meet the hybrid cloud architecture's needs. Cloud providers have &lt;a href="https://www.techtarget.com/searchcloudcomputing/tip/Evaluate-on-premises-vs-cloud-computing-pros-and-cons"&gt;extended their reach to on-premises&lt;/a&gt; by bundling hardware with services and linking back up to their clouds. These products eliminate the need for an enterprise to manage physical infrastructure. But, sometimes, there are tradeoffs.&lt;/p&gt;
 &lt;p&gt;For instance, with AWS Outposts, the servers must be acquired directly from AWS. On other hybrid cloud platforms, however, a company typically purchases and manages its own hardware.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/weighing_hybrid_cloud_connectivity_factors-f.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/weighing_hybrid_cloud_connectivity_factors-f_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/weighing_hybrid_cloud_connectivity_factors-f_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/weighing_hybrid_cloud_connectivity_factors-f.png 1280w" alt="Six connectivity parameters when building and managing hybrid cloud architectures" height="426" width="560"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Six connectivity parameters when building and managing hybrid cloud architectures.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
&lt;/section&gt;             
&lt;section class="section main-article-chapter" data-menu-title="Top hybrid cloud management tools"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Top hybrid cloud management tools&lt;/h2&gt;
 &lt;p&gt;Hybrid cloud management tools represent a complex ecosystem that has evolved significantly in recent years through acquisitions and new product launches. The evolution is likely to continue, making it important to keep up to date with the hybrid cloud tooling landscape.&lt;/p&gt;
 &lt;p&gt;At present, key vendors and offerings include the following:&lt;/p&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Amazon (CloudFormation, Amazon CloudWatch and AWS CloudTrail).&lt;/b&gt; These cloud services integrate with Amazon's hybrid cloud frameworks -- particularly Outposts and EKS Anywhere -- to provide visibility and monitoring capabilities. Turnkey integration among AWS services makes them especially easy to deploy.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Broadcom (VMware Tanzu CloudHealth and Tanzu Observability).&lt;/b&gt; Originally built to help administer VMware-centric private and hybrid cloud environments, these offerings are now part of the Broadcom portfolio and support virtually all types of hybrid environments, not just those built using VMware and Broadcom technology.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;CloudBolt Software.&lt;/b&gt; Offers a suite of products for hybrid cloud monitoring, reporting and compliance management, with particularly strong capabilities in automated governance policy enforcement.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;CloudSphere (Illuminate360).&lt;/b&gt; A holistic IT monitoring and visibility offering that can deliver visibility into hybrid cloud environments as well as on-premises, private clouds and public clouds.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Flexera (Snow Commander).&lt;/b&gt; Built up through a series of acquisitions, Snow Commander aims to provide a highly automated approach to hybrid cloud management and monitoring. User self-service capabilities further reduce the administrative burden placed on IT staff.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Google Cloud (Google Cloud Operations).&lt;/b&gt; A visibility tool complete with monitoring, logging, debugging and tracing capabilities that integrates easily with hybrid clouds built on top of Google Cloud using Anthos.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;HPE (HPE Morpheus).&lt;/b&gt; Creates a centralized control plane for monitoring and tracking hybrid cloud environments built using virtually any underlying platform, such as AWS, Azure, Google Cloud, VMware, Kubernetes and others. It is notable for strong vendor agnosticism.&amp;nbsp;&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;IBM Cloud Pak for Multi Cloud Management.&lt;/b&gt; A hybrid cloud management and monitoring service that integrates most tightly with Red Hat OpenShift -- a Kubernetes-based management platform owned by IBM. Although the product is tightly coupled with IBM's native cloud offerings, it can support third-party environments so long as they also run a version of OpenShift.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Micro Focus Hybrid Cloud Management X (HCMX).&lt;/b&gt; Provides a highly centralized approach to managing and monitoring workloads across virtually any hybrid or multi-cloud environment, with a strong focus on compliance and cost management.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Microsoft (Microsoft Azure Automation and Azure Monitor).&lt;/b&gt; These services integrate seamlessly with hybrid clouds constructed using Azure Arc or Hub solutions.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Scalr.&lt;/b&gt; Aims to centralize hybrid cloud and multi-cloud management by using infrastructure as code to automate workload deployment, provisioning and governance. It offers a few native monitoring and observability capabilities but can integrate with third-party tools to fill this gap.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;The tools should work with all parts of the IT infrastructure and cover all related management needs -- something that native management tools built into hybrid cloud frameworks sometimes can't do.&lt;/p&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="Evaluation criteria for hybrid cloud management tools"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Evaluation criteria for hybrid cloud management tools&lt;/h2&gt;
 &lt;p&gt;Given the wide selection of &lt;a target="_blank" href="https://www.gartner.com/reviews/market/cloud-management-tooling" rel="noopener"&gt;hybrid cloud management tools available&lt;/a&gt; and the varying use cases they support, organizations should weigh a range of factors when considering options. These are some key areas of evaluation:&lt;/p&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Platform support.&lt;/b&gt; Not all hybrid cloud management tools work with all types of cloud platforms. For instance, some logging and monitoring tools might work with the public cloud platform on which the hybrid cloud is partly based. But they might not work well -- or at all -- with the abstraction layer, such as Kubernetes or Cloud Foundation, that runs on top of it.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Tool integrations.&lt;/b&gt; Consider how well the tools integrate with other offerings. For instance, if a hybrid cloud management tool automates log and metric collection, does it integrate well with analytics tools to help interpret them?&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Centralized visibility and operations.&lt;/b&gt; Some management platforms are stronger than others regarding their ability to support all aspects of hybrid cloud administration, asset tracking, workload deployment and so on via a single, centralized vantage point.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Prescriptive and predictive capabilities.&lt;/b&gt; In addition to providing visibility into hybrid cloud environments, some tools offer features to predict how workloads will evolve over time and provide recommendations to support goals such as cost optimization.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Security monitoring.&lt;/b&gt; While performance and availability monitoring are the main focus of most hybrid cloud management tools, some also offer security monitoring and threat detection capabilities.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;&lt;i&gt;Chris Tozzi, senior editor of content and a DevOps analyst at Fixate IO, has worked as a journalist and Linux systems administrator with particular interest in open source Agile infrastructure and networking.&lt;/i&gt;&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;&lt;i&gt;Editor's note:&lt;/i&gt;&lt;/b&gt;&lt;i&gt;&amp;nbsp;This article originally published in 2023 and was updated in 2026 to include more hybrid cloud management tools.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>The techniques used to build hybrid cloud architectures have come a long way, but managing these environments long term is plenty more complex without the right software.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/cloud_g1183958722.jpg</image>
            <link>https://www.techtarget.com/searchcloudcomputing/feature/Top-enterprise-hybrid-cloud-management-tools-to-review</link>
            <pubDate>Mon, 02 Mar 2026 15:15:00 GMT</pubDate>
            <title>Top enterprise hybrid cloud management tools to review</title>
        </item>
        <item>
            <body>&lt;p&gt;Customer relationships with a business often deepen after a purchase, through ongoing service and support interactions handled by the contact center.&lt;/p&gt; 
&lt;p&gt;Contact center agents are on the front lines, representing the organization when customers encounter problems that require timely, effective resolution. And customers want their issues solved quickly, efficiently and with a smile.&lt;/p&gt; 
&lt;p&gt;When agents don't perform at their best, customers can get a bad impression of the organization, which might translate into a loss of revenue if customers decide to take their business elsewhere. On the flip side, agents well versed in their job can turn irate customers into loyal ones, increasing customer retention and profit.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="What factors contribute to declining agent performance?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;What factors contribute to declining agent performance?&lt;/h2&gt;
 &lt;p&gt;There are many reasons agents don't perform at their best, many of which also contribute directly to &lt;a href="https://www.techtarget.com/searchcustomerexperience/definition/contact-center-burnout"&gt;contact center burnout&lt;/a&gt; and attrition. Some of those reasons include the following:&lt;/p&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;Outdated or obsolete contact center technology.&lt;/li&gt; 
  &lt;li&gt;Poor agent training and onboarding.&lt;/li&gt; 
  &lt;li&gt;Inefficient processes.&lt;/li&gt; 
  &lt;li&gt;Overworked agents due to inadequate staffing.&lt;/li&gt; 
  &lt;li&gt;Lack of communication from leadership.&lt;/li&gt; 
  &lt;li&gt;No advancement opportunities.&lt;/li&gt; 
  &lt;li&gt;&lt;a href="https://www.techtarget.com/whatis/feature/Signs-of-toxic-workplace-culture"&gt;Toxic work environment&lt;/a&gt;.&lt;/li&gt; 
  &lt;li&gt;Low employee morale.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="10 strategies to help contact center agents perform at their best"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;10 strategies to help contact center agents perform at their best&lt;/h2&gt;
 &lt;p&gt;Keeping contact center agents productive -- especially as more of them work from home -- is difficult, but not impossible. Businesses can improve contact center agent performance in several ways. The goal is to assist agents in meeting their performance goals while enhancing overall customer satisfaction.&lt;/p&gt;
 &lt;h3&gt;1. Diagnose underlying performance issues&lt;/h3&gt;
 &lt;p&gt;Contact center managers should analyze the data gathered from an &lt;a href="https://www.techtarget.com/searchcustomerexperience/tip/Best-practices-for-contact-center-quality-assurance"&gt;agent's evaluation in quality assurance forms&lt;/a&gt; to determine where performance opportunities exist and identify any trends. These forms will show whether an agent consistently receives low or failing scores in certain metrics or from &lt;a href="https://www.techtarget.com/searchcustomerexperience/tip/Best-practices-for-call-center-monitoring"&gt;data collected in a call monitoring program&lt;/a&gt;.&lt;/p&gt;
 &lt;p&gt;Managers should also determine if there are multiple agent performance issues, such as problems with communication skills, adhering to processes, accessing customer data and processing transactions.&lt;/p&gt;
 &lt;p&gt;Another way to gain insights is by conducting side-by-side sessions with agents working in the office to see firsthand where and when challenges arise or if work habits contribute to their performance issues. Based on the results of the trend analysis and observations from side-by-side sessions, contact center managers can identify the underlying causes of performance problems.&lt;/p&gt;
 &lt;p&gt;Patterns that appear across multiple agents often indicate process or technology gaps rather than individual performance problems.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/addressing_the_demands_of_todays_complex_contact_centers-f.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/addressing_the_demands_of_todays_complex_contact_centers-f_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/addressing_the_demands_of_todays_complex_contact_centers-f_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/addressing_the_demands_of_todays_complex_contact_centers-f.png 1280w" alt="List of challenges and remedies to address the demands of complex contact centers." height="487" width="560"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Today's contact center presents numerous challenges for agents and their managers, but there are remedies.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;h3&gt;2. Record and monitor calls&lt;/h3&gt;
 &lt;p&gt;Contact center software often includes a call monitoring feature, enabling contact center managers to review recorded calls or listen to them in real time. Monitoring calls lets managers identify customer pain points and where agents need additional training.&lt;/p&gt;
 &lt;p&gt;Contact center managers increasingly use AI-based call analysis tools to review large volumes of interactions and surface patterns that manual monitoring would miss. Managers can &lt;a href="https://www.techtarget.com/searchcustomerexperience/feature/Important-contact-center-AI-features-and-their-benefits"&gt;use AI to comb through customer contact data&lt;/a&gt; -- recorded calls, emails, chat logs and customer feedback -- to uncover patterns and trends, improve contact center operations and better serve the customer.&lt;/p&gt;
 &lt;h3&gt;3. Review key performance indicators&lt;/h3&gt;
 &lt;p&gt;If management finds multiple agents are failing &lt;a href="https://www.techtarget.com/searchcustomerexperience/tip/Top-7-call-center-agent-performance-metrics-to-track"&gt;according to the same performance metrics&lt;/a&gt;, it might be time to take a closer look.&lt;/p&gt;
 &lt;p&gt;Average handling time is one &lt;a href="https://www.techtarget.com/searchbusinessanalytics/definition/key-performance-indicators-KPIs"&gt;KPI&lt;/a&gt; that businesses might need to address. If AHT is too short, agents might be rushing through customer interactions to meet their goals. Customers will also often end up with unresolved issues and be forced to reach out again.&lt;/p&gt;
 &lt;p&gt;If AHT is too long, there could be longer wait times for customers. But that's not necessarily a bad thing. Long AHT might be due to new or upgraded business products or services that customers need assistance with, technical difficulties that require more time or a focus on &lt;a href="https://www.techtarget.com/searchcustomerexperience/definition/first-call-resolution-FCR"&gt;first contact resolution&lt;/a&gt;.&lt;/p&gt;
 &lt;p&gt;Issues with AHT are best addressed by setting acceptable ranges instead of rigid targets, balancing efficiency with first contact resolution and customer satisfaction.&lt;/p&gt;
 &lt;h3&gt;4. Create an action plan&lt;/h3&gt;
 &lt;p&gt;An action plan should address underlying issues while clearly defining expectations, support resources and success criteria. Contact center managers should identify all available resources to support the agent's skill development, including the following:&lt;/p&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;Provide additional agent training or &lt;a href="https://www.techtarget.com/searchcustomerexperience/tip/Best-practices-for-call-center-agent-training-programs"&gt;goal-oriented uptraining sessions&lt;/a&gt;.&lt;/li&gt; 
  &lt;li&gt;Make reference materials or job aids available.&lt;/li&gt; 
  &lt;li&gt;Offer additional system or communication skills training.&lt;/li&gt; 
  &lt;li&gt;Regularly assign time for the agent to sit with an overperforming colleague to learn the proper way to handle customer interactions.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;figure class="main-article-image half-col" data-img-fullsize="https://www.techtarget.com/rms/onlineImages/searchcrm_callcenter.jpg"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineImages/searchcrm_callcenter_half_column_mobile.jpg" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineImages/searchcrm_callcenter_half_column_mobile.jpg 960w,https://www.techtarget.com/rms/onlineImages/searchcrm_callcenter.jpg 1280w" alt="Photo of two agents engaging in a side-by-side call center session." data-credit="Steve Debenport/Getty Images" height="186" width="279"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Side-by-side sessions can be key to improving agent performance.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;h3&gt;5. Communicate with agents&lt;/h3&gt;
 &lt;p&gt;Depending on the structure of an organization, the quality assurance or the contact center manager should discuss performance issues with the agent. Be sure the agent understands the quality of evaluation metrics and how calls are scored.&lt;/p&gt;
 &lt;p&gt;The assessment must be constructive and include recognition of the agent's strengths and performance opportunities. Review the action plan with the agent and emphasize that the program's intent is to provide help and support. It's also important for contact center managers to communicate any policy changes immediately so that agents know what's expected of them and they don't fall behind from the get-go.&lt;/p&gt;
 &lt;h3&gt;6. Provide consistent feedback and reward improvements&lt;/h3&gt;
 &lt;p&gt;The most effective agent performance improvement programs provide continuous, constructive feedback that reinforces progress and builds confidence. When an agent struggles to perform, it's important for managers to recognize and praise incremental improvement.&lt;/p&gt;
 &lt;p&gt;Managers should conduct routine evaluations of the agent's contacts and provide timely feedback. Provide additional targeted coaching sessions to address the agent's specific needs to reinforce what they're doing right. These actions will improve overall contact center performance and &lt;a href="https://www.techtarget.com/searchcustomerexperience/tip/How-to-improve-the-contact-center-experience-for-customers"&gt;create a better customer experience&lt;/a&gt;.&lt;/p&gt;
 &lt;p&gt;But employee recognition shouldn't just be limited to job improvement. Recognition can include employment anniversaries, birthdays or a simple thank-you to employees during a company celebration. It can improve employee engagement, individual well-being and company culture.&lt;/p&gt;
 &lt;h3&gt;7. Implement a knowledge base&lt;/h3&gt;
 &lt;p&gt;Implementing a customer service &lt;a href="https://www.techtarget.com/whatis/definition/knowledge-base"&gt;knowledge base&lt;/a&gt; benefits customers and agents. An external, or public-facing, knowledge base enables customers to find answers to basic questions without the need for human assistance, which can increase customer satisfaction. In return, it eliminates unnecessary customer contacts and frees up agents for more important customer issues.&lt;/p&gt;
 &lt;p&gt;When well maintained, knowledge bases reduce handle times and cognitive load for agents while improving consistency for customers.&lt;/p&gt;
 &lt;p&gt;An internal knowledge base accessed by agents enables them to quickly find answers to questions and accurately resolve customer problems. Internal knowledge bases can also store training materials on contact center software and processes for agents who need a quick brushup.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineImages/crm-call_center_agent_characteristics.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineImages/crm-call_center_agent_characteristics_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineImages/crm-call_center_agent_characteristics_mobile.png 960w,https://www.techtarget.com/rms/onlineImages/crm-call_center_agent_characteristics.png 1280w" alt="List of top qualities of a contact center agent." height="288" width="559"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;A successful contact center agent communicates effectively and calmly, providing a positive customer experience.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;h3&gt;8. Empower agents&lt;/h3&gt;
 &lt;p&gt;Contact center agents need to feel valued and part of the team. Managers can take several steps to empower agents, including the following:&lt;/p&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;Involve agents in decision-making and ask for their feedback. They are on the front lines and often know where to make changes.&lt;/li&gt; 
  &lt;li&gt;Provide agents with the proper tools. Be sure they have access and can log in to all the necessary software to do their job. Also consider upgrading to the latest technologies. If agents are forced to use obsolete tech, their job could be more difficult and compound the frustration for agents and customers.&lt;/li&gt; 
  &lt;li&gt;Enable agents to make decisions. Provide agents with a certain amount of funds, for example, to credit a customer's account, eliminating supervisor involvement and expediting the process, or let agents deviate from their scripts when it's necessary to resolve a customer problem.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;h3&gt;9. Provide customer self-service channels&lt;/h3&gt;
 &lt;p&gt;&lt;a href="https://www.techtarget.com/whatis/definition/customer-self-service-CSS"&gt;Customer self-service&lt;/a&gt; channels can reduce pressure on frontline agents, but only when customers can easily escalate to a human if self-service fails. CSS is also available 24/7 so that customers can contact a company at a convenient time. Types of CSS channels include the following:&lt;/p&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;FAQ pages are connected to a knowledge base on the company website. They should include information like operating hours, return policies, shipping information, contact information and how to make a payment.&lt;/li&gt; 
  &lt;li&gt;&lt;a href="https://www.techtarget.com/searchcustomerexperience/definition/Interactive-Voice-Response-IVR"&gt;Interactive voice response&lt;/a&gt; systems eliminate the need for a switchboard operator. When customers call in, the IVR presents a menu of options that attempts to answer FAQs.&lt;/li&gt; 
  &lt;li&gt;Online chatbots on a company's website can be connected to a knowledge base or use AI and machine learning. AI chatbots use natural language processing and natural language understanding to interpret customer queries and respond. They can also use machine learning and &lt;a href="https://www.techtarget.com/whatis/definition/large-language-model-LLM"&gt;large language models&lt;/a&gt; to provide better service.&lt;/li&gt; 
  &lt;li&gt;Video tutorials can be helpful to customers who are troubleshooting a product or service by providing simple instructions on how to do basic tasks.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;CSS tools won't always address a customer's needs, so it's important to provide an easy way out of the self-service loop for customers who need to speak with a human agent.&lt;/p&gt;
 &lt;h3&gt;10. Use skills-based routing&lt;/h3&gt;
 &lt;p&gt;Poor distribution of &lt;a href="https://www.techtarget.com/searchunifiedcommunications/definition/inbound-call"&gt;inbound calls&lt;/a&gt;, emails, chat messages and texts can irritate customers and reduce agent productivity. Skills-based routing, or skills-based distribution, directs a customer call to an agent with the most relevant skills, expertise and language fluency. Customers who speak Portuguese, for example, can be matched up with an agent fluent in that language, or a customer with a billing problem can be routed to an agent who specializes in billing.&lt;/p&gt;
 &lt;p&gt;This approach increases first-contact resolution, reduces unnecessary transfers and improves both agent confidence and customer experience. Agents also feel more confident in their abilities when customers are matched with their skill sets.&lt;/p&gt;
 &lt;p&gt;Across these strategies, the common theme is enabling agents with better context, clearer expectations and tools that reduce friction rather than add complexity. Improving contact center agent performance requires more than monitoring metrics or adding new tools. Organizations that invest in training, feedback, routing and self-service -- while giving agents the context and authority to resolve issues -- are better positioned to improve customer satisfaction, &lt;a target="_blank" href="https://www.nice.com/info/5-employee-retention-strategies-to-reduce-contact-center-agent-attrition" rel="noopener"&gt;reduce attrition&lt;/a&gt; and strengthen long-term customer relationships.&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Sarah Amsler is a senior managing editor for the IT strategy team at TechTarget.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>Contact center agent performance improves when organizations combine training, feedback, routing and self-service with the right data, tools and support.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/customer_service02.jpg</image>
            <link>https://www.techtarget.com/searchcustomerexperience/answer/5-ways-to-improve-call-center-agent-performance</link>
            <pubDate>Fri, 27 Feb 2026 12:00:00 GMT</pubDate>
            <title>10 strategies to improve contact center agent performance</title>
        </item>
        <item>
            <body>&lt;p&gt;Contact centers sit at the intersection of customer experience, brand trust and operational efficiency. As customer expectations rise and AI becomes embedded in service operations, the challenges facing contact centers have grown more complex -- and more consequential.&lt;/p&gt; 
&lt;p&gt;Customer service has moved beyond single-channel support, with contact centers now expected to manage interactions across voice and digital channels while maintaining consistency, context and speed. Contact centers have &lt;a href="https://www.techtarget.com/searchcustomerexperience/feature/Call-center-vs-contact-center-Whats-the-difference"&gt;evolved beyond mere call-handling hubs&lt;/a&gt; into sophisticated, multichannel engagement centers that play a vital role in shaping customer experiences. With the advent of digital transformation, contact centers now integrate various communication platforms, including phone calls, email, chat, social media and video conferencing.&lt;/p&gt; 
&lt;p&gt;The commercial landscape for businesses and customers is rapidly changing, &lt;a href="https://www.techtarget.com/searchcustomerexperience/feature/Important-contact-center-AI-features-and-their-benefits"&gt;driven by technological advancements&lt;/a&gt;, evolving customer expectations and the increasing importance of personalized service. Enterprises are under pressure to deliver consistent, high-quality customer interactions over different modes of communication, while managing costs and maintaining operational efficiency.&lt;/p&gt; 
&lt;p&gt;Customer interactions now span multiple channels, yet customers expect consistent context, personalization and responsiveness regardless of how they engage. This complex environment necessitates a strategic approach to managing contact centers, addressing inherent challenges and &lt;a href="https://www.techtarget.com/searchcustomerexperience/How-to-choose-a-contact-center-software-system"&gt;using technology to enhance customer service capabilities&lt;/a&gt;.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="Key contact center challenges and remedies"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Key contact center challenges and remedies&lt;/h2&gt;
 &lt;p&gt;Providing different modes of interaction is among the many challenges for modern contact centers. Other issues include agent attrition, increased customer expectations, ever-growing customer queues, generalization of content, barriers to understanding and security.&lt;/p&gt;
 &lt;h3&gt;1. Meeting customer expectations&lt;/h3&gt;
 &lt;p&gt;Customers expect quick, personalized and seamless interactions across all channels. They also expect an interaction in one channel to be consistent with the experience they've had in other channels. They increasingly demand high levels of service and are less tolerant of delays, repeating their information and impersonal responses.&lt;/p&gt;
 &lt;p&gt;Advanced CRM systems and AI-driven analytics can help understand, contextualize and anticipate customer needs, &lt;a href="https://www.techtarget.com/searchcustomerexperience/tip/How-to-comprehensively-personalize-the-customer-experience"&gt;enabling more personalized and consistent interactions&lt;/a&gt;. Regularly updating service protocols to align with customer feedback is equally important.&lt;/p&gt;
 &lt;p&gt;Meeting these expectations increasingly depends on how well organizations unify customer data and govern AI-assisted interactions across channels, not just on agent performance alone.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/addressing_the_demands_of_todays_complex_contact_centers-f.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/addressing_the_demands_of_todays_complex_contact_centers-f_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/addressing_the_demands_of_todays_complex_contact_centers-f_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/addressing_the_demands_of_todays_complex_contact_centers-f.png 1280w" alt="Contact center challenges and remedies" height="487" width="560"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;For every challenge confronting contact centers, there's a remedy.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;h3&gt;2. High contact volumes and longer wait times&lt;/h3&gt;
 &lt;p&gt;Managing the high volumes of customer contacts, especially during peak times, can lead to long wait times and customer dissatisfaction. When customers call into contact centers of certain businesses, the first response they might typically get is a recording, "We're currently experiencing high call volumes" -- at least during normal business hours. This kind of experience, exacerbated by limited staffing and inefficient call routing, frustrates customers.&lt;/p&gt;
 &lt;p&gt;Implementing intelligent call routing and queuing systems can optimize resource allocation and reduce wait times. Most new systems &lt;a href="https://www.techtarget.com/searchcustomerexperience/tip/How-to-manage-remote-call-center-agents"&gt;enable contact center agents to work from home&lt;/a&gt;, which increases the flexibility of companies deploying agents globally. Self-service options, such as chatbots and automated responses, can reduce contact volumes, but they also raise expectations for the quality and efficiency of the interactions that reach live agents.&lt;/p&gt;
 &lt;p&gt;Chatbots can handle routine types of interactions, like password resets, quick orders and simple questions, but complex situations that require empathy and understanding are still best left to humans. Improvements in machine learning and AI can also help mitigate high contact volumes and wait times and provide customers with other ways to resolve their queries independently.&lt;/p&gt;
 &lt;h3&gt;3. Personalization shortfalls and content generification&lt;/h3&gt;
 &lt;p&gt;Generic responses and interactions usually fail to meet customer expectations for personalized service. This lack of personalization inevitably results in decreased customer satisfaction and loyalty.&lt;/p&gt;
 &lt;p&gt;Using &lt;a href="https://www.techtarget.com/searchcustomerexperience/tip/Customer-interaction-analytics-spurs-better-business-results"&gt;customer data and analytics to tailor interactions&lt;/a&gt; and recommendations can improve personalization, but doing so effectively requires strong data governance and consistent context across channels. Training call center agents to express empathy and use customer information effectively during their interactions is especially important. New large language models can improve the quality of agent responses by combining the specifics of customer data with best practices in knowledge bases.&lt;/p&gt;
 &lt;h3&gt;4. Language barriers&lt;/h3&gt;
 &lt;p&gt;Contact centers often serve a diverse, global customer base. Language barriers can impede effective communication, leading to misunderstandings and frustration. Any enterprise that aspires to be global must deal with this issue. Even companies that see themselves as local will become global when they put their presence on the web.&lt;/p&gt;
 &lt;p&gt;Hiring multilingual agents and providing language training can bridge communication gaps. Additionally, real-time translation services and AI-powered language tools have come a long way and can facilitate smoother interactions.&lt;/p&gt;
 &lt;h3&gt;5. Agent attrition&lt;/h3&gt;
 &lt;p&gt;High turnover rates among contact center agents &lt;a href="https://www.techtarget.com/searchcustomerexperience/tip/Why-contact-centers-have-high-turnover-and-how-to-combat-it"&gt;pose a significant challenge&lt;/a&gt;. Increased job openings and competition for talent in good economies can only make this problem worse. Attrition is usually costly, impacting operational efficiency and the quality of customer interactions. Factors contributing to high attrition include job stress, lack of career advancement opportunities and inadequate compensation.&lt;/p&gt;
 &lt;p&gt;In many environments, tool sprawl and cognitive overload also contribute to burnout, making technology simplification as important as compensation and career development.&lt;/p&gt;
 &lt;p&gt;Good customer service is vital to retention and brand loyalty. &lt;a href="https://www.techtarget.com/searchcustomerexperience/tip/Best-practices-for-call-center-agent-training-programs"&gt;Implementing comprehensive training programs&lt;/a&gt;, offering competitive salaries and creating clear career progression paths can help reduce attrition. Providing a supportive work environment and recognizing agent contributions also play a crucial role in retaining talent. Technology has made it possible for more agents to work remotely, enabling companies to find the best qualified representatives wherever they're located.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/average_call_center_agent_salaries-f.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/average_call_center_agent_salaries-f_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/average_call_center_agent_salaries-f_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/average_call_center_agent_salaries-f.png 1280w" alt="Contact center agent salaries in the U.S." height="403" width="560"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Contact center agents in some regions demand higher than average salaries.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;h3&gt;&amp;nbsp;6. Lack of subject matter expertise&lt;/h3&gt;
 &lt;p&gt;Agents often face complex queries requiring specialized knowledge. As the "first line of defense" in resolving customer inquiries, it's often difficult, if not impossible, for contact center agents to achieve mastery or even appear to be knowledgeable in all aspects of company products. The result could be incorrect or inadequate information conveyed to the customer.&lt;/p&gt;
 &lt;p&gt;&lt;a href="https://www.techtarget.com/searchcustomerexperience/answer/5-ways-to-improve-call-center-agent-performance"&gt;Continuous training and access to a centralized knowledge base&lt;/a&gt; can empower remote work agents with the necessary information to handle complex queries effectively. Encouraging collaboration and knowledge sharing among agents can also enhance overall understanding.&lt;/p&gt;
 &lt;h3&gt;7. Quantitative and qualitative performance metrics&lt;/h3&gt;
 &lt;p&gt;&lt;a href="https://www.techtarget.com/searchcustomerexperience/tip/Top-7-call-center-agent-performance-metrics-to-track"&gt;Accurately measuring and analyzing contact center performance&lt;/a&gt; is essential for continuous improvement. Traditional metrics often don't fully capture the quality of customer interactions or agent performance since measuring customer satisfaction can often be subjective.&lt;/p&gt;
 &lt;p&gt;Adopting a comprehensive set of KPIs that include quantitative &lt;i&gt;and&lt;/i&gt; qualitative metrics can provide a more accurate picture of performance. Incorporating customer feedback and sentiment analysis into performance reviews can also provide valuable insights and a more holistic view of contact center effectiveness.&lt;/p&gt;
 &lt;h3&gt;8. Data access vs. protection&lt;/h3&gt;
 &lt;p&gt;Contact centers store and handle sensitive customer information, making data security a foundational requirement for customer trust rather than a secondary compliance concern. As the types and frequency of interactions increase, breaches are becoming more frequent and consequential, leading to significant financial and reputational damage. More sophisticated deep fakes are rendering voice recognition ineffective as a method of customer verification.&lt;/p&gt;
 &lt;p&gt;&lt;a href="https://www.techtarget.com/searchcustomerexperience/tip/Call-center-security-best-practices-to-protect-customer-data"&gt;Implementing comprehensive cybersecurity measures&lt;/a&gt;, including encryption, multifactor authentication, and regular security audits, safeguard customer data. Sensitive customer data can be better protected through advanced security protocols, security tools such as system scanners with &lt;a href="https://www.techtarget.com/searchcustomerexperience/tip/How-to-train-agents-on-call-center-fraud-detection"&gt;data loss prevention, and fraud detection&lt;/a&gt;. Most companies need to adopt zero trust architectures and principles, and agents need to be trained on data protection protocols. It should be standard practice to have a culture of security awareness, including periodic companywide security training.&lt;/p&gt;
 &lt;p&gt;Across these challenges, AI increasingly acts as both a solution and a source of new complexity, raising the bar for data quality, governance and trust in contact center operations.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineImages/crm-contact_centers.jpg"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineImages/crm-contact_centers_mobile.jpg" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineImages/crm-contact_centers_mobile.jpg 960w,https://www.techtarget.com/rms/onlineImages/crm-contact_centers.jpg 1280w" alt="Multifunctional contact centers" height="288" width="559"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Contact centers are evolving into complex facilities that meet business and customer needs.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
&lt;/section&gt;                                 
&lt;section class="section main-article-chapter" data-menu-title="Build on flexibility, scalability and humanity"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Build on flexibility, scalability and humanity&lt;/h2&gt;
 &lt;p&gt;Addressing contact center challenges requires more than incremental tooling changes. As customer expectations rise and AI reshapes service interactions, contact centers must balance efficiency with empathy, automation with oversight, and data access with security. Organizations that approach these challenges strategically -- rather than tactically -- are better positioned to turn their contact centers into long-term assets rather than ongoing cost centers.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Editor's note:&lt;/b&gt;&lt;i&gt;&amp;nbsp;This article has been updated to reflect the changing nature of modern contact center challenges.&lt;/i&gt;&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Jerald Murphy is senior vice president of research and consulting at Nemertes Research. He has more than three decades of technology experience, including neural networking research, integrated circuit design, computer programming, global data center designing and CEO of a managed services company.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>Modern contact centers face persistent challenges around customer expectations, staffing and data access. Addressing them requires more than incremental operational fixes.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/chatbot_g1250576636.jpg</image>
            <link>https://www.techtarget.com/searchcustomerexperience/tip/Contact-center-challenges-and-how-to-overcome-them</link>
            <pubDate>Wed, 11 Feb 2026 00:00:00 GMT</pubDate>
            <title>8 contact center challenges and how to address them</title>
        </item>
        <item>
            <body>&lt;p&gt;Contact center software has existed since the dawn of digital contact centers decades ago. But, in recent years, the contact center software industry has changed significantly.&lt;/p&gt; 
&lt;p&gt;New technologies, such as generative AI, have spawned powerful and innovative contact center features. Hyperscalers, too, like Microsoft and Amazon, have entered the space, hoping to use their command of adjacent markets to claim a slice of the contact center software ecosystem.&lt;/p&gt; 
&lt;p&gt;All these developments prompt a re-evaluation of &lt;a href="https://www.techtarget.com/searchcustomerexperience/feature/The-ultimate-guide-to-contact-center-modernization"&gt;modern contact center platform options&lt;/a&gt;. Below, we identify the leading contact center platforms and summarize their key features and drawbacks so businesses can make informed decisions when evaluating these products.&lt;/p&gt; 
&lt;p&gt;In developing this list, we examined research and independent user reviews from leading analyst firms and buyer intelligence platforms. Based on this analysis, we created an unranked list of the top 19 contact center platforms. The list is in alphabetical order.&lt;/p&gt; 
&lt;p&gt;The software providers range from new players to more established vendors. While they all deliver &lt;a href="https://www.techtarget.com/searchcustomerexperience/How-to-choose-a-contact-center-software-system"&gt;core contact center software capabilities&lt;/a&gt;, they vary in areas like major features, pricing, AI capabilities, scalability and integrations.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="1. 8x8"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;1. 8x8&lt;/h2&gt;
 &lt;p&gt;Founded in 1987, 8x8 has built up its contact center platform over many years, largely through acquisitions. What began as a basic voice calling tool has evolved into a full-fledged platform for multi-channel customer interaction.&lt;/p&gt;
 &lt;h3&gt;Key features&lt;/h3&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Analytics.&lt;/b&gt; Detailed analytics and reporting provide real-time feedback on customer interactions.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Intelligent call routing.&lt;/b&gt; Interactive voice response and customized call routing help to personalize the &lt;a href="https://www.techtarget.com/searchcustomerexperience/definition/customer-experience-CX"&gt;customer experience&lt;/a&gt; (CX).&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Extensive CRM integration.&lt;/b&gt; Integrations with popular CRM platforms make it easy to use CRM data during customer interactions.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;h3&gt;Scalability&lt;/h3&gt;
 &lt;p&gt;8x8's cloud-based hosting model allows the platform's software to scale easily. Flexible licensing also helps enable scalability from a purchasing standpoint.&lt;/p&gt;
 &lt;h3&gt;Integrations&lt;/h3&gt;
 &lt;p&gt;8x8 integrates by default with major CRM and communications platforms like Salesforce, HubSpot and Microsoft Teams. An API enables custom integrations.&lt;/p&gt;
 &lt;h3&gt;Pricing&lt;/h3&gt;
 &lt;p&gt;Pricing varies widely depending on feature selection, and 8x8 offers custom quotes rather than publishing pricing details publicly. As a baseline, however, pricing generally starts around $20 per user per month, although it can extend above $100 per user per month for feature-rich plans.&lt;/p&gt;
 &lt;p&gt;8x8 is most notable for its affordable pricing for basic plans and easy integration with external platforms.&lt;/p&gt;
&lt;/section&gt;           
&lt;section class="section main-article-chapter" data-menu-title="2. Amazon Connect"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;2. Amazon Connect&lt;/h2&gt;
 &lt;p&gt;Introduced in 2017, Amazon Connect offers a centralized hub from which &lt;a href="https://www.techtarget.com/searchcustomerexperience/answer/5-ways-to-improve-call-center-agent-performance?Offer=ab_MeteredFormCopyEoc_var3"&gt;contact center agents&lt;/a&gt; can engage with customers across multiple channels, including voice, chat and messaging. It also integrates with other Amazon products and services. In 2023, Amazon Connect incorporated several AI-based capabilities, such as support for creating virtual assistants.&lt;/p&gt;
 &lt;h3&gt;Key features&lt;/h3&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Centralized interface.&lt;/b&gt; Contact center agents can handle interactions via voice, chat, email and text through a centralized channel.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;No-code flow builder.&lt;/b&gt; To configure workflows for different types of interactions or customer needs, businesses can use a visual workflow builder.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;AI-driven automation.&lt;/b&gt; Partly via integrations with other Amazon services -- such as Lex, which powers AI chatbots -- Amazon Connect enables the automation of some interactions using AI. For example, users can use Amazon Q in Connect to deploy GenAI chatbots. AI features can also automatically route requests to agents.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;h3&gt;Scalability&lt;/h3&gt;
 &lt;p&gt;As a platform hosted across multiple regions in the AWS cloud, Connect is a highly scalable and &lt;a href="https://www.techtarget.com/searchcloudcomputing/tip/Compare-high-availability-vs-fault-tolerance-in-AWS?Offer=ab_MeteredFormCopyEoc_var3"&gt;fault-tolerant service&lt;/a&gt;. It can support a virtually unlimited volume of agents or interactions.&lt;/p&gt;
 &lt;h3&gt;Integrations&lt;/h3&gt;
 &lt;p&gt;Connect integrates most closely with other services within the Amazon cloud. However, it supports limited integrations with external platforms, such as Salesforce and Zendesk, which businesses can use to look up or import data during customer interactions.&lt;/p&gt;
 &lt;h3&gt;Pricing&lt;/h3&gt;
 &lt;p&gt;Connect pricing is based mostly on volume usage. It starts at around $0.018 per minute for voice calls and $0.004 per chat message. Additional fees apply for using optional features, like Amazon Q.&lt;/p&gt;
 &lt;p&gt;Amazon Connect is most notable for hyperscale-level scalability and availability, as well as tight integration with other Amazon services.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/ai_sharpens_contact_center_features_and_actions-f.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/ai_sharpens_contact_center_features_and_actions-f_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/ai_sharpens_contact_center_features_and_actions-f_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/ai_sharpens_contact_center_features_and_actions-f.png 1280w" alt="Integrating AI in contact center software" height="355" width="560"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;AI and generative AI integration is remaking contact center software.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
&lt;/section&gt;            
&lt;section class="section main-article-chapter" data-menu-title="3. Avaya"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;3. Avaya&lt;/h2&gt;
 &lt;p&gt;Traditionally, Avaya focused its contact center software on &lt;a href="https://www.techtarget.com/searchcustomerexperience/tip/On-premises-vs-cloud-contact-center-Whats-the-difference"&gt;on-premises hosting models&lt;/a&gt;. However, it has expanded into cloud-based options that support public and private cloud deployments. Avaya provides all the core capabilities that businesses expect from a modern contact center platform as well as certain innovative features like AI-based virtual assistants.&lt;/p&gt;
 &lt;h3&gt;Key features&lt;/h3&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Flexible deployment options.&lt;/b&gt; Avaya offers on-premises and cloud-based contact center products. The on-prem offering may be an advantage for organizations that, due to &lt;a href="https://www.techtarget.com/searchcustomerexperience/tip/Call-center-compliance-checklist-for-hybrid-workforces"&gt;compliance or privacy concerns&lt;/a&gt;, can't or don't want to store contact center data on third-party infrastructure.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Process optimization.&lt;/b&gt; Native features assist with the optimization of tasks such as scheduling and agent training.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Real-time reporting.&lt;/b&gt; Continuous analytics further assist with the identification of opportunities to optimize.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;h3&gt;Scalability&lt;/h3&gt;
 &lt;p&gt;While the scalability of Avaya's on-premises offering is limited by the scope of the host infrastructure, its cloud-based platform can scale virtually without limit.&lt;/p&gt;
 &lt;h3&gt;Integrations&lt;/h3&gt;
 &lt;p&gt;Avaya integrates with popular CRM platforms like Salesforce, ServiceNow and Microsoft Dynamics 365. Custom integrations are available through an API.&lt;/p&gt;
 &lt;h3&gt;Pricing&lt;/h3&gt;
 &lt;p&gt;The cost of Avaya starts at $20 per user per month for the Core plan. The highest-cost plan is priced at $35 per user per month. These prices reflect a 20% discount for a yearly contractual commitment.&lt;/p&gt;
 &lt;p&gt;Avaya is most notable for its on-premises deployment option and competitive pricing.&lt;/p&gt;
&lt;/section&gt;           
&lt;section class="section main-article-chapter" data-menu-title="4. Cisco Contact Center"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;4. Cisco Contact Center&lt;/h2&gt;
 &lt;p&gt;Although Cisco is best known for its networking and communications tools, it has also invested significantly in the contact center space. Its Contact Center product employs Webex, a meeting and collaboration application, as the foundation for omnichannel customer interactions.&lt;/p&gt;
 &lt;h3&gt;Key features&lt;/h3&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Security.&lt;/b&gt; Cisco Contact Center goes &lt;a href="https://www.techtarget.com/searchcustomerexperience/tip/Call-center-security-best-practices-to-protect-customer-data"&gt;above and beyond in the security realm&lt;/a&gt;, offering advanced capabilities like endpoint hardening and data masking.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Enterprise scalability.&lt;/b&gt; While the product can work for small businesses, it's designed especially for large-scale, enterprise-grade communications.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Customer sentiment analysis.&lt;/b&gt; The platform uses AI to assess customer reactions to interactions.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;h3&gt;Scalability&lt;/h3&gt;
 &lt;p&gt;Cisco Contact Center scales especially well for large enterprises.&lt;/p&gt;
 &lt;h3&gt;Integrations&lt;/h3&gt;
 &lt;p&gt;Cisco Contact Center integrates tightly with other Cisco tools, particularly the Webex and Jabber communication apps. In fact, to some extent, the contact center service depends on these integrations with other Cisco tools. Integrations are also available for major CRM and IT ticketing platforms.&lt;/p&gt;
 &lt;h3&gt;Pricing&lt;/h3&gt;
 &lt;p&gt;Cisco doesn't publish pricing details for its contact center service, and costs vary depending on features and usage. As a rough baseline, expect to pay anywhere in the range of $30 to $200 per user per month.&lt;/p&gt;
 &lt;p&gt;Cisco Contact Center is most notable for its security features and enterprise-grade scalability.&lt;/p&gt;
&lt;/section&gt;           
&lt;section class="section main-article-chapter" data-menu-title="5. CloudTalk"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;5. CloudTalk&lt;/h2&gt;
 &lt;p&gt;CloudTalk is most notable for its heavy focus on &lt;a target="_blank" href="https://www.cloudtalk.io/blog/call-center-analytics-guide/" rel="noopener"&gt;automation and analytics features&lt;/a&gt; designed to streamline contact center performance and increase operations efficiency. It also offers innovative AI-powered features, such as topic extraction, which automatically monitors conversational topics.&lt;/p&gt;
 &lt;h3&gt;Key features&lt;/h3&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Agent collaboration.&lt;/b&gt; In addition to supporting multi-channel customer engagement, CloudTalk offers native features for agent collaboration, like internal call conferencing and shared workspaces.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Advanced analytics.&lt;/b&gt; CloudTalk offers particularly detailed reporting on engagement metrics and agent performance.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Extensive integrations.&lt;/b&gt; The platform provides a broad range of integrations that include major CRM platforms and communication and automation tools like Slack and Zapier.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;h3&gt;Scalability&lt;/h3&gt;
 &lt;p&gt;As a cloud-based offering, CloudTalk works well at virtually any scale. Flexible pricing terms also enable easy scalability.&lt;/p&gt;
 &lt;h3&gt;Integrations&lt;/h3&gt;
 &lt;p&gt;As noted above, CloudTalk integrates out-of-the-box with a particularly wide range of external platforms. It also provides an API for custom integrations.&lt;/p&gt;
 &lt;h3&gt;Pricing&lt;/h3&gt;
 &lt;p&gt;CloudTalk pricing starts around $25 per user per month. The most feature-rich plan costs about $50 per user per month.&lt;/p&gt;
 &lt;p&gt;CloudTalk is notable for its advanced analytics and broad integrations.&lt;/p&gt;
&lt;/section&gt;           
&lt;section class="section main-article-chapter" data-menu-title="6. Content Guru"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;6. Content Guru&lt;/h2&gt;
 &lt;p&gt;Launched in 2005, Content Guru offers a contact center and &lt;a href="https://www.techtarget.com/searchcustomerexperience/definition/customer-engagement"&gt;customer engagement&lt;/a&gt; service tailored for verticals that require high availability and security, like government and finance. Although the service can be and is used by all types of businesses.&lt;/p&gt;
 &lt;h3&gt;Key features&lt;/h3&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;AI-powered automation.&lt;/b&gt; Content Guru makes extensive use of AI to automate tasks like call routing. It also supports AI-powered virtual agents.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Workforce management.&lt;/b&gt; Native capabilities assist with scheduling contact center agents and managing workflows.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Video call support.&lt;/b&gt; Supports customer engagement via video as well as more conventional channels, such as voice and text.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;h3&gt;Scalability&lt;/h3&gt;
 &lt;p&gt;Cloud-based deployment enables easy scalability up and down.&lt;/p&gt;
 &lt;h3&gt;Integrations&lt;/h3&gt;
 &lt;p&gt;Content Guru integrates with major CRM platforms out-of-the-box, and an API is available for developing custom integrations.&lt;/p&gt;
 &lt;h3&gt;Pricing&lt;/h3&gt;
 &lt;p&gt;Content Guru pricing varies based on total agent count, type and feature availability. It starts at $22 per digital-only agent per month. Voice agents cost at least $70 per month.&lt;/p&gt;
 &lt;p&gt;Content Guru is most notable for AI-powered automation and workflow optimization capabilities.&lt;/p&gt;
&lt;/section&gt;           
&lt;section class="section main-article-chapter" data-menu-title="7. Dialpad"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;7. Dialpad&lt;/h2&gt;
 &lt;p&gt;Dialpad initially focused on providing internal communications software for businesses and added contact center software capabilities in 2018. Dialpad is most notable for its extensive investment in AI-based capabilities, such as AI-driven voice analysis and call summaries, as well as AI-powered &lt;a href="https://www.techtarget.com/searchcustomerexperience/definition/virtual-agent"&gt;virtual agents&lt;/a&gt;.&lt;/p&gt;
 &lt;h3&gt;Key features&lt;/h3&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;AI capabilities.&lt;/b&gt; Dialpad makes especially extensive use of AI to provide capabilities like real-time transcription and sentiment analysis.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Collaboration.&lt;/b&gt; Built-in chat, file sharing and other collaboration tools help agents communicate.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Broad integrations.&lt;/b&gt; Dialpad integrates with external productivity and collaboration platforms like Google Workspace and Microsoft Teams in addition to CRM tools.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;h3&gt;Scalability&lt;/h3&gt;
 &lt;p&gt;Cloud-based deployment and multiple pricing plans make Dialpad easy to scale for businesses of virtually all sizes.&lt;/p&gt;
 &lt;h3&gt;Integrations&lt;/h3&gt;
 &lt;p&gt;As mentioned, Dialpad is notable for integrating with popular CRM platforms, like Salesforce and Zendesk, and productivity and collaboration suites, like Google Workspace and Microsoft Teams. Customers can also build custom workflows.&lt;/p&gt;
 &lt;h3&gt;Pricing&lt;/h3&gt;
 &lt;p&gt;Dialpad pricing starts at $15 per user per month for the Standard plan. The Pro plan is $25 per user per month. An Enterprise plan is also available.&lt;/p&gt;
 &lt;p&gt;Dialpad is most notable for advanced AI features, extensive integrations and competitive entry-level pricing.&lt;/p&gt;
&lt;/section&gt;           
&lt;section class="section main-article-chapter" data-menu-title="8. Five9"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;8. Five9&lt;/h2&gt;
 &lt;p&gt;Five9 provides a fully cloud-based call and contact center platform. It also places special emphasis on transparency and security for businesses concerned with &lt;a href="https://www.techtarget.com/searchcustomerexperience/answer/How-do-companies-protect-customer-data"&gt;protecting sensitive customer data&lt;/a&gt; or meeting strict compliance mandates related to customer calls.&lt;/p&gt;
 &lt;h3&gt;Key features&lt;/h3&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Dynamic routing.&lt;/b&gt; Five9 offers a particularly powerful routing tool that can route calls based on a variety of factors, such as priority level, agent expertise and geographical location.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Workforce management.&lt;/b&gt; Built-in capabilities, including forecasting and automated scheduling, assist with agent workforce management.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;AI capabilities.&lt;/b&gt; Five9 includes advanced AI features such as speech recognition and predictive dialing.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;h3&gt;Scalability&lt;/h3&gt;
 &lt;p&gt;Five9 is highly scalable because of its cloud-based deployment model and its flexible pricing terms and plans, which cater to a wide range of business sizes.&lt;/p&gt;
 &lt;h3&gt;Integrations&lt;/h3&gt;
 &lt;p&gt;Five9 integrates with CRM platforms as well as popular IT management suites, like ServiceNow.&lt;/p&gt;
 &lt;h3&gt;Pricing&lt;/h3&gt;
 &lt;p&gt;Five9 doesn't publish full pricing details of all its plans, but its most basic plan starts at $119 per user per month. Its Core plan, which has more features, is $159 per user per month.&lt;/p&gt;
 &lt;p&gt;Five9 is most notable for especially efficient and flexible call routing capabilities and advanced AI features.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/basic_contact_center_business_goals-f.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/basic_contact_center_business_goals-f_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/basic_contact_center_business_goals-f_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/basic_contact_center_business_goals-f.png 1280w" alt="Business goals for contact center software" height="260" width="559"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Today's contact center software must satisfy several business goals.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
&lt;/section&gt;            
&lt;section class="section main-article-chapter" data-menu-title="9. Genesys"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;9. Genesys&lt;/h2&gt;
 &lt;p&gt;Founded in 1990, Genesys has spent decades building a feature-rich contact center and customer engagement platform. The company caters especially to medium-size and large businesses.&lt;/p&gt;
 &lt;h3&gt;Key features&lt;/h3&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;On-premises option.&lt;/b&gt; An on-premises deployment option is available, as well as a &lt;a href="https://www.techtarget.com/searchcloudcomputing/tip/Evaluate-on-premises-vs-cloud-computing-pros-and-cons"&gt;cloud-based offering&lt;/a&gt;.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Virtual agents.&lt;/b&gt; AI capabilities include virtual agents.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Collaboration.&lt;/b&gt; Internal screen sharing and conferencing capabilities help agents collaborate.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;h3&gt;Scalability&lt;/h3&gt;
 &lt;p&gt;Genesys can operate on any scale, but it focuses especially on deployments for midsize and enterprise customers.&lt;/p&gt;
 &lt;h3&gt;Integrations&lt;/h3&gt;
 &lt;p&gt;Out-of-the-box integrations focus mostly on CRM platforms. An API is available for custom integrations.&lt;/p&gt;
 &lt;h3&gt;Pricing&lt;/h3&gt;
 &lt;p&gt;Costs start at $75 per user per month and range up to $240 per user per month.&lt;/p&gt;
 &lt;p&gt;Genesys is most notable for its on-premises deployment option and extensive collaboration capabilities.&lt;/p&gt;
&lt;/section&gt;           
&lt;section class="section main-article-chapter" data-menu-title="10. Google Cloud Contact Center as a Service"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;10. Google Cloud Contact Center as a Service&lt;/h2&gt;
 &lt;p&gt;Google Cloud Contact Center as a Service (CCaaS) -- also referred to as Google's Contact Center AI Platform (CCAI Platform) -- is among the newer cloud-based contact center products and is focused on AI capabilities such as virtual agents. Behind the scenes, however, Google's contact center offering is powered largely by UJET, an independent contact center platform known for its analytics features and &lt;a href="https://www.techtarget.com/searchcustomerexperience/tip/Contact-center-back-end-integrations-drive-revenue-growth"&gt;integration with CRM systems&lt;/a&gt;.&lt;/p&gt;
 &lt;h3&gt;Key features&lt;/h3&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;AI capabilities.&lt;/b&gt; Advanced AI capabilities include chatbots and virtual agents.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Speech recognition.&lt;/b&gt; AI also enables real-time speech transcription and sentiment analysis.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Google Cloud integrations.&lt;/b&gt; Google's contact center integrates tightly with other Google Cloud services.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;h3&gt;Scalability&lt;/h3&gt;
 &lt;p&gt;Although designed especially for large enterprise customers, Google Cloud's CCaaS can also support smaller teams.&lt;/p&gt;
 &lt;h3&gt;Integrations&lt;/h3&gt;
 &lt;p&gt;The contact center integrates most seamlessly with other Google Cloud products and services, as well as popular CRMs like Salesforce. An API is available for developing custom integrations.&lt;/p&gt;
 &lt;h3&gt;Pricing&lt;/h3&gt;
 &lt;p&gt;Pricing is mostly a pay-as-you-go model and starts at around $0.06 per chat session and $0.05 per voice minute. Some capabilities cost extra, like Conversational Insights, which provides engagement analytics.&lt;/p&gt;
 &lt;p&gt;The CCAI Platform is most notable for its close integration with Google Cloud services and enterprise-grade scalability.&lt;/p&gt;
&lt;/section&gt;           
&lt;section class="section main-article-chapter" data-menu-title="11. Microsoft Dynamics 365 Contact Center"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;11. Microsoft Dynamics 365 Contact Center&lt;/h2&gt;
 &lt;p&gt;Microsoft developed the Microsoft Dynamics contact center platform in-house and released it in July 2024. Microsoft emphasizes self-service on a customer-preferred channel as well as &lt;a href="https://www.techtarget.com/searchcustomerexperience/tip/Best-practices-for-call-center-monitoring"&gt;monitoring and reporting features to improve operational efficiency&lt;/a&gt;.&lt;/p&gt;
 &lt;h3&gt;Key features&lt;/h3&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Workforce management.&lt;/b&gt; Built-in tools assist with agent scheduling and performance assessment.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Microsoft integrations.&lt;/b&gt; Dynamics 365 Contact Center connects to other Microsoft tools and platforms, like Teams, Outlook and Power BI.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;AI features.&lt;/b&gt; Dynamics 365 Contact Center uses GenAI services hosted on the Microsoft Azure cloud to enable virtual agents and chatbots.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;h3&gt;Scalability&lt;/h3&gt;
 &lt;p&gt;As a hyperscale-based service, Dynamics 365 offers immense scalability from an infrastructure perspective. That said, its pricing models are flexible enough to accommodate the needs of smaller teams as well.&lt;/p&gt;
 &lt;h3&gt;Integrations&lt;/h3&gt;
 &lt;p&gt;The contact center service integrates most tightly with other Microsoft products, as well as popular CRM platforms. Custom integrations are possible through an API.&lt;/p&gt;
 &lt;h3&gt;Pricing&lt;/h3&gt;
 &lt;p&gt;Costs begin at $95 per user per month. A free trial is also available.&lt;/p&gt;
 &lt;p&gt;Dynamics 365 Contact Center is most notable for integration with other Microsoft products, which facilitates integrating contact center capabilities into broader Microsoft software suites.&lt;/p&gt;
&lt;/section&gt;           
&lt;section class="section main-article-chapter" data-menu-title="12. Nextiva"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;12. Nextiva&lt;/h2&gt;
 &lt;p&gt;Nextiva offers all the key features that businesses need to operate an effective contact center, such as&lt;a href="https://www.techtarget.com/whatis/definition/skill-based-routing-SBR"&gt; skills-based call routing&lt;/a&gt; and advanced call management. Nextiva has invested in AI-based capabilities and places special emphasis on platform reliability and a fast response to service requests from its customers.&lt;/p&gt;
 &lt;h3&gt;Key features&lt;/h3&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Intelligent call routing.&lt;/b&gt; Nextiva provides highly flexible and efficient call routing capabilities based on criteria defined by users.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;AI capabilities.&lt;/b&gt; The platform uses AI to generate call summaries. An AI answering feature is also available.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;High availability.&lt;/b&gt; Nextiva's platform is cloud-based, and the company focuses on achieving particularly high availability through a multi-site hosting model.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;h3&gt;Scalability&lt;/h3&gt;
 &lt;p&gt;Multi-site hosting and flexible pricing plans enable a high degree of scalability.&lt;/p&gt;
 &lt;h3&gt;Integrations&lt;/h3&gt;
 &lt;p&gt;Nextiva connects to major CRM platforms. An API supports custom integrations.&lt;/p&gt;
 &lt;h3&gt;Pricing&lt;/h3&gt;
 &lt;p&gt;Costs start at $15 per user per month, and increase to $75 per user per month for more features geared toward small businesses. Larger enterprise plans are also available.&lt;/p&gt;
 &lt;p&gt;Nextiva is most notable for reliability and affordable entry-level pricing.&lt;/p&gt;
&lt;/section&gt;           
&lt;section class="section main-article-chapter" data-menu-title="13. NiCE CXone Mpower"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;13. NiCE CXone Mpower&lt;/h2&gt;
 &lt;p&gt;Launched in 2024, CXone Mpower from NiCE is one of the newest contact center platforms on our list. The company promotes CXone Mpower as a "CX-aware" service because it uses AI to inject &lt;a target="_blank" href="https://www.linkedin.com/pulse/transform-customer-experiences-real-time-using-contextual-goyal-hlw8c/" rel="noopener"&gt;context into customer interactions&lt;/a&gt;.&lt;/p&gt;
 &lt;h3&gt;Key features&lt;/h3&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;AI integrations.&lt;/b&gt; The platform makes extensive use of AI to help optimize workflows and generate context for customer integrations.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Chatbots and virtual agents.&lt;/b&gt; AI also supports chatbots and virtual agents within CXone Mpower.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Scalability.&lt;/b&gt; The platform is particularly notable for its ability to cater to customers of all types and sizes, from small businesses to large enterprises.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;h3&gt;Scalability&lt;/h3&gt;
 &lt;p&gt;As noted above, CXone Mpower is an especially scalable service due to its cloud-based hosting model and the ease of accommodating increased customers or communication channels.&lt;/p&gt;
 &lt;h3&gt;Integrations&lt;/h3&gt;
 &lt;p&gt;Core integrations support major CRM platforms. Custom integrations are possible through an API.&lt;/p&gt;
 &lt;h3&gt;Pricing&lt;/h3&gt;
 &lt;p&gt;Costs range from $110 to $249 per user per month.&lt;/p&gt;
 &lt;p&gt;NiCE CXone Mpower is most notable for AI-enhanced efficiency capabilities.&lt;/p&gt;
&lt;/section&gt;           
&lt;section class="section main-article-chapter" data-menu-title="14. RingCentral"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;14. RingCentral&lt;/h2&gt;
 &lt;p&gt;Founded in 1999, RingCentral originally specialized in on-premises phone connectivity. Since then, it has expanded into a broad set of business communication and collaboration services, including a contact center platform.&amp;nbsp;&lt;/p&gt;
 &lt;h3&gt;Key features&lt;/h3&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Mobile app for agents.&lt;/b&gt; A mobile app allows agents to engage with customers from virtually any location.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Collaboration.&lt;/b&gt; Internal video calling, team messaging and file sharing help agents collaborate.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Analytics.&lt;/b&gt; RingCentral supports both real-time and historical reporting on agent performance and service levels.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;h3&gt;Scalability&lt;/h3&gt;
 &lt;p&gt;A cloud-based deployment model enables a high degree of scalability.&lt;/p&gt;
 &lt;h3&gt;Integrations&lt;/h3&gt;
 &lt;p&gt;RingCentral integrates with major CRM platforms as well as certain business productivity suites, such as Google Workspace.&lt;/p&gt;
 &lt;h3&gt;Pricing&lt;/h3&gt;
 &lt;p&gt;RingCentral's RingCX product features a Standard plan at $65 per user per month. The Professional plan is $95 per user per month, and the Elite plan is $145 per user per month. An enterprise package is also available.&lt;/p&gt;
 &lt;p&gt;RingCentral is most notable for its agent &lt;a href="https://www.techtarget.com/searchcustomerexperience/tip/7-reasons-why-businesses-need-mobile-apps"&gt;mobile app option&lt;/a&gt;, collaboration features and scalability.&lt;/p&gt;
&lt;/section&gt;           
&lt;section class="section main-article-chapter" data-menu-title="15. Salesforce Service Cloud Contact Center"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;15. Salesforce Service Cloud Contact Center&lt;/h2&gt;
 &lt;p&gt;Although Salesforce is best known for CRM, its Service Cloud platform includes a contact center offering to pull customer data into contact center engagements and tightly integrate with the Salesforce product ecosystem.&lt;/p&gt;
 &lt;h3&gt;Key features&lt;/h3&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;AI features.&lt;/b&gt; Using Salesforce's Einstein AI tools, Service Cloud uses AI to automate tasks like routing.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Custom chatbots.&lt;/b&gt; Businesses can also use Einstein AI to configure custom AI chatbots to serve as virtual agents.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Knowledge management.&lt;/b&gt; Built-in knowledge management capabilities aim to accelerate the rate at which agents can solve customer requests.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;h3&gt;Scalability&lt;/h3&gt;
 &lt;p&gt;Service Cloud can support businesses of all sizes, but it's geared especially toward large, enterprise-scale customers.&lt;/p&gt;
 &lt;h3&gt;Integrations&lt;/h3&gt;
 &lt;p&gt;Salesforce contact center integrates most tightly with other Salesforce products but also provides core integration with certain third-party platforms, such as Zendesk and HubSpot.&lt;/p&gt;
 &lt;h3&gt;Pricing&lt;/h3&gt;
 &lt;p&gt;Salesforce offers one pricing plan, at $150 per user per month, for its contact center software.&lt;/p&gt;
 &lt;p&gt;The Salesforce contact center is most notable for enterprise-grade scalability and extensive Salesforce integrations.&lt;/p&gt;
&lt;/section&gt;           
&lt;section class="section main-article-chapter" data-menu-title="16. Talkdesk"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;16. Talkdesk&lt;/h2&gt;
 &lt;p&gt;Talkdesk promotes its CX automation via its AI multi-agent workflows and AI-first &lt;a href="https://www.techtarget.com/searchcustomerexperience/tip/5-customer-journey-phases-for-businesses-to-understand"&gt;customer journey&lt;/a&gt;. Talkdesk also emphasizes its capabilities across several vertical industries. The product -- dubbed Customer Experience Automation, or CXA -- is known for its ease of use, intuitive interface and call routing capabilities.&lt;/p&gt;
 &lt;h3&gt;Key features&lt;/h3&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Virtual agents.&lt;/b&gt; Talkdesk offers GenAI-powered virtual agents to automate customer interactions.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;No-code workflow management.&lt;/b&gt; A visual interface enables workflow configuration and modifications.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Hybrid cloud deployment option.&lt;/b&gt; While Talkdesk can't run fully on-premises, a hybrid deployment model is available that allows businesses to route communications through on-prem telephony infrastructure, which can be advantageous from a privacy and compliance standpoint.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;h3&gt;Scalability&lt;/h3&gt;
 &lt;p&gt;A flexible deployment architecture enables a high degree of scalability, making Talkdesk appropriate for small businesses and large enterprises.&lt;/p&gt;
 &lt;h3&gt;Integrations&lt;/h3&gt;
 &lt;p&gt;Integrations focus mostly on CRM platforms, but Google Workspace is also supported, and a custom integration API is available.&lt;/p&gt;
 &lt;h3&gt;Pricing&lt;/h3&gt;
 &lt;p&gt;Costs range from $85 to $225 per user per month.&lt;/p&gt;
 &lt;p&gt;Talkdesk is most notable for its feature-rich virtual agents and hybrid deployment option.&lt;/p&gt;
&lt;/section&gt;           
&lt;section class="section main-article-chapter" data-menu-title="17. Vonage Contact Center"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;17. Vonage Contact Center&lt;/h2&gt;
 &lt;p&gt;Vonage Contact Center's natively built features, including AI-powered virtual assistants, rely on integrations with external platforms, particularly Salesforce, to power some of its capabilities and access customer data. Vonage also emphasizes &lt;a target="_blank" href="https://www.vonage.com/resources/articles/video-contact-center/" rel="noopener"&gt;video-based customer engagement&lt;/a&gt;.&lt;/p&gt;
 &lt;h3&gt;Key features&lt;/h3&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;AI-based sentiment analysis.&lt;/b&gt; Vonage uses AI to evaluate customer interactions across multiple channels, including voice, text and social media.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Virtual agents.&lt;/b&gt; AI also powers virtual agents, which businesses can configure to perform a range of custom tasks.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Business continuity.&lt;/b&gt; Vonage offers business continuity and disaster recovery features, such as emergency call routing options.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;h3&gt;Scalability&lt;/h3&gt;
 &lt;p&gt;Cloud-based deployment provides a high degree of scalability.&lt;/p&gt;
 &lt;h3&gt;Integrations&lt;/h3&gt;
 &lt;p&gt;Integrations focus mostly on CRM platforms, with an API available for custom integrations.&lt;/p&gt;
 &lt;h3&gt;Pricing&lt;/h3&gt;
 &lt;p&gt;Vonage does not list pricing information on its website specifically for its contact center plans, which include a Priority plan, Premium plan and add-on options. It offers volume-based API pricing with rates at $0.00809 per SMS and $0.01446 per minute for voice calls. Additional capabilities, like anti-fraud features and customer identification, cost extra.&lt;/p&gt;
 &lt;p&gt;Vonage is most notable for omnichannel sentiment analysis, affordable volume-based pricing and business continuity features.&lt;/p&gt;
&lt;/section&gt;           
&lt;section class="section main-article-chapter" data-menu-title="18. Zendesk Contact Center"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;18. Zendesk Contact Center&lt;/h2&gt;
 &lt;p&gt;Although primarily a CRM platform, Zendesk also provides a dedicated contact center offering. The company first entered the call center space in 2011, but it completed a major overhaul of its customer communications and engagement platform in 2025, which now features cutting-edge AI capabilities.&lt;/p&gt;
 &lt;h3&gt;Key features&lt;/h3&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;AI-powered automation.&lt;/b&gt; Zendesk contact center makes extensive use of AI to automate virtually all core tasks, from routing to agent response.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Chatbots.&lt;/b&gt; AI-powered chatbots can perform custom tasks.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Knowledge management.&lt;/b&gt; Native knowledge management tools assist agents in finding the information they need to address customer requests.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;h3&gt;Scalability&lt;/h3&gt;
 &lt;p&gt;Zendesk contact center can support businesses of all sizes, but it caters especially to midsize and enterprise organizations.&lt;/p&gt;
 &lt;h3&gt;Integrations&lt;/h3&gt;
 &lt;p&gt;Core integrations support other Zendesk products and other popular CRMs, including Salesforce and HubSpot, as well as communications platforms like Slack.&lt;/p&gt;
 &lt;h3&gt;Pricing&lt;/h3&gt;
 &lt;p&gt;Price plans start at $19 per user per month. The Suite Enterprise plan is $169 per user per month for enterprise-grade capabilities. Other plans are priced at $55 and $115 per user per month.&lt;/p&gt;
 &lt;p&gt;Zendesk is most notable for its AI capabilities and a broad set of pricing options.&lt;/p&gt;
&lt;/section&gt;           
&lt;section class="section main-article-chapter" data-menu-title="19. Zoom Contact Center"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;19. Zoom Contact Center&lt;/h2&gt;
 &lt;p&gt;Best known for its teleconferencing software, Zoom launched a contact center platform originally called Video Engagement Center and rebranded as Zoom Contact Center. The platform offers all core contact center software features with a focus on video-based customer meetings, while supporting other communications media over multiple channels.&lt;/p&gt;
 &lt;h3&gt;Key features&lt;/h3&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;AI agent assist.&lt;/b&gt; AI capabilities help guide human agents by suggesting actions and providing information during customer interactions.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Virtual agents.&lt;/b&gt; Fully independent, AI-powered agents are also available for engaging customers.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Video support.&lt;/b&gt; Zoom Contact Center supports customer engagement via video as well as more traditional channels.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;h3&gt;Scalability&lt;/h3&gt;
 &lt;p&gt;Zoom Contact Center provides a high degree of scalability due to its cloud-based deployment model, although its pricing plans are geared mainly toward midsize and larger organizations.&lt;/p&gt;
 &lt;h3&gt;Integrations&lt;/h3&gt;
 &lt;p&gt;Zoom Contact Center integrates with popular CRM platforms as well as other Zoom software.&lt;/p&gt;
 &lt;h3&gt;Pricing&lt;/h3&gt;
 &lt;p&gt;Pricing ranges from $69 to $149 per user per month.&lt;/p&gt;
 &lt;p&gt;Zoom is most notable for its video calling support and AI capabilities that can assist human agents as well as power autonomous virtual agents.&lt;/p&gt;
 &lt;p&gt;Clearly, the contact center market is crowded with many options for contact center buyers and C-suite decision-makers. Many of the platforms have similar and overlapping features, especially around AI capabilities, integrations with adjacent products and scalability performance. Contact center buyers need to evaluate these platforms carefully to find the right one for their organization.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Editor's note:&lt;/b&gt;&amp;nbsp;&lt;i&gt;This article was updated to reflect recent developments in contact center platforms and the market in general.&lt;/i&gt;&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Chris Tozzi is an adjunct research adviser at IDC as well as an adviser for Fixate IO and a professor of IT and society at a polytechnic university in upstate New York.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>By now, many contact center software providers offer similar features. But large and small enterprises should consider some key differences among vendors.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/chatbot_g1206801125.jpg</image>
            <link>https://www.techtarget.com/searchcustomerexperience/tip/Top-10-contact-center-platforms</link>
            <pubDate>Thu, 05 Feb 2026 12:00:00 GMT</pubDate>
            <title>Top 19 contact center platforms of 2026</title>
        </item>
        <item>
            <body>&lt;p&gt;Data can reside just about anywhere in the cloud, making it critical to find the right enterprise cloud backup service for your company's data protection needs.&lt;/p&gt; 
&lt;p&gt;Organizations typically store their data in a combination of on-premises data centers, cloud platforms and SaaS applications. Doing so requires a versatile backup offering that covers hybrid and multi-cloud environments and executes fast recoveries across them. To meet these demands, many enterprise cloud backup service providers now offer various types of AI functionality; stronger ransomware defenses, such as immutable storage, and other heightened security features, such as zero‑trust policies and &lt;a href="https://www.techtarget.com/searchdatabackup/tip/Backup-and-AI-work-together-to-enhance-protection"&gt;AI-based threat detection.&lt;/a&gt;&lt;/p&gt; 
&lt;p&gt;This guide highlights 12 enterprise cloud backup services, detailing their notable features, key integrations and pricing. The list is based on Gartner's 2025 Magic Quadrant report on backup and data protection platforms, but it's unranked and presented in alphabetical order.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="Arcserve"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Arcserve&lt;/h2&gt;
 &lt;p&gt;Arcserve offers several data protection products; Arcserve Unified Data Protection (UDP) is the primary service. The company once marketed UDP primarily to enterprises but has pivoted to also focus on small and midmarket customers.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Notable features:&lt;/b&gt; Like many enterprise-class products, Arcserve UDP combines backup, replication, high availability and data immutability. Recent updates add AI‑based ransomware detection and &lt;a href="https://www.techtarget.com/searchdatamanagement/tip/Data-governance-roles-and-responsibilities-Whats-needed"&gt;policy‑based data governance&lt;/a&gt; to assist organizations with compliance.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Integrations:&lt;/b&gt; Arcserve UDP protects physical and virtual Windows and Linux servers both on-premises and in the cloud. It is compatible with virtualization platforms, including Hyper-V, Nutanix AHV and VMware. Arcserve UDP connects to Arcserve Cloud Storage and Arcserve Cyber Resilient Storage, and supports object storage on AWS, Azure, Google Cloud and Wasabi.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Pricing:&lt;/b&gt; Arcserve offers subscription and per‑socket licensing. Arcserve's online store lists UDP from $19.99 per month per each front‑end terabyte of data. Costs for licenses from channel partners or for fixed-term licenses vary by data capacity and edition.&lt;/p&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="Cohesity"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Cohesity&lt;/h2&gt;
 &lt;p&gt;Cohesity offers DataProtect, NetBackup -- acquired from Veritas in December 2024 -- and FortKnox. Its most comprehensive data protection product is DataProtect, a cloud‑native platform that protects on‑premises, public cloud and SaaS workloads, simplifying backup and recovery through a single control plane.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Notable features:&lt;/b&gt; Cohesity DataProtect emphasizes simplicity and extensibility with broad workload integrations, API support and &lt;a href="https://www.techtarget.com/searchdatabackup/feature/The-7-critical-backup-strategy-best-practices-to-keep-data-safe"&gt;pre‑built automated workflows&lt;/a&gt;. It includes a single management interface and an open API, allowing users to automate backups through custom scripts or third-party tools. The system stores backups as ready-to-use copies for instant recovery for VMs, files and application objects at scale.&lt;/p&gt;
 &lt;p&gt;Cohesity's unified management platform consolidates backup, disaster recovery, search and threat detection with capabilities for multi-cloud backup and recovery.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Integrations:&lt;/b&gt; DataProtect supports numerous integrations in a variety of areas. It protects virtualization platforms such as VMware, Hyper‑V, Nutanix AHV and Kubernetes, as well as Windows, Linux, AIX and Solaris servers. Supported applications and databases include Microsoft 365, SAP HANA, Oracle and Microsoft SQL Server; specific releases cover other databases, such as MongoDB and Cassandra. The service also integrates with storage platforms such as Pure Storage, NetApp, HPE and Dell.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Pricing:&lt;/b&gt; Cohesity does not publicly disclose pricing for its products.&lt;/p&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="Commvault"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Commvault&lt;/h2&gt;
 &lt;p&gt;Commvault Cloud Unity is a cloud‑native platform that unifies data security, identity resilience and recovery across on‑premises, multi-cloud and SaaS environments.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Notable features:&lt;/b&gt; Cloud Unity uses AI to detect unusual activity across data platforms, applications and identity management systems; it also integrates with third-party threat databases and finds clean recovery points to help restore data from known‑good backups.&lt;/p&gt;
 &lt;p&gt;The service supports isolated environments for recovery testing and forensics, plus automated backup and recovery workflows at enterprise scale. It provides full or partial application and infrastructure recovery. For example, &lt;a href="https://www.techtarget.com/searchdatabackup/tip/Key-takeaways-from-Commvault-Shift"&gt;full Active Directory forest recovery&lt;/a&gt; is possible, as well as restoration of individual directory objects and attributes.&lt;/p&gt;
 &lt;p&gt;Commvault consolidates operations through a single management console and claims it can deliver rapid recovery at cloud scale.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Integrations:&lt;/b&gt; Commvault Cloud Unity supports a wide range of integrations for identity providers, enterprise databases, storage platforms, enterprise applications and even infrastructure as code. The company currently only lists support for three SaaS apps: Microsoft 365, Microsoft Dynamics 365 and Salesforce.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Pricing:&lt;/b&gt; Commvault does not publicly disclose the pricing for its plans and services.&lt;/p&gt;
 &lt;div class="youtube-iframe-container"&gt;
  &lt;iframe id="ytplayer-0" src="https://www.youtube.com/embed/Lc-hY-uHgUU?si=XcZdVpWfsTLQvOaF?autoplay=0&amp;amp;modestbranding=1&amp;amp;rel=0&amp;amp;widget_referrer=null&amp;amp;enablejsapi=1&amp;amp;origin=https://www.techtarget.com" type="text/html" height="360" width="640" frameborder="0"&gt;&lt;/iframe&gt;
 &lt;/div&gt;
&lt;/section&gt;        
&lt;section class="section main-article-chapter" data-menu-title="Dell Technologies"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Dell Technologies&lt;/h2&gt;
 &lt;p&gt;Dell's Data Protection Suite consists of a portfolio of products designed for on-premises and cloud-based data protection. The products in this portfolio include PowerProtect Data Manager, NetWorker, Avamar, RecoverPoint for Virtual Machines and Data Protection Advisor. Customers must choose the offerings that provide the required level of protection. Dell PowerProtect Data Manager is the core product that enables on-premises and &lt;a href="https://www.techtarget.com/searchdatabackup/answer/How-do-I-know-if-multi-cloud-backup-is-the-right-approach"&gt;multi-cloud data protection&lt;/a&gt;.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Notable features:&lt;/b&gt; PowerProtect Data Manager automatically discovers and protects resources such as VMs, &lt;a href="https://www.techtarget.com/searchdatabackup/tip/How-to-get-the-most-out-of-cloud-database-backups"&gt;databases&lt;/a&gt; and containers. Users can store &lt;a href="https://www.techtarget.com/searchdatabackup/news/366545197/Dell-PowerProtect-line-increases-features-and-update-cadence"&gt;backups to PowerProtect appliances&lt;/a&gt; and the cloud.&lt;/p&gt;
 &lt;p&gt;The service is designed for centralized governance and control via the IT team, but Dell also offers a self-service feature that enables data owners to recover their own data.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Integrations:&lt;/b&gt; Dell PowerProtect Data Manager supports VMware, Hyper-V and Nutanix AHV and protects Windows and Linux file systems. The software performs application-based backups for enterprise workloads, such as Oracle, Microsoft SQL Server, Exchange Server and SAP HANA.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Pricing:&lt;/b&gt; Dell does not publicly disclose pricing for PowerProtect Data Manager.&lt;/p&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="Druva"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Druva&lt;/h2&gt;
 &lt;p&gt;Druva Data Security Cloud is a SaaS backup platform that centralizes the management of data protection; eDiscovery and regulatory compliance; cybersecurity response and recovery; and governance of sensitive data. Druva said it designed its platform to be secure by design with autonomous features, such as auto-tuning and self-healing.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Notable features:&lt;/b&gt; Druva's cloud-based backup and data protection service emphasizes simplified management through a single console without any appliances to administer. &lt;a href="https://www.techtarget.com/searchdatabackup/news/366556333/Druva-adds-gen-AI-assistant-to-cloud-backup-tools"&gt;Backup and disaster recovery operations are automated&lt;/a&gt;, further reducing complexity. The company provides tools for forecasting resource requirements and can scale the service up or down based on the customer's needs.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Integrations:&lt;/b&gt; Druva supports a variety of clouds, applications and platforms, including SaaS applications such as Microsoft 365, Salesforce and Google Workspace. For identity and access management, the platform integrates with Okta and &lt;a href="https://www.techtarget.com/searchwindowsserver/tip/Understand-the-basics-of-Microsoft-hybrid-identity"&gt;Microsoft Entra ID, formerly Azure Active Directory.&lt;/a&gt;&lt;u&gt; &lt;/u&gt;For security, Druva integrates with platforms that include Splunk, Palo Alto Networks and FireEye to support automated log exports and coordinated incident response.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Pricing: &lt;/b&gt;Druva's pricing varies widely based on the resources being protected. For many resources, Druva offers multiple protection tiers -- Business, Enterprise and Elite -- with different features and pricing.&lt;/p&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="Huawei"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Huawei&lt;/h2&gt;
 &lt;p&gt;Huawei's Cloud Backup and Recovery (CBR) is optimized to back up data in the Huawei cloud, but this service is also capable of handling file- and image-level backups within competing clouds or on local servers.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Notable features: &lt;/b&gt;Huawei said CBR provides gigabit transfer speeds and a recovery time objective measured in minutes. The service also offers multi-layer ransomware protection that includes AI-based threat detection and cross-region replication for backup and disaster recovery.&lt;/p&gt;
 &lt;p&gt;Huawei CBR bases its backups on a vault system. The server backup vault protects entire cloud servers, while disk backup vaults keep individual disks safe. A locking feature &lt;a href="https://www.techtarget.com/searchdatabackup/feature/9-data-backup-trends-to-watch"&gt;treats the vaults as immutable storage&lt;/a&gt; to prevent unauthorized changes.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Integrations: &lt;/b&gt;Huawei supports integration of CBR with on-premises VMware environments and local file systems, as well as MySQL and SAP HANA databases. It provides an SDK for customized application integration. Policy automation provides centralized administration of backups across multiple clouds.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Pricing: &lt;/b&gt;Huawei uses a consumption model for on-demand usage and also offers yearly and monthly billing.&lt;/p&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="HYCU"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;HYCU&lt;/h2&gt;
 &lt;p&gt;HYCU Data Resiliency Cloud, known as R-Cloud for short, is a SaaS-based backup and recovery platform designed for on-premises, cloud and SaaS environments, using centralized management to maintain visibility.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Notable features: &lt;/b&gt;HYCU R-Cloud's most interesting feature is R-Graph, an analytics and visualization tool that tracks data and applications in both public and private clouds, as well as traditional applications, databases and SaaS applications. The tool displays the protection status for each application to identify unprotected resources.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Integrations:&lt;/b&gt; HYCU supports more than 80 workloads, with an emphasis on SaaS apps, such as Microsoft 365, Salesforce, Trello, Google Workspace and Monday.com. R-Cloud also protects DevOps and identity platforms, including Okta and GitHub. It integrates with virtualization platforms such as VMware vSphere and Nutanix AHV, as well as public clouds that include AWS, Google Cloud and Azure.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Pricing:&lt;/b&gt; HYCU offers subscriptions per user or per workload, with specialized protection suites for platforms such as Microsoft 365 and Atlassian. The pricing ranges from $1.20 to $4 per user per month. However, enterprises and certain on-premises workloads will typically require a custom quote.&lt;/p&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="IBM"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;IBM&lt;/h2&gt;
 &lt;p&gt;IBM Cloud Backup is a cloud- and agent-based backup tool designed to protect physical and virtual workloads across environments.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Notable features:&lt;/b&gt; IBM Cloud Backup works with on-premises data and is capable of &lt;a href="https://www.techtarget.com/searchdatabackup/definition/cloud-to-cloud-backup"&gt;cloud-to-cloud backup&lt;/a&gt;. Users can schedule backups according to the organization's needs and manage these jobs through a browser-based GUI. If a restoration is required, an organization can perform a granular recovery or &lt;a href="https://www.techtarget.com/searchdatabackup/feature/Image-based-vs-file-based-backup-Key-comparisons"&gt;restore an entire system image&lt;/a&gt;. Data deduplication and compression features help to expedite backup and recovery operations.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Integrations:&lt;/b&gt; IBM Cloud Backup is an agent-based service. To protect a particular workload, customers must purchase an agent as an add-on to their IBM Cloud Backup service. IBM does not list all the available agents, but it does mention the ability to protect Microsoft SQL Server and Oracle. Agents are also available for both Windows and Linux.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Pricing:&lt;/b&gt; IBM does not publicly disclose pricing for IBM Cloud Backup.&lt;/p&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="OpenText"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;OpenText&lt;/h2&gt;
 &lt;p&gt;OpenText Data Protector is a consolidated backup and recovery product designed to protect virtual, physical and cloud-based workloads.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Notable features:&lt;/b&gt; The OpenText service includes a smart scheduling feature that prioritizes important data and uses automation to run backup jobs outside of peak usage times. &lt;a href="https://www.techtarget.com/searchdatabackup/feature/Full-incremental-or-differential-How-to-choose-the-correct-backup-type"&gt;Backups can be full, differential or mirror copies.&lt;/a&gt; A backup health monitor checks the status and alerts admins to problems.&amp;nbsp;&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Integrations:&lt;/b&gt; OpenText Data Protector integrates with several hypervisors, including Nutanix, KVM and Citrix. It supports cloud and container platforms, such as OpenStack and Kubernetes, and integrates with Ceph storage, Oracle databases and Microsoft 365.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Pricing:&lt;/b&gt; OpenText does not publicly disclose pricing information.&lt;/p&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="Rubrik"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Rubrik&lt;/h2&gt;
 &lt;p&gt;Rubrik Zero Trust Data Protection is part of Rubrik Security Cloud, a SaaS platform designed to protect data across on‑premises, cloud and SaaS environments&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Notable features:&lt;/b&gt; Rubrik's backup platform follows zero-trust principles, including the use of immutable storage to &lt;a href="https://www.techtarget.com/searchdatabackup/feature/Enterprise-data-backup-challenges-and-how-to-overcome-them"&gt;prevent unauthorized changes or deletion&lt;/a&gt;, even by ransomware. A role-based access control feature segments administrative permissions and supports multifactor authentication. Organizations can require multiple administrators to approve policy changes and other significant actions.&lt;/p&gt;
 &lt;p&gt;Fast recovery from data loss events is another key feature. An integrated search engine directs users to locate the data they need to recover. This data can then be mounted directly on the backup server&lt;b&gt;.&lt;/b&gt;&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Integrations:&lt;/b&gt; Rubrik provides numerous integrations for major workloads, including Microsoft SQL Server, Oracle, SAP HANA and NoSQL databases. Supported clouds include AWS, Azure, Microsoft 365, Google Cloud and VMware Cloud on AWS. The service also integrates with vRealize Automation and &lt;a href="https://www.techtarget.com/searchvmware/definition/VMware-vCloud-Director-VMware-vCD"&gt;VMware Cloud Director&lt;/a&gt;.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Pricing:&lt;/b&gt; Rubrik does not publicly disclose pricing for its services.&lt;/p&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="Unitrends"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Unitrends&lt;/h2&gt;
 &lt;p&gt;Unitrends provides &lt;a href="https://www.techtarget.com/searchdatabackup/tip/The-pros-and-cons-of-on-site-backup"&gt;physical or virtual backup appliances&lt;/a&gt; designed to automate many manual backup tasks. Customers can also deploy its software to AWS or Azure. A single console provides centralized management of the on-premises appliances and the cloud backup software.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Notable features: &lt;/b&gt;Like many enterprise backup providers, Unitrends offers ransomware detection to alert admins to early warning signs of an attack. The platform features "self-healing" capabilities to automatically diagnose and resolve issues that might corrupt backups.&lt;/p&gt;
 &lt;p&gt;Unitrends also supports instant recovery for VMware and Hyper-V workloads. The software creates standby replicas of VMs that can be activated for use until the problem is resolved. Additionally, an automated feature tests runbooks to verify application recovery.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Integrations: &lt;/b&gt;Unitrends supports backups of popular SaaS applications, such as Google Workspace, Microsoft 365 and Salesforce. It can also protect VMware and Microsoft Hyper-V VMs, as well as workloads running in AWS and Azure.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Pricing: &lt;/b&gt;Unitrends does not publicly disclose pricing information.&lt;/p&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="Veeam"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Veeam&lt;/h2&gt;
 &lt;p&gt;Veeam Data Platform is Veeam's enterprise backup and recovery tool for &lt;a href="https://www.techtarget.com/searchcloudcomputing/definition/hybrid-cloud"&gt;hybrid and multi-cloud environments&lt;/a&gt;. It offers native protection for a wide variety of workloads and also provides an API for customers who want to tailor the product to their needs.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Notable features:&lt;/b&gt; Veeam Data Platform offers all the standard &lt;a href="https://www.techtarget.com/searchdatabackup/tip/How-to-safely-and-securely-back-up-data"&gt;backup and encryption&lt;/a&gt; capabilities expected in an enterprise backup product, with an emphasis on quick recovery times and backup verification. It uses AI to detect and remediate issues, and to determine optimal recovery procedures if necessary.&lt;/p&gt;
 &lt;p&gt;Veeam backups can create a test lab for patch testing and other tasks that would otherwise have the potential to disrupt IT operations. Veeam said the service's nondisruptive tests ensure that data is recoverable and, if necessary, that customers can direct recovery operations to a different location, such as a cloud.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Integrations:&lt;/b&gt; Veeam Data Platform features numerous integrations, including protection for cloud and virtualization platforms such as AWS, Azure, Google Cloud, Kubernetes, VMware, Hyper-V and Nutanix. Some of the supported applications and databases include Microsoft SQL Server, Active Directory, SAP HANA, Oracle, SharePoint, Exchange Server and PostgreSQL. Veeam also supports IBM AIX, Oracle Solaris, Windows, Linux and macOS.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Pricing: &lt;/b&gt;Veeam offers three Data Platform editions -- Secure Foundation, Cyber Resilience and Enterprise Resilience -- with capabilities increasing by edition. It does not publicly disclose pricing.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Editor's note:&lt;/b&gt;&lt;i&gt; This article was updated in January 2026 to provide new information and improve the reader's experience. &lt;/i&gt;&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Brien Posey is a former 22-time Microsoft MVP and a commercial astronaut candidate. In his more than 30 years in IT, he has served as a lead network engineer for the U.S. Department of Defense and a network administrator for some of the largest insurance companies in America.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>These cloud-based backup products offer a variety of features, such as AI and enhanced security measures, to help enterprises reduce risk and meet their compliance needs.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/cloud_g943065362.jpg</image>
            <link>https://www.techtarget.com/searchdatabackup/feature/Top-20-cloud-backup-services-for-2019</link>
            <pubDate>Fri, 16 Jan 2026 00:00:00 GMT</pubDate>
            <title>12 enterprise cloud backup services to consider in 2026</title>
        </item>
        <item>
            <body>&lt;p&gt;AWS re:Invent 2025 took place Dec. 1-5 in Las Vegas, bringing over 2,000 learning sessions geared toward DevOps novices, IT decision-makers and everyone in between.&lt;/p&gt; 
&lt;p&gt;Matt Garman, AWS CEO, delivered the opening keynote on how AWS innovations are guiding the cloud's future -- with AI playing a starring role. The technology permeated many of the hyperscaler's announcements at this year's show, which notably included the launch of a new class of AI agents for software development, security and DevOps.&lt;/p&gt; 
&lt;p&gt;Multi-cloud also took focus this year. While this marks a shift in rhythm for the cloud giant, it reflects customer concerns surrounding recent major cloud outages and the proliferation of AI-related data.&lt;/p&gt; 
&lt;p&gt;Dive into our conference coverage to read more on these major announcements, plus all other news and expert analysis from AWS re:Invent 2025.&lt;/p&gt;</body>
            <description>This updating guide to AWS re:Invent 2025 provides coverage of major announcements and product releases from the show. Stay tuned for news analysis, expert opinions and more.</description>
            <link>https://www.techtarget.com/searchcloudcomputing/conference/A-conference-guide-to-AWS-reInvent</link>
            <pubDate>Mon, 01 Dec 2025 00:00:00 GMT</pubDate>
            <title>A conference guide to AWS re:Invent 2025</title>
        </item>
        <item>
            <body>&lt;p&gt;Whether you're planning your first migration or looking to refine your existing cloud deployment, your business needs a thoughtful strategy. Cloud migration is more than just moving data. It's about reimagining workflows, enhancing security and unlocking new business opportunities. In order to stay competitive, businesses need to move beyond traditional on-premises infrastructure to meet rapidly changing customer demands.&lt;/p&gt; 
&lt;p&gt;Among those new demands is the rise in AI services, which are enabling businesses to unlock new insights, improve decision-making and deliver personalized experiences to customers. However, scaling out this AI infrastructure is expensive. Cloud instances optimized for AI give IT teams the flexibility to scale infrastructure to meet growing demand without having to worry about upfront capital costs.&lt;/p&gt; 
&lt;p&gt;Even with these unprecedented levels of scalability, cloud cost management has emerged as a critical focus. New tools and services have made it easier to monitor and optimize cloud spending, ensuring businesses can achieve their goals without exceeding budgets.&lt;/p&gt; 
&lt;p&gt;The cloud is not just a technology; it's a catalyst for change. As the IT landscape continues to evolve, businesses that leverage the cloud effectively will be better positioned to thrive in a competitive and dynamic environment.&lt;/p&gt;</body>
            <description>In today's rapidly changing tech landscape, cloud strategy is more important than ever. This guide explores how to best use your cloud environment to create a competitive advantage.</description>
            <link>https://www.techtarget.com/searchcloudcomputing/essentialguide/Unlocking-the-clouds-potential-Strategies-for-migration-AI-scalability-and-cost-optimization</link>
            <pubDate>Mon, 24 Nov 2025 00:00:00 GMT</pubDate>
            <title>Unlocking the cloud's potential: Strategies for migration, AI scalability and cost optimization</title>
        </item>
        <item>
            <body>&lt;p&gt;The Cloud Native Computing Foundation has concluded the North American leg of its flagship conference, bringing breakout sessions and more engaging experiences for CNCF's open source and cloud-native community.&lt;/p&gt; 
&lt;p&gt;KubeCon + CloudNativeCon North America took place in Atlanta Nov. 10-13. The event offered more than 10 different session tracks across various topics for attendees of all expertise levels. AI development, and how it ties into cloud-native infrastructure, proved to be a common theme throughout the event's programming, from keynotes to co-located events.&lt;/p&gt; 
&lt;p&gt;Informa TechTarget's editorial team was on-site, providing live updates from the show floor. Explore this conference guide to catch up on the announcements, plus expert analysis and a look back on previous show highlights.&lt;/p&gt;</body>
            <description>This guide to KubeCon + CloudNativeCon North America 2025 features updates from the event, related news to prep for the show and highlights from this year's European conference.</description>
            <link>https://www.techtarget.com/searchitoperations/conference/KubeCon-CloudNativeCon-news-coverage</link>
            <pubDate>Wed, 12 Nov 2025 00:00:00 GMT</pubDate>
            <title>KubeCon + CloudNativeCon 2025 news coverage</title>
        </item>
        <item>
            <body>&lt;p&gt;Application owners must ensure a secure exchange of information and resilience against a wide range of security threats and attacks. To protect applications against unwanted and malicious internet traffic, AWS offers three services: Shield, Web Application Firewall (&lt;a href="https://www.techtarget.com/searchsecurity/definition/Web-application-firewall-WAF"&gt;WAF&lt;/a&gt;) and Firewall Manager.&lt;/p&gt; 
&lt;p&gt;These AWS services, combined, offer protection on layers 3, 4 and 7 of the OSI model. They cover multiple AWS services, such as CloudFront, Route53, Global Accelerator, API Gateway, Elastic Load Balancing (ELB) and Elastic Compute Cloud (EC2), among others. This includes protection against DDoS attacks, malicious HTTP and HTTPS requests, as well as simplifying the automation and release of configurations across organizations with many AWS accounts and resources.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="What is AWS Shield?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;What is AWS Shield?&lt;/h2&gt;
 &lt;p&gt;AWS Shield protects AWS components against&amp;nbsp;&lt;a href="https://www.techtarget.com/searchsecurity/definition/distributed-denial-of-service-attack"&gt;DDoS attacks&lt;/a&gt;. These attacks produce a large number of artificially generated requests to disrupt public applications. Shield is available in two presentations: Standard and Advanced.&lt;/p&gt;
 &lt;h3&gt;AWS Shield Standard&lt;/h3&gt;
 &lt;p&gt;AWS Shield Standard is enabled by default in CloudFront, Route 53 and Global Accelerator at no extra cost.&lt;/p&gt;
 &lt;p&gt;AWS Shield Standard offers protection against certain attacks but lacks flexibility for custom configurations. Shield Advanced integrates with the AWS WAF service to configure specific protection rules. It also protects against additional AWS charges that could be incurred due to increased usage resulting from a DDoS attack. Affected customers can request credits.&lt;/p&gt;
 &lt;h3&gt;AWS Shield Advanced&lt;/h3&gt;
 &lt;p&gt;AWS Shield Advanced is available for CloudFront, Route 53 and Global Accelerator, as well as ELB, Elastic IPs and EC2.&lt;/p&gt;
 &lt;p&gt;AWS Shield Advanced costs $3,000 per month and it requires a 1-year subscription commitment. It provides access to the AWS Shield Response Team, a 24/7 support group available for emergencies, but this is only for AWS accounts that also have AWS Premium Support with Enterprise or Business Support levels, which are support plans that have an additional cost depending on the monthly AWS bill.&lt;/p&gt;
 &lt;p&gt;There is an additional data transfer fee, which varies depending on the protected resource type and the amount of data transferred (for example, &amp;lt;100 TB, 400 TB and 500 TB). The Shield Advanced data transfer fee could be between $25 to $50 for 1 TB of data transferred within the initial 100 TB bracket, depending on the protected resource type. This is in addition to the data transfer fees applicable to each protected resource. The monthly fee is applicable per AWS Organization. Therefore, deployments across &lt;a href="https://www.techtarget.com/searchcloudcomputing/tip/What-you-need-to-know-to-manage-multiple-AWS-accounts"&gt;multiple AWS accounts&lt;/a&gt; within one Organization would pay only a single fee.&lt;/p&gt;
 &lt;p&gt;While Shield Standard protects against attacks on layers 3 and 4,&amp;nbsp;Shield Advanced expands the number of supported AWS services and integrates with WAF to provide coverage against attacks on layer 7.&amp;nbsp;&lt;/p&gt;
 &lt;p&gt;&lt;iframe title="Compare AWS Shield vs AWS WAF vs AWS Firewall Manager" aria-label="Table" id="datawrapper-chart-bwitT" src="https://datawrapper.dwcdn.net/bwitT/2/" scrolling="no" frameborder="0" style="width: 0; min-width: 100% !important; border: none;" height="874" data-external="1"&gt;&lt;/iframe&gt;&lt;/p&gt;
 &lt;p&gt; &lt;script type="text/javascript"&gt;window.addEventListener("message",function(a){if(void 0!==a.data["datawrapper-height"]){var e=document.querySelectorAll("iframe");for(var t in a.data["datawrapper-height"])for(var r,i=0;r=e[i];i++)if(r.contentWindow===a.source){var d=a.data["datawrapper-height"][t]+"px";r.style.height=d}}});&lt;/script&gt; &lt;/p&gt;
&lt;/section&gt;            
&lt;section class="section main-article-chapter" data-menu-title="What is AWS WAF?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;What is AWS WAF?&lt;/h2&gt;
 &lt;p&gt;The Web Application Firewall service focuses on Layer 7 protection. WAF's configurable feature set detects and blocks specific traffic patterns trying to reach your application in real time. It interacts with CloudFront distributions,&lt;u&gt;&amp;nbsp;&lt;/u&gt;&lt;a href="https://www.techtarget.com/searchaws/definition/application-load-balancer"&gt;Application Load Balancers&lt;/a&gt;, Cognito user pools, AWS Verified Access instances, AppSync GraphQL APIs and API Gateway REST APIs. A WAF can be configured to detect traffic from the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Specific IPs.&lt;/li&gt; 
  &lt;li&gt;Cross-site scripting.&lt;/li&gt; 
  &lt;li&gt;SQL injection attacks.&lt;/li&gt; 
  &lt;li&gt;IP ranges or country of origin.&lt;/li&gt; 
  &lt;li&gt;IPs exceeding rate-based rules.&lt;/li&gt; 
  &lt;li&gt;Content patterns in request bodies, paths, JA3/JA4 fingerprints, queries, headers and cookies.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;With Firewall Manager, application owners can configure rules that apply to all accounts within an AWS Organization. When incoming traffic matches any of the configured rules, WAF can reject requests, return custom responses or simply create metrics to monitor applicable requests. Additional rules are also available in the AWS Marketplace.&lt;/p&gt;
 &lt;p&gt;It has two main features:&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;AWS WAF Bot Control.&lt;/b&gt; It provides rules focused on identifying and taking measures against requests that follow patterns commonly used by pervasive bots. It can also be configured to allow traffic from search engines or uptime status monitoring tools. For common bot traffic, it costs $1 per million requests evaluated. For rules that target specific bots, it is $10 for each million of inspected requests.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;AWS WAF Fraud Control.&lt;/b&gt; It protects login and user creation pages against fraudulent requests. Fraud Control can cost $1,000 per million requests analyzed for deployments that have between 10 thousand and 2 million requests per month.&lt;/p&gt;
 &lt;p&gt;Both Bot Control and Fraud Control support configuring rules that display CAPTCHA challenges. These challenges incur an additional cost of $4 per 10,000 attempts analyzed for Bot Control Common, with no additional cost for Bot Control Targeted and Fraud Control.&lt;/p&gt;
 &lt;p&gt;WAF charges $5 a month per web Access Control List (&lt;a href="https://www.techtarget.com/searchnetworking/definition/access-control-list-ACL"&gt;ACL&lt;/a&gt;) and $1 a month per configured rule in the web ACL. A web ACL can be associated with multiple resources; &lt;a href="https://docs.aws.amazon.com/waf/latest/developerguide/web-acl-processing.html"&gt;check the documentation&lt;/a&gt;&amp;nbsp;for details.&lt;/p&gt;
 &lt;p&gt;WAF charges $0.60 per 1 million requests. For example, an application that handles 10 requests per second will cost approximately $15 per month. Plus, factor in any charges related to the number of rules and web ACLs.&lt;/p&gt;
&lt;/section&gt;          
&lt;section class="section main-article-chapter" data-menu-title="What is AWS Firewall Manager?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;What is AWS Firewall Manager?&lt;/h2&gt;
 &lt;p&gt;AWS Firewall Manager is intended for&amp;nbsp;&lt;a href="https://www.techtarget.com/searchcloudcomputing/tip/Implement-these-4-AWS-Organizations-best-practices"&gt;centralized management across multiple AWS accounts&lt;/a&gt;&amp;nbsp;and resources. It supports the following services:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;WAF.&lt;/li&gt; 
  &lt;li&gt;Shield Advanced.&lt;/li&gt; 
  &lt;li&gt;Network Firewall.&lt;/li&gt; 
  &lt;li&gt;VPC security groups.&lt;/li&gt; 
  &lt;li&gt;Route 53 Resolver DNS Firewall.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;With Firewall Manager, application owners can configure rules that apply to all accounts. Owners can configure rules for all resources of a certain type within an account or organization, such as applying rules to all CloudFront distributions. It also supports applying configurations based on resource tags. When you add new resources to an account, you can automatically assign specific protection rules to them, which enhances security by simplifying and automating the configuration of critical protection features across multiple AWS resources in one or more AWS accounts.&lt;/p&gt;
 &lt;p&gt;Large organizations sometimes struggle to protect their growing number of configurations and resources, Firewall Manager assists with that. It charges $100 a month per configured policy per region. Plus, factor in any charges related to created resources, such as WAF webACLs, WAF rules, AWS Config rules and so on. Customers with Shield Advanced can configure Firewall Manager with no additional cost per policy.&lt;/p&gt;
 &lt;p&gt;Combining AWS Shield Standard and WAF is a great option for small or medium deployments. AWS Shield Advanced and Firewall Manager, together with WAF, are a suitable option for large deployments.&lt;/p&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="How to decide which tool is right for your organization"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;How to decide which tool is right for your organization&lt;/h2&gt;
 &lt;p&gt;While all three cloud security services deliver very important features for most AWS cloud deployments, it is important to evaluate if they are a good fit for specific application needs. Protected OSI Layers are an important area to evaluate, as well as the required services to protect in a particular application.&lt;/p&gt;
 &lt;p&gt;Cost is also an important factor, particularly for AWS Shield Advanced, given its monthly fee of $3,000 and the required 1-year commitment. Large organizations with numerous accounts and cloud resources should really consider a service such as Firewall Manager, given it simplifies management for many cloud components.&lt;/p&gt;
 &lt;p&gt;Given the high priority that security represents in modern cloud deployments, it is highly recommended to evaluate these AWS security services and configure them according to specific application and compliance requirements.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;&lt;i&gt;Editor's note:&lt;/i&gt;&lt;/b&gt;&lt;i&gt;&amp;nbsp;This article originally published in 2022 and was updated in 2025 to include updated features and pricing information.&lt;/i&gt;&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Ernesto Marquez is owner and project director at Concurrency Labs, where he helps startups launch and grow their applications on AWS. He enjoys building serverless architectures, building data analytics solutions, implementing automation and helping customers cut their AWS costs.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>AWS Shield, WAF and Firewall Manager form a powerful security trio to defend applications from cyber threats. Discover how they differ and determine which combination best suits your needs.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/security_g1185245180.jpg</image>
            <link>https://www.techtarget.com/searchcloudcomputing/tip/Which-should-I-choose-AWS-Shield-vs-WAF-vs-Firewall-Manager</link>
            <pubDate>Mon, 03 Nov 2025 16:33:00 GMT</pubDate>
            <title>Which should I choose? AWS Shield vs WAF vs Firewall Manager</title>
        </item>
        <item>
            <body>&lt;p&gt;Google Cloud Storage enables customers to store and retrieve any amount of data as often as needed, but it can come with complex costs.&lt;/p&gt; 
&lt;p&gt;&lt;a href="https://www.techtarget.com/searchstorage/tip/Compare-Google-Cloud-Storage-vs-Google-Drive-for-enterprises"&gt;Google Cloud Storage&lt;/a&gt; is a managed service for unstructured data storage. The platform offers features such as automatic storage class transition, data replication, transfer services, machine learning and AI tools. Google offers these features across four&amp;nbsp;&lt;a href="https://www.techtarget.com/searchstorage/tip/Explore-Google-Cloud-Storage-classes"&gt;storage classes&lt;/a&gt;: Standard, Nearline, Coldline and Archive.&lt;/p&gt; 
&lt;p&gt;To manage Google Cloud Storage costs for the platform's various uses -- such as data processing, content delivery, disaster recovery, archiving and backup -- best practices include determining traffic, storage and availability needs, as well as recognizing Google's quotas.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="Pricing of Google Cloud Storage"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Pricing of Google Cloud Storage&lt;/h2&gt;
 &lt;p&gt;Google bases Cloud Storage pricing on factors relating to the individual customers' choices or needs, including data storage, data processing and network usage.&lt;/p&gt;
 &lt;h3&gt;Data storage&lt;/h3&gt;
 &lt;p&gt;Google calculates pricing based on the amount of data stored, the storage class, the location of the buckets and custom&amp;nbsp;&lt;a href="https://www.techtarget.com/searchstorage/feature/6-best-practices-for-metadata-storage-and-management"&gt;metadata for the uploaded objects&lt;/a&gt;.&lt;/p&gt;
 &lt;p&gt;The location adds another layer to storage pricing as it's based on whether the data resides in a single region (North/South America, Europe, Asia, etc.), dual-region (two locations within one region, such as two in North America or Asia) or multi-region (multiple European or Asian countries).&lt;/p&gt;
 &lt;h3&gt;Data processing&lt;/h3&gt;
 &lt;p&gt;Pricing also varies with the amount of data processing users conduct in Google Cloud Storage. This includes additional factors such as operation rates, data retrieval and inter-region replication.&lt;/p&gt;
 &lt;h3&gt;Network usage&amp;nbsp;&lt;/h3&gt;
 &lt;p&gt;Google charges for network use -- the amount of data users read from or move between buckets. Pricing depends on the location of the buckets, the storage class and whether users send the data outside of Google Cloud.&lt;/p&gt;
&lt;/section&gt;         
&lt;section class="section main-article-chapter" data-menu-title="Google Cloud Storage pricing examples"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Google Cloud Storage pricing examples&lt;/h2&gt;
 &lt;p&gt;The following Google Cloud Storage pricing examples outline what a company would pay in each scenario. For full details, use Google's &lt;a target="_blank" href="https://cloud.google.com/products/calculator/" rel="noopener"&gt;pricing calculator&lt;/a&gt; for exact costs.&lt;/p&gt;
 &lt;h3&gt;Simple Google Cloud pricing situation&lt;/h3&gt;
 &lt;p&gt;Suppose your company had the following storage pattern for a single data bucket in a month:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Data storage.&lt;/b&gt; Standard storage in the US-east1 region of 75GB of data.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Data processing.&lt;/b&gt; 25,000 Class A operations and 85,000 Class B operations.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Network usage.&lt;/b&gt; 19 GB of data transfer to the Americas and EMEA.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;Assuming there are no always free discounts -- available to all new customers -- pricing is as follows:&lt;/p&gt;
 &lt;p&gt;&lt;iframe title="[ Insert title here ]" aria-label="Table" id="datawrapper-chart-PeStY" src="https://datawrapper.dwcdn.net/PeStY/1/" scrolling="no" frameborder="0" style="width: 0; min-width: 100% !important; border: none;" height="358" data-external="1"&gt;&lt;/iframe&gt;&lt;/p&gt;
 &lt;p&gt; &lt;script type="text/javascript"&gt;window.addEventListener("message",function(a){if(void 0!==a.data["datawrapper-height"]){var e=document.querySelectorAll("iframe");for(var t in a.data["datawrapper-height"])for(var r,i=0;r=e[i];i++)if(r.contentWindow===a.source){var d=a.data["datawrapper-height"][t]+"px";r.style.height=d}}});&lt;/script&gt; &lt;/p&gt;
 &lt;h3&gt;Complex Google Cloud pricing situation&lt;/h3&gt;
 &lt;p&gt;This more complex situation incorporates storage with multiple storage classes and increased bandwidth that spans multiple tiers. The following specifications might be reflective of a larger, multinational corporation's data storage needs:&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Data storage:&lt;/b&gt;&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Standard storage in a multi-region of 75 TB of data.&lt;/li&gt; 
  &lt;li&gt;Standard storage in the NAM4 dual-region of 55 TB of data.&lt;/li&gt; 
  &lt;li&gt;Nearline storage in a multi-region of 165 TB of data.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;&lt;b&gt;Data processing:&lt;/b&gt;&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Class A operations on the Standard storage data of 150,000 operations.&lt;/li&gt; 
  &lt;li&gt;Class B operations on Nearline storage data of 3,275,000 operations.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;&lt;b&gt;Network usage:&lt;/b&gt;&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Data transfer to the Americas and EMEA of 35 TB.&lt;/li&gt; 
  &lt;li&gt;Dual-region inbound data transfer of 21 TB.&lt;/li&gt; 
  &lt;li&gt;Multi-region inbound data transfer from Asia-Pacific of 12 TB.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;Assuming there are no always free discounts -- available to all new customers -- the monthly bill would be as follows:&lt;/p&gt;
 &lt;p&gt;&lt;iframe title="[ Insert title here ]" aria-label="Table" id="datawrapper-chart-yBPH8" src="https://datawrapper.dwcdn.net/yBPH8/1/" scrolling="no" frameborder="0" style="width: 0; min-width: 100% !important; border: none;" height="712" data-external="1"&gt;&lt;/iframe&gt;&lt;/p&gt;
 &lt;p&gt; &lt;script type="text/javascript"&gt;window.addEventListener("message",function(a){if(void 0!==a.data["datawrapper-height"]){var e=document.querySelectorAll("iframe");for(var t in a.data["datawrapper-height"])for(var r,i=0;r=e[i];i++)if(r.contentWindow===a.source){var d=a.data["datawrapper-height"][t]+"px";r.style.height=d}}});&lt;/script&gt; &lt;/p&gt;
&lt;/section&gt;                   
&lt;section class="section main-article-chapter" data-menu-title="Early deletion example"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Early deletion example&lt;/h2&gt;
 &lt;p&gt;Customers are charged early deletion fees when they delete data before the minimum storage duration for a given storage class. Early deletion fees apply to deleting an object, overwriting an object with new object data or rewriting an object -- such as when changing its storage class.&lt;/p&gt;
 &lt;p&gt;Suppose you store 1,000 GB &lt;a href="https://www.techtarget.com/searchcloudcomputing/definition/Google-Cloud-Storage-Coldline"&gt;Coldline storage&lt;/a&gt; in the US multi-region on Day 1 and delete all the data on Day 60. Coldline storage has a 90-day minimum storage duration, so customers are charged as if the data was stored for the entire 90-day period. The fee calculation is divided into two parts:&lt;/p&gt;
 &lt;ol class="default-list"&gt; 
  &lt;li&gt;The at-rest storage cost of the 60 days the data existed in the bucket: $0.007 per GB per month X 1,000 GB X 2 months = $14.&lt;/li&gt; 
  &lt;li&gt;A prorated early-deletion fee for Coldline storage, since you didn't abide by the 90-day minimum: $0.00023333 per GB per day X 1,000 GB X 30 days = $7.&lt;/li&gt; 
 &lt;/ol&gt;
 &lt;p&gt;The total cost of Coldline storage for this data for 60 days is $21. This is the same cost as storing it for the full 90-day minimum and deleting it on Day 90. In that case, you'd have saved the early deletion fee but paid the full fee of Coldline at-rest storage.&lt;/p&gt;
 &lt;p&gt;Google Cloud Storage fees vary based on several factors and can change based on your company's behavior and usage of the storage they have over the month.&lt;/p&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="Additional Google Cloud Storage fees to consider"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Additional Google Cloud Storage fees to consider&lt;/h2&gt;
 &lt;p&gt;Google charges for data operations separately from storage fees. Operations include actions that change or retrieve information about data -- such as buckets and objects. Google divides operations into two tiers and prices them according to the storage tier and region.&lt;/p&gt;
 &lt;p&gt;Additional costs for operations and other data processing include fees for retrieval, inter-region replication and&amp;nbsp;&lt;a href="https://www.techtarget.com/searchstorage/news/252524729/Storage-backup-services-to-expand-on-Google-Cloud-Platform"&gt;Cloud Storage Autoclass management&lt;/a&gt;.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/compare_google_cloud_storage_classes-f.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/compare_google_cloud_storage_classes-f_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/compare_google_cloud_storage_classes-f_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/compare_google_cloud_storage_classes-f.png 1280w" alt="Chart comparing Google Cloud Storage classes." height="290" width="560"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Each storage class has a different minimum storage duration and price per GB per month. 
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="Best practices to manage Google Cloud Storage costs"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Best practices to manage Google Cloud Storage costs&lt;/h2&gt;
 &lt;p&gt;Given how quickly Google Cloud Storage costs can increase with more complex options, it's essential to get it right from the start.&lt;/p&gt;
 &lt;h3&gt;1. Estimate how much traffic you'll consume&lt;/h3&gt;
 &lt;p&gt;The amount of traffic organizations consume can affect the pricing. Estimate the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Operations per second.&lt;/b&gt; How many operations per second do you expect for both buckets and objects? What about for create, update and delete operations?&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Bandwidth.&lt;/b&gt; How much data will you send and in what time frame?&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Cache control.&lt;/b&gt; Defining metadata on certain objects can affect read latency on hot data, so &lt;a href="https://www.techtarget.com/searchstorage/feature/5-tips-for-improving-data-storage-efficiency"&gt;understand if you're using it&lt;/a&gt;.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;h3&gt;2. Understand your storage location needs&lt;/h3&gt;
 &lt;p&gt;Google Cloud Storage is redundant across at least two zones within one location. With a dual- or multi-region location type, Google stores objects in at least two locations separated by at least 100 miles. The location affects the recovery time objective (&lt;a href="https://www.techtarget.com/searchstorage/feature/What-is-the-difference-between-RPO-and-RTO-from-a-backup-perspective"&gt;RTO&lt;/a&gt;) in the event of an outage. If you always rely on sensitive or business-critical data, this factor is especially important to consider.&lt;/p&gt;
 &lt;p&gt;Dual- and multi-region location pricing is marginally more than single-region pricing, but it could increase if storage increases. For example, dual-region Standard storage globally costs between $0.022 and $0.0506 cents per GB per month, while multi-region costs are roughly the same globally, at 2.6 cents per GB per month.&lt;/p&gt;
 &lt;h3&gt;3. Know your data availability needs&lt;/h3&gt;
 &lt;p&gt;Is it hot data that users must access multiple times daily? Or is it archive data only for compliance purposes? If you&amp;nbsp;&lt;a href="https://www.techtarget.com/searchcloudcomputing/feature/3-best-practices-to-achieve-high-availability-in-cloud-computing"&gt;need high availability&lt;/a&gt;, consider a dual- or multi-region location for your Google Cloud Storage. That way, you'll always have access to the data without changing storage paths and have a zero RTO in most circumstances.&lt;/p&gt;
 &lt;h3&gt;4. Align Cloud Storage quotas and limits with your needs&lt;/h3&gt;
 &lt;p&gt;Google Cloud Storage has quotas and request limits on buckets, objects, bandwidth usage and API requests. These prevent data bottlenecks across the storage network, which helps ensure smooth operations and performance. Customers can request increases to some quotas but not to limits.&lt;br&gt;&lt;br&gt;&lt;i&gt;Julia Borgini is a freelance technical copywriter, content marketer, content strategist and geek. She writes about B2B tech, SaaS, DevOps, the cloud and other tech topics.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>The cost of Google Cloud Storage isn't just about stored data. Administrators must also consider processing, network usage, retrieval and replication.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/storage_g1226966455.jpg</image>
            <link>https://www.techtarget.com/searchstorage/tip/How-to-handle-Google-Cloud-Storage-costs</link>
            <pubDate>Thu, 16 Oct 2025 13:20:00 GMT</pubDate>
            <title>How to handle Google Cloud Storage costs</title>
        </item>
        <item>
            <body>&lt;p&gt;A cloud access security broker (CASB) is a software tool or service that sits between an organization's on-premises &lt;a href="https://www.techtarget.com/searchdatacenter/definition/infrastructure"&gt;infrastructure&lt;/a&gt; and a &lt;a href="https://www.techtarget.com/searchitchannel/definition/cloud-service-provider-cloud-provider"&gt;cloud provider's&lt;/a&gt; infrastructure. A CASB tool provides a unified and consistent method of delivering cloud security for an organization to access cloud resources.&lt;/p&gt; 
&lt;p&gt;CASBs are designed to combine and enforce an organization's &lt;a href="https://www.techtarget.com/searchsecurity/definition/security-policy"&gt;security policies&lt;/a&gt; when accessing cloud-based resources. They help prevent potential threats that can occur when an organization adds cloud-based networking to its IT infrastructure. CASBs are particularly important for maintaining data security, compliance and threat protection.&lt;/p&gt; 
&lt;p&gt;CASBs combine security policies, such as &lt;a href="https://www.techtarget.com/searchsecurity/definition/authentication"&gt;authentication&lt;/a&gt;, authorization, role-based access control, credential mapping, &lt;a href="https://www.techtarget.com/searchsecurity/definition/encryption"&gt;encryption&lt;/a&gt;, logging and &lt;a href="https://www.techtarget.com/searchsecurity/definition/malware"&gt;malware&lt;/a&gt; detection. A CASB tool sits between on-premises infrastructure and the cloud, ensuring that all traffic sent to the cloud complies with security policies before being sent, minimizing the security risk.&lt;/p&gt; 
&lt;p&gt;CASBs are available as on-premises and cloud-based software, as well as software as a service (&lt;a href="https://www.techtarget.com/searchcloudcomputing/definition/Software-as-a-Service"&gt;SaaS&lt;/a&gt;).&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="How does a CASB work?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;How does a CASB work?&lt;/h2&gt;
 &lt;p&gt;CASBs ensure network traffic between on-premises devices and the cloud provider complies with an organization's security policies, such as controlling access and identifying suspicious activity.&lt;/p&gt;
 &lt;p&gt;The value of cloud security brokers stem from their ability to deliver &lt;a href="https://www.techtarget.com/searchcloudcomputing/tip/Ways-to-use-AI-for-cloud-infrastructure-management"&gt;insight into cloud application use&lt;/a&gt; across cloud platforms and identify unsanctioned use. This is especially important in regulated industries.&lt;/p&gt;
 &lt;p&gt;CASBs work in a discovery, classification and remediation process. The discovery process identifies in-use cloud applications, the classification process assesses each application and creates a risk factor, and the remediation process identifies and resolves detected threats based on the organization's security policy.&lt;/p&gt;
 &lt;p&gt;CASBs use auto-discovery to identify cloud applications in use, high-risk applications, high-risk user devices and other key risk factors. Cloud access security brokers enforce several different security access controls, including encryption and device profiling. They can also provide other services, such as credential mapping when single sign-on (&lt;a href="https://www.techtarget.com/searchsecurity/definition/single-sign-on"&gt;SSO&lt;/a&gt;) isn't available and &lt;a href="https://www.techtarget.com/whatis/definition/threat-intelligence-cyber-threat-intelligence"&gt;threat intelligence&lt;/a&gt;.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineImages/cloud_security-casb_cloud_access_security_broker.jpg"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineImages/cloud_security-casb_cloud_access_security_broker_mobile.jpg" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineImages/cloud_security-casb_cloud_access_security_broker_mobile.jpg 960w,https://www.techtarget.com/rms/onlineImages/cloud_security-casb_cloud_access_security_broker.jpg 1280w" alt="Diagram of a Cloud Access Security Broker." height="297" width="560"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;CASBs sit between an organization's on-premises software and a cloud service infrastructure.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;p&gt;CASBs sit between an organization's on-premises software and a cloud service's infrastructure.&lt;/p&gt;
&lt;/section&gt;       
&lt;section class="section main-article-chapter" data-menu-title="4 pillars of CASB"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;4 pillars of CASB&lt;/h2&gt;
 &lt;p&gt;A CASB acts as a gatekeeper, enabling organizations to extend the reach of their security policies beyond their own infrastructure.&lt;/p&gt;
 &lt;p&gt;The core components of a CASB are the following:&lt;/p&gt;
 &lt;ol class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Visibility.&lt;/b&gt; &lt;a href="https://www.techtarget.com/searchsecurity/feature/Security-observability-vs-visibility-and-monitoring"&gt;Visibility&lt;/a&gt; is an important aspect of creating a secure environment. In a cloud environment, organizations typically have limited visibility and insight into the cloud provider's underlying infrastructure. CASBs improve visibility for cloud usage with access logs that provide insights on corporate cloud infrastructure and attempted attacks. CASBs can also help detect instances of &lt;a href="https://www.techtarget.com/searchcloudcomputing/definition/shadow-IT-shadow-information-technology"&gt;shadow IT&lt;/a&gt;.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Compliance.&lt;/b&gt; Different regional regulations, such as the Health Insurance Portability and Accountability Act (&lt;a href="https://www.techtarget.com/searchhealthit/definition/HIPAA"&gt;HIPAA&lt;/a&gt;) or the General Data Protection Regulation (&lt;a href="https://www.techtarget.com/whatis/definition/General-Data-Protection-Regulation-GDPR"&gt;GDPR&lt;/a&gt;), mean organizations must make sure their cloud provider complies with any regulations that might apply to the organization and its customers. CASBs define strict access controls to help comply with data regulations.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Threat protection.&lt;/b&gt; Employees might unintentionally introduce malware-based threats to cloud-based services. A CASB tool can detect and prevent potential threats. Any file upload, for example, can be inspected before it's sent to the cloud.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Data security.&lt;/b&gt; CASBs provide &lt;a href="https://www.techtarget.com/searchsecurity/Data-security-guide-Everything-you-need-to-know"&gt;data security&lt;/a&gt; through access management and data loss prevention (&lt;a href="https://www.techtarget.com/whatis/definition/data-loss-prevention-DLP"&gt;DLP&lt;/a&gt;) processes that help secure an organization's cloud-based data.&lt;/li&gt; 
 &lt;/ol&gt;
 &lt;p&gt;I&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/cloud_computing-casb_core_features.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/cloud_computing-casb_core_features_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/cloud_computing-casb_core_features_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/cloud_computing-casb_core_features.png 1280w" alt="Chart outlining the four core features of cloud access security brokers." height="314" width="560"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;A CASB tool provides four core security features to users.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="Key benefits of a CASB"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Key benefits of a CASB&lt;/h2&gt;
 &lt;p&gt;The principal benefit of a CASB is that it facilitates secure connections between users and cloud services. To achieve a secure environment, CASBs offer the following features:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Authentication to check users' credentials and ensure they only access appropriate company resources -- this is meant to complement identity and access management (&lt;a href="https://www.techtarget.com/searchsecurity/definition/identity-access-management-IAM-system"&gt;IAM&lt;/a&gt;) tools.&lt;/li&gt; 
  &lt;li&gt;&lt;a href="https://www.techtarget.com/searchsecurity/definition/Web-application-firewall-WAF"&gt;Web application firewalls&lt;/a&gt; to thwart malware designed to breach security at the application level rather than at the network level.&lt;/li&gt; 
  &lt;li&gt;DLP to ensure users cannot transmit sensitive information outside the organization.&lt;/li&gt; 
  &lt;li&gt;Shadow IT discovery to identify all unauthorized cloud applications in use and to evaluate the risks associated with each.&lt;/li&gt; 
  &lt;li&gt;&lt;u&gt;&lt;a href="https://www.techtarget.com/searchsecurity/definition/access-control"&gt;Access control&lt;/a&gt;&lt;/u&gt; to set restrictions on what users can see and do within company applications, helping users gain access to the resources they need.&lt;/li&gt; 
  &lt;li&gt;Visibility features to identify all the cloud services being used within an organization and offer user and data activity monitoring.&lt;/li&gt; 
  &lt;li&gt;Threat protection features, which include &lt;a href="https://www.darkreading.com/cyberattacks-data-breaches/behavioral-analytics-cybersecurity-who-benefits-most"&gt;behavioral analytics&lt;/a&gt; and malware detection to help restrict access by &lt;a href="https://www.techtarget.com/whatis/definition/threat-actor"&gt;threat actors&lt;/a&gt;.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="Challenges of using a CASB"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Challenges of using a CASB&lt;/h2&gt;
 &lt;p&gt;Despite the many important benefits of a CASB, a few challenges need to be considered.&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Difficulty identifying devices not in a corporate infrastructure.&lt;/li&gt; 
  &lt;li&gt;Integration issues with other tools such as Zero Trust Network Access (ZTNA) or software-defined WAN (&lt;a href="https://www.techtarget.com/searchnetworking/definition/SD-WAN-software-defined-WAN"&gt;SD-WAN&lt;/a&gt;).&lt;/li&gt; 
  &lt;li&gt;Potential difficulty integrating CASB into an existing infrastructure.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="Use cases for CASBs"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Use cases for CASBs&lt;/h2&gt;
 &lt;p&gt;CASB tools have evolved to include, or work alongside, other IT security services -- although some vendors still offer standalone tools. CASBs are particularly useful in organizations with &lt;a href="https://www.techtarget.com/searchcio/tip/What-are-the-pros-and-cons-of-shadow-IT"&gt;shadow IT operations&lt;/a&gt; or liberal security policies that allow operating units to procure and manage their own cloud resources.&lt;/p&gt;
 &lt;p&gt;Potential uses for CASB tools include the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Data security.&lt;/b&gt; CASBs collect and configure granular access to data. DLP features also enable users to protect &lt;a href="https://www.techtarget.com/whatis/definition/sensitive-information"&gt;sensitive data&lt;/a&gt; that is transferred to or from a cloud service.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Protection against malware.&lt;/b&gt; CASBs can protect against cloud-based malware threats that users might accidentally introduce to the environment.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Monitoring.&lt;/b&gt; CASBs can continuously monitor users by activity, application, cloud service usage and identity. CASBs can also be used for budgeting purposes.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Compliance.&lt;/b&gt; Organizations can use CASBs to assess &lt;a href="https://www.techtarget.com/searchdatamanagement/definition/compliance"&gt;compliance&lt;/a&gt; with security, regulatory and legal standards.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Cloud application usage tracking.&lt;/b&gt; CASBs can provide a way to view cloud application usage, making it easier to identify abuse and usage patterns.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;User behavior analytics (UBA).&lt;/b&gt; Usage tracking serves as a foundation for more sophisticated behavior tracking, as the same data is subjected to more detailed analysis.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Integrations.&lt;/b&gt; CASBs can integrate with other tools, such as firewalls, IAM and &lt;a href="https://www.techtarget.com/searchsecurity/definition/What-is-endpoint-security-How-does-it-work"&gt;endpoint security&lt;/a&gt;.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="Inline vs. API-based CASBs"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Inline vs. API-based CASBs&lt;/h2&gt;
 &lt;p&gt;CASBs can be based on an inline proxy or an application programming interface (&lt;a href="https://www.techtarget.com/searchapparchitecture/definition/application-program-interface-API"&gt;API&lt;/a&gt;). Each provides the necessary security to protect the data heading to a cloud service.&lt;/p&gt;
 &lt;p&gt;Before data traffic reaches a cloud vendor, an inline proxy-based CASB captures the transaction and provides the required security protection. The proxy helps facilitate the CASB connection. It is also the way early CASBs handled data traffic.&lt;/p&gt;
 &lt;p&gt;API-based CASBs, by contrast, deliver security activities on data heading to the cloud through APIs already in place in SaaS cloud services. This way a separate arrangement for handling proxies can be eliminated.&lt;/p&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="Cloud access security broker vendors and resources"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Cloud access security broker vendors and resources&lt;/h2&gt;
 &lt;p&gt;There are numerous vendors that provide CASBs. The following is just a sample of vendors and tools in the cloud access security space:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Broadcom Symantec CloudSOC CASB.&lt;/b&gt; The system provides tools for ensuring compliance, DLP and a variety of &lt;a href="https://www.techtarget.com/searchbusinessanalytics/definition/business-analytics-BA"&gt;analytics&lt;/a&gt;.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Cisco Cloudlock.&lt;/b&gt; An API-based CASB that uses &lt;a href="https://www.techtarget.com/searchenterpriseai/definition/machine-learning-ML"&gt;machine learning&lt;/a&gt; for threat identification.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Forcepoint CASB.&lt;/b&gt; Provides services including behavior analysis and enforcement of security policies.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Fortinet FortiCASB.&lt;/b&gt; Cloud-native service that delivers security, threat detection, visibility and compliance.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Lookout CASB (Now Fortra CASB).&lt;/b&gt; Secure access controls and extensive threat protection.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Microsoft Defender for Cloud Apps.&lt;/b&gt; Integrates with Microsoft 365 and Azure, providing a wide range of security features.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Netskope One CASB.&lt;/b&gt; Delivers visibility into cloud environments, DLP and protection from cyberthreats.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Palo Alto Networks Prisma Cloud.&lt;/b&gt; Driven by &lt;a href="https://www.techtarget.com/searchenterpriseai/definition/AI-Artificial-Intelligence"&gt;AI&lt;/a&gt;, delivers consistent security across cloud activities.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Proofpoint CASB.&lt;/b&gt; Integrates with email security elements and detects potential breaches.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Skyhigh CASB.&lt;/b&gt; Provides support for compliance and delivers advanced threat protection and access management.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Zscaler CASB.&lt;/b&gt; Delivers inline and API-based CASB support using a &lt;a href="https://www.techtarget.com/searchsecurity/definition/zero-trust-model-zero-trust-network"&gt;zero-trust security framework&lt;/a&gt;.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;div class="youtube-iframe-container"&gt;
  &lt;iframe id="ytplayer-0" src="https://www.youtube.com/embed/STv9iiJXZdo?si=k33SgdF1rZE_YnoV?autoplay=0&amp;amp;modestbranding=1&amp;amp;rel=0&amp;amp;widget_referrer=null&amp;amp;enablejsapi=1&amp;amp;origin=https://www.techtarget.com" type="text/html" height="360" width="640" frameborder="0"&gt;&lt;/iframe&gt;
 &lt;/div&gt;
 &lt;p&gt;To meet the needs of infrastructure-as-a-service (&lt;a href="https://www.techtarget.com/searchcloudcomputing/definition/Infrastructure-as-a-Service-IaaS"&gt;IaaS&lt;/a&gt;) and platform-as-a-service (&lt;a href="https://www.techtarget.com/searchcloudcomputing/definition/Platform-as-a-Service-PaaS"&gt;PaaS&lt;/a&gt;) users, CASB vendors have added or expanded functionality for security tasks, such as the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Single sign-on.&lt;/b&gt; Enables employees to enter their credentials one time and access several applications.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Encryption.&lt;/b&gt; Encrypts information from the moment it's created until it's &lt;a href="https://www.techtarget.com/searchstorage/definition/data-at-rest"&gt;at rest&lt;/a&gt; in the cloud.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Compliance reporting tools.&lt;/b&gt; Ensures the company's security systems &lt;a href="https://www.techtarget.com/searchcio/tip/Top-cloud-compliance-standards-and-how-to-use-them"&gt;comply with corporate policies and government regulations&lt;/a&gt;.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;User behavior analytics.&lt;/b&gt; Identifies aberrant behavior that could indicate an attack or data breach.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="Future of CASB in SASE"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Future of CASB in SASE&lt;/h2&gt;
 &lt;p&gt;CASBs will continue to be adopted in secure access service edge (&lt;a href="https://www.techtarget.com/searchnetworking/definition/Secure-Access-Service-Edge-SASE"&gt;SASE&lt;/a&gt;) architectures. SASE is a cloud architecture model that bundles network and cloud-native security technologies to deliver them as a single cloud service. A SASE solution helps an organization unify its network and security tools in one management console. These tools typically bundle SD-WANs with network security measures, such as &lt;a href="https://www.techtarget.com/searchnetworking/definition/firewall-as-a-service-FWaaS"&gt;firewall as a service&lt;/a&gt;, secure web gateways, zero-trust network access and CASBs.&lt;/p&gt;
 &lt;p&gt;CASBs are commonly included in SASE tools, as they provide the access control, policy enforcement, threat prevention and visibility features that are essential to protecting cloud-based resources. Alongside other security and cybersecurity services CASB solutions will likely become a core component of SASE architectures.&lt;/p&gt;
 &lt;p&gt;The future of CASBs also depends on the increase and severity of &lt;a href="https://www.techtarget.com/whatis/34-Cybersecurity-Statistics-to-Lose-Sleep-Over-in-2020"&gt;cyberthreats&lt;/a&gt;, such as ransomware; their ability to comply with key regulations, such as the GDPR, HIPAA and CCPA; and their ways of managing deployment costs.&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Learn more about &lt;/i&gt;&lt;a href="https://www.techtarget.com/searchnetworking/The-complete-Secure-Access-Service-Edge-SASE-guide"&gt;&lt;i&gt;SASE and its use cases, as well as benefits and issues&lt;/i&gt;&lt;/a&gt;&lt;i&gt; it presents for organizations.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>A cloud access security broker (CASB) is a software tool or service that sits between an organization's on-premises infrastructure and a cloud provider's infrastructure.</description>
            <image>https://cdn.ttgtmedia.com/visuals/digdeeper/2.jpg</image>
            <link>https://www.techtarget.com/searchcloudcomputing/definition/cloud-access-security-broker-CASB</link>
            <pubDate>Wed, 15 Oct 2025 09:00:00 GMT</pubDate>
            <title>What is a cloud access security broker (CASB)?</title>
        </item>
        <item>
            <body>&lt;p&gt;Infrastructure as a service (IaaS) is a form of &lt;a href="https://www.techtarget.com/searchcloudcomputing/definition/cloud-computing"&gt;cloud computing&lt;/a&gt; that provides virtualized computing resources over the internet. IaaS is one of the three main categories of cloud computing services, alongside software as a service (&lt;a href="https://www.techtarget.com/searchcloudcomputing/definition/Software-as-a-Service"&gt;SaaS&lt;/a&gt;) and platform as a service (&lt;a href="https://www.techtarget.com/searchcloudcomputing/definition/Platform-as-a-Service-PaaS"&gt;PaaS&lt;/a&gt;).&lt;/p&gt; 
&lt;p&gt;In the IaaS model, the cloud provider manages IT infrastructures, such as storage, server and networking resources, and delivers them to subscriber organizations through virtual machines (&lt;a href="https://www.techtarget.com/searchitoperations/definition/virtual-machine-VM"&gt;VMs&lt;/a&gt;) accessible through an internet connection. IaaS has many benefits for organizations, such as making &lt;a href="https://www.techtarget.com/searchdatacenter/definition/workload"&gt;workloads&lt;/a&gt; faster, easier, more flexible and more cost-efficient.&lt;/p&gt; 
&lt;p&gt;The easiest way to visualize IaaS is to think of a well-equipped kitchen. All the tools, utensils, raw ingredients and cooking devices are in place. It is up to the chef (e.g., the user) to select which cooking resources will be used for a specific meal.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="Why IaaS is important"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Why IaaS is important&lt;/h2&gt;
 &lt;p&gt;Infrastructure as a service has risen to prominence as enterprises have sought alternatives to deploying and maintaining their own on-premises &lt;a href="https://www.techtarget.com/searchdatacenter/definition/infrastructure"&gt;infrastructures&lt;/a&gt;. Cloud services have provided an alternative to the high-cost computing equipment required for in-house data centers. Before cloud computing, organizations had few options besides investing in their own servers, networking equipment and storage devices, with the &lt;a href="https://www.techtarget.com/whatis/definition/CAPEX-capital-expenditure"&gt;Capex&lt;/a&gt; and maintenance costs that entailed.&lt;/p&gt;
 &lt;p&gt;Now, when tasks require high-power computing, companies can simply purchase services from a cloud provider, often at a lower cost than equivalent in-house infrastructure. &lt;a href="https://www.techtarget.com/searchitchannel/definition/cloud-service-provider-cloud-provider"&gt;Cloud service providers&lt;/a&gt; procure, manage and secure the required hardware and infrastructure. This leaves their customers free to collect, process, store and retrieve data, but without having to buy and manage the computing hardware. This is especially useful for small and midsize companies that can't afford to implement their own infrastructure.&lt;/p&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="IaaS architecture"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;IaaS architecture&lt;/h2&gt;
 &lt;p&gt;In an IaaS service model, a cloud provider hosts the infrastructure components that are traditionally present in an on-premises data center. This includes physical servers, storage and networking hardware as well as the virtualization or &lt;a href="https://www.techtarget.com/searchitoperations/definition/hypervisor"&gt;hypervisor&lt;/a&gt; layer.&lt;/p&gt;
 &lt;p&gt;IaaS providers also supply a &lt;a href="https://www.techtarget.com/searchcloudcomputing/tip/IaaS-vs-PaaS-options-on-AWS-Azure-and-Google-Cloud-Platform"&gt;range of services&lt;/a&gt; to accompany those infrastructure components. These can include detailed billing, monitoring, log access, cloud security, &lt;a href="https://www.techtarget.com/searchnetworking/definition/load-balancing"&gt;load balancing&lt;/a&gt;, clustering, and storage resiliency, such as &lt;a href="https://www.techtarget.com/searchdatabackup/definition/backup"&gt;backup&lt;/a&gt;, replication and recovery.&lt;/p&gt;
 &lt;p&gt;These services are increasingly policy-driven, enabling IaaS users to implement greater levels of automation and &lt;a href="https://www.techtarget.com/searchitoperations/definition/cloud-orchestrator"&gt;orchestration&lt;/a&gt; for important infrastructure tasks. For example, a user can implement policies to drive load balancing to maintain application availability and performance.&lt;/p&gt;
 &lt;div class="youtube-iframe-container"&gt;
  &lt;iframe id="ytplayer-0" src="https://www.youtube.com/embed/rIlC8aUusmA?si=OIpyiJOr6XHrNY3w?autoplay=0&amp;amp;modestbranding=1&amp;amp;rel=0&amp;amp;widget_referrer=null&amp;amp;enablejsapi=1&amp;amp;origin=https://www.techtarget.com" type="text/html" height="360" width="640" frameborder="0"&gt;&lt;/iframe&gt;
 &lt;/div&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="How does IaaS work?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;How does IaaS work?&lt;/h2&gt;
 &lt;p&gt;IaaS customers access resources and services through a wide area network (&lt;a href="https://www.techtarget.com/searchnetworking/definition/WAN-wide-area-network"&gt;WAN&lt;/a&gt;), such as the internet, and use the cloud provider's services to install the remaining elements of an application stack.&lt;/p&gt;
 &lt;p&gt;For example, the user can log into the IaaS platform and do the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Create VMs and install operating systems in each VM.&lt;/li&gt; 
  &lt;li&gt;Deploy middleware, such as databases.&lt;/li&gt; 
  &lt;li&gt;Create storage buckets for workloads and backups.&lt;/li&gt; 
  &lt;li&gt;Install the enterprise workload into that VM.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;Customers can then use the provider's services to track costs, monitor performance, balance network traffic, run applications and troubleshoot issues, and manage disaster recovery and &lt;a href="https://www.techtarget.com/searchdisasterrecovery/definition/business-continuity"&gt;business continuity&lt;/a&gt;.&lt;/p&gt;
 &lt;p&gt;Any cloud computing model requires the participation of a provider. The provider is often a third-party organization that specializes in selling IaaS. Amazon Web Services (&lt;a href="https://www.techtarget.com/searchaws/definition/Amazon-Web-Services"&gt;AWS&lt;/a&gt;), &lt;a href="https://www.techtarget.com/searchcloudcomputing/definition/Windows-Azure"&gt;Microsoft Azure&lt;/a&gt; and &lt;a href="https://www.techtarget.com/searchcloudcomputing/definition/Google-Cloud-Platform"&gt;Google Cloud&lt;/a&gt; are examples of independent IaaS providers. A business might also opt to deploy a &lt;a href="https://www.techtarget.com/searchcloudcomputing/definition/private-cloud"&gt;private cloud&lt;/a&gt; or &lt;a href="https://www.techtarget.com/searchcloudcomputing/definition/hybrid-cloud"&gt;hybrid cloud&lt;/a&gt;, becoming its own provider of infrastructure services.&lt;/p&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="How do you implement IaaS?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;How do you implement IaaS?&lt;/h2&gt;
 &lt;p&gt;When implementing an IaaS product, there are important considerations. Use cases and infrastructure needs must be defined to determine the technical requirements and providers to consider. The areas to examine include the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;General manageability.&lt;/b&gt; Understand which features of the IaaS the user controls, and how easy they are to control and manage.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Networking.&lt;/b&gt; Ensure the provisioned cloud infrastructure can be easily and efficiently accessed.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Storage.&lt;/b&gt; Consider requirements for storage types, performance levels, space needed, provisioning and potential options such as &lt;a href="https://www.techtarget.com/searchstorage/definition/object-storage"&gt;object storage&lt;/a&gt;.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Compute.&lt;/b&gt; Assess the implications of different servers, VM, CPU and memory options that cloud providers offer.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Disaster recovery.&lt;/b&gt; Examine disaster recovery features and options so you know what to expect in the event of a &lt;a href="https://www.techtarget.com/searchstorage/definition/failover"&gt;failover&lt;/a&gt; on VM, server or site levels.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Server size.&lt;/b&gt; Check out options for server and VM sizes, how many CPUs can be placed on servers, as well as other CPU and memory details.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Network throughput.&lt;/b&gt; Ensure speed between VMs, data centers, storage and internet is adequate.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Security.&lt;/b&gt; Make data security a top priority when evaluating cloud-based services and providers. Questions about data encryption, certifications, &lt;a href="https://www.techtarget.com/searchcloudcomputing/definition/cloud-compliance"&gt;compliance&lt;/a&gt; and secure workloads should be pursued in detail.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/cloudcomputing-iaas_security_checklist-f.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/cloudcomputing-iaas_security_checklist-f_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/cloudcomputing-iaas_security_checklist-f_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/cloudcomputing-iaas_security_checklist-f.png 1280w" alt="Info box highlighting security tasks on an IaaS security checklist." height="246" width="559"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;There are five essential security tasks an organization using IaaS must perform.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;p&gt;During the implementation process, organizations should consider how the technical and service offerings of different providers fulfill business-side needs and specific use requirements. IaaS vendors and products &lt;a href="https://www.techtarget.com/searchdatacenter/post/What-to-consider-when-selecting-an-IaaS-provider"&gt;should be carefully evaluated&lt;/a&gt;, because there's considerable variance within their products, and some are apt to align better with business needs than others.&lt;/p&gt;
 &lt;p&gt;Once a vendor and product are selected, it's important to review all fine-print details and negotiate &lt;a href="https://www.techtarget.com/searchitchannel/definition/service-level-agreement"&gt;service-level agreements&lt;/a&gt;. End-user organizations must assess the capabilities of their IT departments to ensure they're equipped to deal with the demands of an IaaS implementation and to determine what additional &lt;a href="https://www.techtarget.com/whatis/feature/Top-7-cloud-computing-careers-and-how-to-get-started"&gt;training might be needed&lt;/a&gt;.&lt;/p&gt;
 &lt;p&gt;In the IaaS model, the cloud provider is responsible for its own infrastructure, including technical maintenance such as software patches, upgrades and troubleshooting. The end-user organization's in-house IT department is responsible for managing its own computing infrastructure. This personnel assessment is needed to ensure the organization is equipped to maximize value on all fronts from an IaaS implementation.&lt;/p&gt;
&lt;/section&gt;       
&lt;section class="section main-article-chapter" data-menu-title="What are the advantages of IaaS?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;What are the advantages of IaaS?&lt;/h2&gt;
 &lt;p&gt;Organizations choose IaaS models because they offer multiple advantages, including the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Alleviating infrastructure burdens.&lt;/b&gt; It's often easier, faster and more cost-effective to use IaaS to operate and optimize a workload without having to buy, manage and support the underlying infrastructure. With IaaS, a business simply rents or leases the infrastructure from another business.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Accommodating changing business needs. &lt;/b&gt;IaaS is an effective cloud service model for temporary, experimental or unexpectedly changing workloads. For example, when developing new software, a business might host and test the application using an IaaS provider. Once the software is tested and refined, it can be moved to a more traditional in-house deployment. Conversely, the business could commit the software to a long-term IaaS deployment if the costs of a long-term commitment make more sense.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Reducing upfront capital expenditures.&lt;/b&gt; In general, IaaS customers pay on a per-user basis, typically by the hour, week or month. Some IaaS providers also charge customers based on the amount of VM space they use. This &lt;a href="https://www.techtarget.com/searchstorage/definition/pay-as-you-go-cloud-computing-PAYG-cloud-computing"&gt;pay-as-you-go model&lt;/a&gt; eliminates the upfront capital expenses of deploying in-house hardware and software. When a business can't use third-party providers, a private cloud built on-premises can offer IaaS's control and &lt;a href="https://www.techtarget.com/searchdatacenter/definition/scalability"&gt;scalability&lt;/a&gt;, though not the cost benefits.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Flexibility with IT management responsibilities. &lt;/b&gt;Enterprises' infrastructure management responsibilities might change, depending on whether they choose an on-premises, &lt;a href="https://www.techtarget.com/whatis/feature/SaaS-vs-IaaS-vs-PaaS-Differences-Pros-Cons-and-Examples"&gt;IaaS, PaaS or SaaS&lt;/a&gt; deployment. This is often where cloud-based as-a-service offerings demonstrate their flexibility.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;div class="articleVideoFullWidth "&gt;
  &lt;video id="singlePlayer-0" class="video-js" data-account="1367663370" data-player="241dc03c-5fb7-411b-a162-bdf807c489ba" data-embed="default" data-video-id="5670228585001" controls=""&gt;&lt;/video&gt;
  &lt;div class="video-title"&gt;
   &lt;a href="https://players.brightcove.net/1367663370/241dc03c-5fb7-411b-a162-bdf807c489ba_default/index.min.js"&gt;IT management responsibilities&lt;/a&gt;
  &lt;/div&gt;
  &lt;div class="video-summary"&gt;
   &lt;p&gt;Enterprises' infrastructure management responsibilities change, depending on whether they choose an on-premises, IaaS, PaaS or SaaS deployment.&lt;/p&gt;
  &lt;/div&gt;
  &lt;script src="//players.brightcove.net/1367663370/241dc03c-5fb7-411b-a162-bdf807c489ba_default/index.min.js"&gt;&lt;/script&gt;
 &lt;/div&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="What are the disadvantages of IaaS?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;What are the disadvantages of IaaS?&lt;/h2&gt;
 &lt;p&gt;IaaS also comes with some potential disadvantages:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Long-term cloud computing costs.&lt;/b&gt; Despite its flexible, pay-as-you-go pricing model, IaaS billing can be a problem for some businesses. Cloud billing is extremely granular because it's broken down to reflect the &lt;a href="https://www.techtarget.com/searchcloudcomputing/tip/When-to-use-AWS-Compute-Optimizer-vs-Cost-Explorer"&gt;precise services used&lt;/a&gt;. Users sometimes experience higher costs than expected when reviewing the bills for every resource and service involved in application deployment. Users must monitor their IaaS environments and bills closely to understand how the service is being used and avoid being charged for unauthorized services.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Potential vendor lock-&lt;/b&gt;&lt;b&gt;in.&lt;/b&gt; Signing on with a single vendor can result in being locked into that vendor, making it more difficult to change vendors at a later date.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Lack of visibility.&lt;/b&gt; Because IaaS providers own the infrastructure, the &lt;a href="https://www.techtarget.com/searchitoperations/tip/How-to-approach-IT-logging-in-the-cloud-vs-on-premises"&gt;details of their infrastructure configuration and performance&lt;/a&gt; are rarely transparent to IaaS users. This lack of transparency and insight can make systems management and monitoring more difficult for users.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Security breaches.&lt;/b&gt; While cloud vendors are typically diligent when it comes to preventing &lt;a href="https://www.techtarget.com/searchsecurity/tip/6-common-types-of-cyber-attacks-and-how-to-prevent-them"&gt;cyberattacks&lt;/a&gt;, users might have little to no influence on or insights into how the vendor handles security. Rogue employees who gain access can pose a threat if they are undetected.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Disruptions.&lt;/b&gt; Service resilience can also be an issue. A workload's availability and performance are highly dependent on the provider. If an IaaS provider experiences network bottlenecks or any form of internal or external downtime, the users' workloads are affected. In addition, because IaaS is a multi-tenant architecture, the &lt;a href="https://www.techtarget.com/searchcloudcomputing/definition/noisy-neighbor-cloud-computing-performance"&gt;noisy neighbor&lt;/a&gt; issue can negatively impact users' workloads.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="How are IaaS responsibilities shared between vendors and users?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;How are IaaS responsibilities shared between vendors and users?&lt;/h2&gt;
 &lt;p&gt;IaaS is considered a shared responsibility model. This means that cloud service provider takes responsibility for managing its in-house hardware and infrastructure resources, including all security precautions. Providers must also ensure the connectivity and reliability of their networks, so users don't experience downtime or &lt;a href="https://www.techtarget.com/searchdatabackup/definition/Data-loss"&gt;data loss&lt;/a&gt;.&lt;/p&gt;
 &lt;p&gt;On the other hand, user organizations are responsible for securing their own applications and data, as well as using security measures such as encryption and &lt;a href="https://www.techtarget.com/searchsecurity/definition/identity-access-management-IAM-system"&gt;identity and access management&lt;/a&gt;. They must also manage their own network configurations, which can introduce complexities.&lt;/p&gt;
 &lt;p&gt;However, the advantage is that users are free to customize their network as they see fit. As a result, IaaS gives users more control over their processes than PaaS or SaaS. This level of control is just one of multiple differences between IaaS and the other two categories.&lt;/p&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="IaaS vs. SaaS vs. PaaS vs. MaaS"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;IaaS vs. SaaS vs. PaaS vs. MaaS&lt;/h2&gt;
 &lt;p&gt;IaaS is only one type of cloud computing model. It can be complemented by combining it with PaaS, SaaS and &lt;a target="_blank" href="https://azure.microsoft.com/en-us/resources/cloud-computing-dictionary/what-is-models-as-a-service-maas" rel="noopener"&gt;MaaS&lt;/a&gt; (model as a service).&lt;/p&gt;
 &lt;h3&gt;IaaS vs. PaaS&lt;/h3&gt;
 &lt;p&gt;PaaS builds on the IaaS model because, in addition to the underlying infrastructure components, providers host, manage and offer operating systems, &lt;a href="https://www.techtarget.com/searchapparchitecture/definition/middleware"&gt;middleware&lt;/a&gt; and other runtimes for cloud users. While PaaS simplifies workload deployment, it also restricts a business's flexibility to create the environment that it wants.&lt;/p&gt;
 &lt;h3&gt;IaaS vs. SaaS&lt;/h3&gt;
 &lt;p&gt;With SaaS, providers host, manage and offer the entire infrastructure, as well as SaaS applications for users. SaaS users don't need to install anything. They simply log in and use the provider's application, which runs on the provider's infrastructure. Users have some ability to configure the way the application works and which users are authorized to use it. But the SaaS provider is responsible for everything else.&lt;/p&gt;
 &lt;h3&gt;IaaS vs. MaaS&lt;/h3&gt;
 &lt;p&gt;MaaS technology helps bring the power of &lt;a href="https://www.techtarget.com/searchenterpriseai/definition/AI-Artificial-Intelligence"&gt;AI&lt;/a&gt; to business users by delivering ready-to-use machine learning (ML) resources that can be applied to a variety of AI applications.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/itops-pizza_as_a_service.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/itops-pizza_as_a_service_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/itops-pizza_as_a_service_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/itops-pizza_as_a_service.png 1280w" alt="Diagram of IaaS, PaaS and SaaS models and levels of stack ownership." height="312" width="560"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;IaaS, PaaS and SaaS models entail different levels of software stack ownership. The differences can be compared with different pizza services.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
&lt;/section&gt;         
&lt;section class="section main-article-chapter" data-menu-title="What are IaaS use cases?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;What are IaaS use cases?&lt;/h2&gt;
 &lt;p&gt;IaaS and the compute resources it provides are used for a variety of purposes:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Testing and application development environments.&lt;/b&gt; IaaS offers organizations flexibility when it comes to different test and &lt;a href="https://www.techtarget.com/searchsoftwarequality/definition/development-environment"&gt;development environments&lt;/a&gt;. They can be easily scaled up or down as needed.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Hosting customer-facing websites.&lt;/b&gt; This can make it more affordable to host a website, compared to traditional means of hosting websites.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Data storage, backup and recovery.&lt;/b&gt; IaaS can be the easiest and most efficient way for organizations to manage data when demand is unpredictable or might steadily increase. Furthermore, IaaS reduces the &lt;a href="https://www.techtarget.com/searchstorage/Data-storage-management-What-is-it-and-why-is-it-important"&gt;data storage management&lt;/a&gt;, legal and compliance requirements on customers.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Web applications.&lt;/b&gt; IaaS provides the infrastructure needed to host web apps. Therefore, if an organization is hosting a web application, IaaS can provide the necessary storage resources, servers and networking. Users can access these applications through a web browser, allowing quick deployments and easy scalability according to the application's demand.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;High-performance computing (HPC).&lt;/b&gt; Certain workloads, such as scientific computations, financial modeling and product design work, might demand &lt;a href="https://www.techtarget.com/searchdatacenter/definition/high-performance-computing-HPC"&gt;HPC&lt;/a&gt;-level computing.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Data warehousing and big data analytics.&lt;/b&gt; IaaS can provide the necessary processing and compute power for &lt;a href="https://www.techtarget.com/searchbusinessanalytics/definition/big-data-analytics"&gt;big data analytics&lt;/a&gt; to comb through big data sets.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="Major IaaS vendors and products"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Major IaaS vendors and products&lt;/h2&gt;
 &lt;p&gt;There are many IaaS vendors and products that cloud service providers of different sizes offer. Following is a brief list of major cloud service providers, each of which offers IaaS solutions:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;AWS offers cloud storage applications and services such as Simple Storage Service, also known as &lt;a href="https://www.techtarget.com/searchaws/definition/Amazon-Simple-Storage-Service-Amazon-S3"&gt;S3&lt;/a&gt;, and &lt;a href="https://www.techtarget.com/searchaws/definition/Glacier-Amazon-Glacier"&gt;Glacier&lt;/a&gt; as well as compute services, including its Elastic Compute Cloud.&lt;/li&gt; 
  &lt;li&gt;The Google Cloud platform offers storage and compute services through &lt;a href="https://www.techtarget.com/searchaws/definition/Google-Compute-Engine"&gt;Google Compute Engine&lt;/a&gt;.&lt;/li&gt; 
  &lt;li&gt;Microsoft Azure VMs offer cloud virtualization for many different cloud computing purposes.&lt;/li&gt; 
  &lt;li&gt;IBM Smart Cloud Enterprise provides a full suite of IaaS services.&lt;/li&gt; 
  &lt;li&gt;Oracle Cloud Infrastructure delivers many different cloud services, including IaaS.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;Other IaaS offerings can include &lt;a href="https://www.techtarget.com/searchitoperations/definition/serverless-computing"&gt;serverless&lt;/a&gt; functions, such as AWS Lambda, Azure Functions or Google Cloud Functions; database access; big data compute environments; and monitoring and logging.&lt;/p&gt;
 &lt;p&gt;Users must carefully consider the various providers' services, reliability and costs before choosing one. They should also be ready to select an alternate provider and have a plan for redeploying to the alternate infrastructure if necessary.&lt;/p&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="The Future of IaaS"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;The Future of IaaS&lt;/h2&gt;
 &lt;p&gt;IaaS growth in the coming years is projected to be strong, based on several important trends:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;AI is expected to be a key delivery tool of the future, impacting many different aspects of cloud-based services, such as security management and governance.&lt;/li&gt; 
  &lt;li&gt;The need for performance monitoring will be enhanced through &lt;a href="https://www.techtarget.com/searchitoperations/tip/Tips-for-reaching-full-stack-observability"&gt;full stack observability&lt;/a&gt;, which looks at all levels of cloud service, delivering greater performance analytics, and event predictability and management.&lt;/li&gt; 
  &lt;li&gt;Growth of serverless platforms is expected to streamline IaaS deployment.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;</body>
            <description>Infrastructure as a service (IaaS) is a form of cloud computing that provides virtualized computing resources over the internet.</description>
            <image>https://cdn.ttgtmedia.com/visuals/digdeeper/6.jpg</image>
            <link>https://www.techtarget.com/searchcloudcomputing/definition/Infrastructure-as-a-Service-IaaS</link>
            <pubDate>Tue, 14 Oct 2025 00:00:00 GMT</pubDate>
            <title>What is infrastructure as a service (IaaS)?</title>
        </item>
        <item>
            <body>&lt;p&gt;&lt;strong&gt;&lt;a href="#A-C"&gt;A-C&lt;/a&gt;&lt;/strong&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;strong&gt;&lt;a href="#D-F"&gt;D-F&lt;/a&gt;&lt;/strong&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;strong&gt;&lt;a href="#G-I"&gt;G-I&lt;/a&gt;&lt;/strong&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;strong&gt;&lt;a href="#J-L"&gt;J-L&lt;/a&gt;&lt;/strong&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;strong&gt;&lt;a href="#M-O"&gt;M-O&lt;/a&gt;&lt;/strong&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;strong&gt;&lt;a href="#P-R"&gt;P-R&lt;/a&gt;&lt;/strong&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;strong&gt;&lt;a href="#S-U"&gt;S-U&lt;/a&gt;&lt;/strong&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;strong&gt;&lt;a href="#V-X"&gt;V-X&lt;/a&gt;&lt;/strong&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;strong&gt;&lt;a href="#Y-Z"&gt;Y-Z&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt; 
&lt;p&gt;Ensuring the health of people, the planet and even businesses rests on more sustainable practices, which depend on understanding core concepts and terms.&lt;/p&gt; 
&lt;p&gt;Many individuals, businesses, nonprofits and government entities are working hard to quickly create and execute specific sustainability strategies and environmental, social and governance (&lt;a href="https://www.techtarget.com/whatis/definition/environmental-social-and-governance-ESG"&gt;ESG&lt;/a&gt;) initiatives. Everyone has a role to play. Learning about sustainability and ESG concepts ensures that critical stakeholders have productive conversations that avoid term misuse and oversimplification.&lt;/p&gt; 
&lt;p&gt;Climate disruption is having and will continue to have a negative impact on life across the globe. It's imperative that business leaders, private citizens and governments take immediate and decisive &lt;a target="_blank" href="https://www.ipcc.ch/report/ar6/syr/resources/spm-headline-statements" rel="noopener"&gt;action&lt;/a&gt;.&lt;/p&gt; 
&lt;p&gt;Here are some fundamental sustainability terms and ESG concepts that provide a foundation for taking action.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="The 50-plus sustainability and ESG terms you should know"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;The 50-plus sustainability and ESG terms you should know&lt;/h2&gt;
 &lt;ol class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;business sustainability&lt;/b&gt;. Also known as corporate sustainability, &lt;a href="https://www.techtarget.com/whatis/definition/business-sustainability"&gt;business sustainability&lt;/a&gt; is the ethical and responsible management of an organization's continued success with environmental, social and financial concerns.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;carbon credit&lt;/b&gt;. When companies create carbon offsetting initiatives, they receive a transferable or tradeable carbon credit, or token. The credit represents the right to emit greenhouse gases and offset them elsewhere. One credit represents one ton of carbon dioxide reduced or removed from the atmosphere. In practice, taking advantage of these credits lets owners reduce greenhouse gas emissions to get closer to net zero. The term also refers to purchased credits that will fund emission-reducing projects.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;carbon footprint&lt;/b&gt;. A &lt;a href="https://www.techtarget.com/whatis/definition/carbon-footprint"&gt;carbon footprint&lt;/a&gt; measures the amount of carbon dioxide and methane produced by individuals, organizations, products or practices.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;carbon neutral&lt;/b&gt;. The ideal balance between carbon dioxide emissions produced by human activity and carbon absorption by the atmosphere; the calculation should come to zero.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;carbon offset&lt;/b&gt;. A &lt;a href="https://www.techtarget.com/whatis/definition/carbon-offset"&gt;carbon offset&lt;/a&gt; is an activity or purchase intended to compensate for carbon emissions produced by individuals and organizations. Carbon storage through tree planting or land restoration is a common example. Businesses with carbon offset programs receive carbon tokens.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;carbon token&lt;/b&gt;. A digital asset governed by a &lt;a href="https://www.techtarget.com/searchcio/feature/Examples-of-smart-contracts-on-blockchain"&gt;smart contract on blockchain&lt;/a&gt; that represents a real-world reduction in one metric ton of carbon dioxide emissions. The asset exists to verify ownership and simplify the carbon credit trading process. Another example is a non-fungible token, or &lt;a href="https://www.techtarget.com/whatis/definition/nonfungible-token-NFT"&gt;NFT&lt;/a&gt;, representing a single, unique share of captured carbon dioxide associated with a specific time and place. The dependence on blockchain technology to administer carbon tokens is controversial due to blockchain's energy-intensive processes.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;circular economy&lt;/b&gt;. The &lt;a href="https://www.techtarget.com/whatis/definition/circular-economy"&gt;circular economy&lt;/a&gt; keeps products in circulation to the fullest extent possible by reducing material consumption, streamlining processes and collecting waste for reuse.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;clean tech&lt;/b&gt;. Sometimes referred to as green technologies or eco-technologies, this term refers to technologies and processes designed to limit negative environmental impacts, such as waste and carbon emissions, especially compared to fossil fuels. Examples of clean technologies include solar power, wind power, biofuels, recycling and smart lighting.&lt;/li&gt; 
 &lt;/ol&gt;
 &lt;div class="youtube-iframe-container"&gt;
  &lt;iframe id="ytplayer-0" src="https://www.youtube.com/embed/Dg8nTJ0cHVI?autoplay=0&amp;amp;modestbranding=1&amp;amp;rel=0&amp;amp;widget_referrer=null&amp;amp;enablejsapi=1&amp;amp;origin=https://www.techtarget.com" type="text/html" height="360" width="640" frameborder="0"&gt;&lt;/iframe&gt;
 &lt;/div&gt;
 &lt;ol start="9" class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;climate adaptation&lt;/b&gt;. The act of preparing for and adjusting to climate change's current and projected consequences. For example, cities can build seawalls to protect from rising sea levels.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;climate change&lt;/b&gt;. The shifts over time in the average temperature and weather patterns that define specific locations. In particular, climate change has come to mean the rise in global temperatures from heat-trapping gases resulting from mining and using oil, coal and other fossil fuels. &lt;a href="https://www.techtarget.com/sustainability/feature/How-does-climate-change-affect-businesses-Financial-impacts"&gt;Climate change indicators&lt;/a&gt; include rising sea levels; an increase in the severity of extreme weather, such as hurricanes, droughts and floods; and ice loss at the Earth's poles.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;climate mitigation&lt;/b&gt;. The process of decreasing the flow of heat-trapping pollution. For example, reducing fossil fuel burning by using renewable energy sources may help.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;climate resilience&lt;/b&gt;. The ability to support a community, company or the natural environment before, during and after a climate event in a timely, efficient manner. Climate resilience differs from climate adaptation, although the two terms are often used interchangeably.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;climate&lt;/b&gt;&lt;b&gt; risk.&lt;/b&gt; As wildfires, droughts, food scarcity, hurricanes and other climate change effects happen, businesses become more vulnerable. Climate risk describes that vulnerability. It is the potential for climate change to create negative effects on human or ecological systems. Risks fall into two main categories: risks based on the transition to a greener economy, such as losing market share by moving away from fossil fuel-based products, and risks related to the physical effects of climate change, such as flooded offices.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;closed-loop&lt;/b&gt;. A production process that reuses material waste to create additional products or repurposes recycled materials.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;conscious capitalism&lt;/b&gt;. Conscious capitalism is a socially responsible framework for capitalism in the corporate and political spheres. It emphasizes creating human value alongside profit value.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;corporate social responsibility (CSR)&lt;/b&gt;. For-profit companies use the &lt;a href="https://www.techtarget.com/searchcio/definition/corporate-social-responsibility-CSR"&gt;CSR&lt;/a&gt; business model to gauge social and environmental benefits alongside organizational goals, such as profitability.&lt;/li&gt; 
 &lt;/ol&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/esg_vs_csr_vs_sustainability-f.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/esg_vs_csr_vs_sustainability-f_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/esg_vs_csr_vs_sustainability-f_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/esg_vs_csr_vs_sustainability-f.png 1280w" alt="ESG vs. CSR vs. sustainability: what's the difference?" height="262" width="560"&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;ol start="17" class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;digital carbon footprint&lt;/b&gt;. The digital carbon footprint is the amount of greenhouse gas emissions digital devices, tools and platforms produce. All tech, from cloud computing to mobile phones to internet usage, &lt;a href="https://www.techtarget.com/sustainability/tip/Ways-to-reduce-an-organizations-digital-carbon-footprint"&gt;produces a digital carbon footprint&lt;/a&gt;.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;digital sobriety&lt;/b&gt;. Digital sobriety aims to limit the harmful environmental impact of smartphones, internet usage, digital media and other tech in both large and small ways on a daily basis. Moving toward digital sobriety includes a wide range of actions: buying fewer devices, deleting emails, opting for lower-definition media consumption, sustainably developing software and buying less-powerful machines.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;drawdown&lt;/b&gt;. A drawdown is the point at which atmospheric greenhouse gas levels stop climbing and start declining.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;electronic waste (e-waste)&lt;/b&gt;. Electronics at or nearing the end of their useful life. Green tech and sustainability approaches seek to extend the useful life of devices and use circular economy principles to keep the amount of e-waste to an absolute minimum. The priority is to first reduce waste, then refurbish devices, then move toward recycling.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;energy efficiency&lt;/b&gt;. The same task or result is achieved with less energy. For example, heating, cooling and operating appliances and electronics are less energy-intensive in energy-efficient homes and buildings.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;environmental justice&lt;/b&gt;. Environmental justice seeks to ensure fair treatment of all people regardless of race, color, national origin or income equally, regarding environmental laws, regulations and policies. The approach holds that no group should bear a disproportionate share of negative environmental consequences.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;environmental, social and governance&lt;/b&gt;. Sustainable and ethical interests that can be central to an organization's financial and corporate interests. Otherwise known as ESG.&lt;/li&gt; 
 &lt;/ol&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/3_pillars_of_esg-f.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/3_pillars_of_esg-f_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/3_pillars_of_esg-f_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/3_pillars_of_esg-f.png 1280w" alt="An explanation of the three pillars of ESG: environmental, social and governance." height="286" width="560"&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;p&gt;&lt;/p&gt;
 &lt;ol start="24" class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;ESG framework&lt;/b&gt;.&amp;nbsp;A set of objectives companies can use in their&amp;nbsp;&lt;a target="_blank" href="https://www.techtarget.com/sustainability/definition/ESG-reporting" rel="noopener"&gt;ESG reporting&lt;/a&gt;. A variety of&amp;nbsp;&lt;a href="https://www.techtarget.com/sustainability/feature/Top-ESG-reporting-frameworks-explained-and-compared"&gt;ESG frameworks&lt;/a&gt; exist to help companies evaluate their environmental and social impact and assess their internal governance policies, as well as their risks and opportunities.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;ESG reporting&lt;/b&gt;. A disclosure that an organization must provide to show how it works to fulfill its ESG promises and efforts. Some organizations are required to report on ESG, depending on the laws and regulations of the country or countries in which they operate.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;feed-in tariff&lt;/b&gt;. A policy designed to accelerate investments in renewable energy. A policy of this type usually involves long-term government contracts.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;global warming&lt;/b&gt;. Global warming refers to the heating of the Earth's surface from trapped greenhouse gases resulting from human activities, such as transportation, agriculture, overfishing, fossil fuel energy production and overconsumption. Unless companies, governments and consumers make major shifts, global warming and climate change will heat the planet so much that it will be unlivable in the near future.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;green cloud&lt;/b&gt;. The &lt;a href="https://www.techtarget.com/searchstorage/definition/green-cloud"&gt;green cloud&lt;/a&gt; refers to the possible environmental benefits of IT services delivered over the internet. Typically seen as a buzzword, reliance on the alleged benefits can lead technologists to believe that further efforts to reduce carbon footprints are unnecessary.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;green computing&lt;/b&gt;. The sustainable approach to using computing devices and equipment is &lt;a href="https://www.techtarget.com/searchdatacenter/definition/green-computing"&gt;green computing&lt;/a&gt;. Some methods include reducing resource use, responsible disposal of e-waste and deploying energy-efficient IT equipment.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;green IT&lt;/b&gt;. The practice of designing, manufacturing, operating and disposing of IT products and devices to minimize the negative effects of IT operations on the environment is &lt;a href="https://www.techtarget.com/searchcio/definition/green-IT-green-information-technology"&gt;green IT&lt;/a&gt;.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;green premium&lt;/b&gt;. Coined by Bill Gates, green premium refers to the economic and environmental costs of choosing clean tech over financially sound options with higher greenhouse gas emissions.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;green software&lt;/b&gt;. &lt;a href="https://www.techtarget.com/searchsoftwarequality/definition/green-software"&gt;Green software&lt;/a&gt; refers to applications that are designed, developed and implemented in ways intended to minimize energy consumption and environmental effects.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;greenhouse effect&lt;/b&gt;. The result of carbon dioxide, methane and nitrous oxides in Earth's atmosphere trapping the sun's heat.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;greenhouse gas emissions&lt;/b&gt;. The sum of emissions of various heat-trapping gases. Greenhouse gases include carbon dioxide, methane, nitrous oxides and fluorinated gases such as hydrofluorocarbons.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Greenhouse Gas Protocol&lt;/b&gt;. A globally recognized set of reporting and accounting frameworks for managing greenhouse gas emissions from private and public sector operations, value chains and mitigation actions.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;greenhushing&lt;/b&gt;. Greenhushing involves companies intentionally hiding sustainability goals. Companies may do this out of fear of greenwashing accusations or falling short of stated goals.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;greenwashing&lt;/b&gt;. Deceptive, misleading or false claims or actions that an organization, product or service has a positive environmental effect is called &lt;a href="https://www.techtarget.com/whatis/definition/greenwashing"&gt;greenwashing&lt;/a&gt;. Whether intentional or unintentional, the practice is detrimental.&lt;/li&gt; 
 &lt;/ol&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/beware_of_greenwashing-f.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/beware_of_greenwashing-f_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/beware_of_greenwashing-f_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/beware_of_greenwashing-f.png 1280w" alt="Beware of greenwashing and bluewashing, advice on how to select an ecolabel and understand the social responsibility of an organization's supply chain." height="361" width="560"&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;p&gt;&lt;/p&gt;
 &lt;ol start="38" class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;high emitters&lt;/b&gt;. A designation given to companies or countries that emit comparatively high volumes of greenhouse gas. Per capita emissions are used to measure the emissions of nations.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;impact investing&lt;/b&gt;. An investing strategy that directs money toward companies that create a measurable, positive change in the world. This may also be called socially responsible investing.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;impact sourcing.&lt;/b&gt; A sourcing strategy that directs employment and career development opportunities toward people from economically disadvantaged backgrounds.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Intergovernmental Panel on Climate Change (IPCC).&lt;/b&gt; The United Nations' body for evaluating scientific climate change information. The IPCC releases regular reports on climate impacts and risk, and offers options for mitigation and adaptation.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;loss and damage&lt;/b&gt;. Climate-related consequences that people are unable to adapt to, either because the consequence is too severe or the affected community lacks access to the resources to adapt. Loss and damage result from sudden natural disasters, such as floods, or gradual change, such as desertification.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;materiality assessment&lt;/b&gt;. A materiality assessment is a formal way of assessing stakeholders' commitment to specific ESG issues and calculating an organization's &lt;a href="https://www.techtarget.com/sustainability/definition/ESG-score"&gt;ESG score&lt;/a&gt;. It identifies the effect of a certain issue on a company's performance and competitiveness in the market.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;net zero&lt;/b&gt;. The result of lowering greenhouse gas emissions as close to zero as possible and balancing remaining emissions with removals.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Paris Agreement.&lt;/b&gt; The Paris Agreement is a legally binding international treaty on climate change that aims to limit global warming to a 1.5°C temperature increase by the end of the century. The Agreement was adopted at the 2015 UN Climate Change Conference.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;recycling&lt;/b&gt;. The process of collecting and processing waste materials, ideally to make new products.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;responsible innovation&lt;/b&gt;. Responsible innovation prioritizes ethics and social responsibility in the research, design and production of new technologies or evolutions of existing technology. Responsible innovation posits ethics as a design problem.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;scope 1, 2, 3 emissions&lt;/b&gt;. Developed by the Greenhouse Gas Protocol, &lt;a href="https://www.techtarget.com/sustainability/feature/Scope-1-2-and-3-emissions-Differences-with-examples"&gt;scopes give organizations a way to categorize&lt;/a&gt; their emissions. Organizations may find it easier to control scopes 1 and 2, but scope 3 emissions are the most difficult to track.&lt;/li&gt; 
 &lt;/ol&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li style="list-style-type: none;"&gt; 
   &lt;ul class="default-list"&gt; 
    &lt;li&gt;&lt;b&gt;scope 1 emissions&lt;/b&gt;. The direct emissions generated by an organization's operations. Running machinery, manufacturing products, driving vehicles, heating buildings and providing power to devices generate emissions.&lt;/li&gt; 
    &lt;li&gt;&lt;b&gt;scope 2 emissions&lt;/b&gt;. The indirect emissions generated by an organization's energy purchase and usage. Investment in renewable energy sources may help lower these emissions.&lt;/li&gt; 
    &lt;li&gt;&lt;b&gt;scope 3 emissions&lt;/b&gt;. The indirect emissions generated by an organization's customer and supplier activities.&lt;/li&gt; 
   &lt;/ul&gt; &lt;/li&gt; 
 &lt;/ul&gt;
 &lt;ol start="49" class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;supply chain traceability&lt;/b&gt;. In sustainability, &lt;a href="https://www.techtarget.com/searcherp/definition/traceability"&gt;traceability&lt;/a&gt; not only identifies, tracks and traces materials and commodities, but it also verifies sustainability claims across the value chain.&lt;/li&gt; 
 &lt;/ol&gt;
 &lt;div class="extra-info"&gt;
  &lt;div class="extra-info-inner"&gt;
   &lt;h3&gt;For more on ESG strategy and management, read the following articles:&lt;/h3&gt; 
   &lt;p&gt;&lt;a href="https://www.techtarget.com/sustainability/feature/5-ways-organizations-can-address-the-social-factors-of-ESG"&gt;The social 'S' in ESG: Examples, factors and best practices&lt;/a&gt;&lt;/p&gt; 
   &lt;p&gt;&lt;a href="https://www.techtarget.com/sustainability/feature/A-timeline-and-history-of-ESG-investing-rules-and-practices"&gt;A timeline and history of ESG investing, rules and practices&lt;/a&gt;&lt;/p&gt; 
   &lt;p&gt;&lt;a href="https://www.techtarget.com/sustainability/feature/ESG-audit-checklist-steps-for-success"&gt;ESG audit checklist: Steps for success&lt;/a&gt;&lt;/p&gt; 
   &lt;p&gt;&lt;a href="https://www.techtarget.com/sustainability/feature/ESG-marketing-Why-its-important-and-how-to-draft-a-plan"&gt;ESG marketing: Why it's important and how to draft a plan&lt;/a&gt;&lt;/p&gt; 
   &lt;p&gt;&lt;a href="https://www.techtarget.com/sustainability/feature/ESG-materiality-assessments-What-CIOs-others-need-to-know"&gt;ESG materiality assessments: What businesses need to know&lt;/a&gt;&lt;/p&gt; 
   &lt;p&gt;&lt;a href="https://www.techtarget.com/sustainability/feature/ESG-metrics-Tips-and-examples-for-measuring-ESG-performance"&gt;ESG metrics: Tips and examples for measuring ESG performance&lt;/a&gt;&lt;/p&gt; 
   &lt;p&gt;&lt;a href="https://www.techtarget.com/searchcio/feature/10-key-ESG-and-sustainability-trends-for-business-IT"&gt;Key ESG and sustainability trends, ideas for companies&lt;/a&gt;&lt;/p&gt; 
   &lt;p&gt;&lt;a href="https://www.techtarget.com/sustainability/feature/ESG-vs-CSR-vs-sustainability-Whats-the-difference"&gt;ESG vs. CSR vs. sustainability: What's the difference?&lt;/a&gt;&lt;/p&gt;
  &lt;/div&gt;
 &lt;/div&gt;
 &lt;ol start="50" class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;sustainability&lt;/b&gt;. The ability to meet present needs without compromising the needs of future generations. In practice, sustainability aligns environmental protection, human well-being and economic development.&lt;b&gt;&lt;/b&gt;&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;triple bottom line (TBL)&lt;/b&gt;. According to the &lt;a href="https://www.techtarget.com/whatis/definition/triple-bottom-line-3BL"&gt;TBL&lt;/a&gt; accounting framework, the bottom lines calculate financial performance alongside environmental and social effects.&lt;/li&gt; 
  &lt;li&gt;&lt;a id="V-X"&gt;&lt;/a&gt;&lt;a id="Y-Z"&gt;&lt;/a&gt;&lt;b&gt;zero waste&lt;/b&gt;. The concept of managing products, packaging and materials responsibly to minimize environmental harm.&lt;/li&gt; 
 &lt;/ol&gt;
 &lt;p&gt;&lt;b&gt;Editor's note: &lt;/b&gt;&lt;i&gt;This article was updated to reflect changes in terminology around ESG and sustainability topics.&lt;/i&gt;&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Guilliean Pacheco is a former associate site editor for TechTarget Editorial's CIO, ERP and Sustainability &amp;amp; ESG sites.&lt;/i&gt;&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Ben Lutkevich is site editor for TechTarget's IT Infrastructure group. Previously, he wrote definitions and features for Whatis.com.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>Sustainable strategies require a basic understanding of the fundamentals. Business and IT leaders can benefit from this list of essential sustainability terms and ESG concepts.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/esg_a468795958.jpg</image>
            <link>https://www.techtarget.com/sustainability/feature/Sustainability-and-ESG-glossary-Terms-to-know</link>
            <pubDate>Thu, 09 Oct 2025 00:00:00 GMT</pubDate>
            <title>Sustainability and ESG glossary: 52 terms to know</title>
        </item>
        <title>Search Cloud Computing Resources and Information from TechTarget</title>
        <ttl>60</ttl>
        <webMaster>webmaster@techtarget.com</webMaster>
    </channel>
</rss>
