KuppingerCole Report
Market Compass
By Mike Small

Global IaaS Providers Tenant Security Controls

The KuppingerCole Market Compass reports provide an overview of vendors and their product or service offerings in a certain market segment. This Market Compass focusses on Infrastructure as a Service (IaaS) from Cloud Service providers (CSP) with a global presence and with a specific focus on the capabilities they provide for the tenant to ensure their secure and compliant use of the service.

1 Management Summary

The KuppingerCole Market Compass provides an overview of a market segment and the vendors in that segment. It covers the trends that are influencing t ...

Login Get full Access

2 Market Segment

The market segments for IaaS services are defined by the scale of operation and the richness of the service provided. There are several well-known glo ...

Login Get full Access

2.1 Market Description

IaaS provides a form of IT hosting service which requires no up-front capital expenditure. IaaS provides basic computing resources that the tenant can ...

Login Get full Access

2.2 Major Use Cases

As organizations go through digital transformation, they are using IaaS / PaaS cloud services to change the way they do business by creating new appli ...

Login Get full Access

2.3 Market Direction

The market for cloud services is forecast to grow significantly over the next five years. Much of this growth will depend upon organizations moving, m ...

Figure 1 the market trend compass for IaaS shows that the hype around pure IaaS peaked some years ago and the products in this market have been maturi ...

The ways in which we expect the capabilities provided for tenants to ensure security and compliance within the market for IaaS / PaaS will evolve incl ...

Login Get full Access

3 Capabilities

The Market Compass is designed to profile and compare vendors across numerous capabilities. This section details the capabilities that one should expe ...

Login Get full Access

3.1 All Capabilities

The capabilities provided by IaaS for tenants to ensure that their use of the services is secure and compliant are shown in the table.

Capabil ...
Login Get full Access

3.2 Capabilities Recommended per use case

The market segment for IaaS is evolving to meet several distinct use cases, as described in section 3.2. Below, the capabilities are displayed accordi ...

Login Get full Access

3.2.1 Cloud Native Use Case

The Cloud Native deployments tend to be systems which engage with organizational customers, partners, and suppliers. The security and compliance requi ...

Login Get full Access

3.2.2 Enterprise Hybrid

The enterprise hybrid deployments include business critical applications which integrate with systems that engage with organizational customers, partn ...

Login Get full Access

3.2.3 Business Continuity

Business continuity use cases include using cloud services as a standby as well as for data protection. The security and compliance requirements for t ...

Login Get full Access

3.2.4 Data Protection

To manage the risks relating to the protection of data processed in the cloud requires a range of essential capabilities. The security and compliance ...

Login Get full Access

3.2.5 Compliance

To ensure that the cloud services are being used in a way that meets compliance obligations requires a range of essential capabilities. The security a ...

Login Get full Access

4 Ratings at a Glance

This chapter provides a comparative overview of the participating vendors for five categories: security, deployment, interoperability, usability, and ...

Login Get full Access

4.1 General Product Ratings

Based on our evaluation, a comparative overview of the ratings of the general standing of all the products covered in this document is shown in table ...

Login Get full Access

4.2 Noteworthy Vendors for Specific Capabilities

Some vendors are better positioned to meet narrow use cases, while others have stronger offerings across the range of this market segment. We have ide ...

Login Get full Access

4.2.1 Outstanding for Range of Tenant Security Capabilities: AWS

AWS provides a comprehensive range of capabilities out of the box for the tenant to use their service in a secure and compliant manner. Many of these ...

Login Get full Access

4.2.2 Outstanding in Container Security Management: Google Cloud Platform

Anthos enables the tenant to run Kubernetes clusters anywhere, in both cloud and on-premises environments. It provides a consistent managed Kubernetes ...

Login Get full Access

4.2.3 Outstanding for Confidential Computing: IBM Cloud

IBM Cloud provides important capabilities for protecting the tenant's data in transit, at rest and during processing. These include a Cloud HSM servic ...

Login Get full Access

4.2.4 Outstanding in Data Backup and Recovery: iland

As well as providing an IaaS based on VMware, iland Secure DRaaS allows IT workloads to be replicated from virtual or physical environments to iland's ...

Login Get full Access

4.2.5 Outstanding for Multi Cloud Security Management Capability: Microsoft Azure

Many organizations already use Microsoft's identity and Access products as their primary source for governing access to all their IT services however ...

Login Get full Access

4.2.6 Outstanding for Autonomous Security: Oracle

AI and Machine learning can help to automate the often-forgotten tasks around configuration and patching of systems. Oracle Autonomous capabilities tr ...

Login Get full Access

4.2.7 Outstanding for Security and Compliance Services: Virtustream

Virtustream's xStreamCare Services for Security and Compliance enable tenants to proactively detect, prevent and respond to threats by bringing togeth ...

Login Get full Access

5 Product/ Service Details

Login Get full Access

5.1 Amazon Web Services

AWS has been offering cloud services since 2006 and is now considered to be the largest cloud service provider in the world. AWS cloud services, toget ...

Login Get full Access

5.2 Google

The Google Cloud Platform™ is a set of cloud services that run using the same infrastructure used by Google to deliver its end-user products, such a ...

Login Get full Access

5.3 IBM

IBM offers a wide range of public and private cloud services as well as software, hardware, consulting, and management services. This report focusses ...

Login Get full Access

5.4 iland

With headquarters in Houston Texas, and offices in London UK, and Sydney Australia, iland delivers cloud services from its cloud regions throughout No ...

Login Get full Access

5.5 Microsoft

Microsoft Azure is a comprehensive set of cloud services that can be used to build, modernize, deploy, and manage applications. It includes IaaS provi ...

Login Get full Access

5.6 Oracle

Oracle is a major IT software and hardware vendor. Oracle Cloud Infrastructure (OCI) is an IaaS that provides high-performance computing power to run ...

Login Get full Access

5.7 OVHcloud

OVHcloud is a French company (previously OVH) that was founded in 1999. OVHcloud is a global, hyper-scale cloud provider delivering cloud services to ...

Login Get full Access

5.8 Telefonica

Telefónica is a publicly listed Telecommunications company with headquarters in Spain and annual revenues of over 48 billion Euros in the year ending ...

Login Get full Access

5.9 Tencent

Tencent Holdings Ltd., also known as Tencent, is a Chinese multinational technology conglomerate holding company. Tencent Cloud is the cloud computing ...

Login Get full Access

5.10 T-Systems

T-Systems is a vendor independent provider of digital services with its headquarters in Europe. It has a footprint in more than 20 countries, 29,000 e ...

Login Get full Access

5.11 Virtustream

Virtustream LLC, a Dell Technologies Business, is a cloud service and software provider focussed on the migration and delivery of business-critical ap ...

Login Get full Access

6 Vendors to Watch

Besides the vendors covered in detail in this document, we observe some other vendors in the market that readers should be aware of. These vendors do ...

Login Get full Access

Methodology

Copyright

© 2021 Kuppinger Analysts AG. All rights reserved. Reproduction and distribution of this publication in any form is forbidden unless prior written permission. All conclusions, recommendations and predictions in this document represent KuppingerCole´s initial view. Through gathering more information and performing deep analysis, positions presented in this document will be subject to refinements or even major changes. KuppingerCole disclaim all warranties as to the completeness, accuracy and/or adequacy of this information. Even if KuppingerCole research documents may discuss legal issues related to information security and technology, KuppingerCole do not provide any legal services or advice and its publications shall not be used as such. KuppingerCole shall have no liability for errors or inadequacies in the information contained in this document. Any opinion expressed may be subject to change without notice.

KuppingerCole supports IT professionals with outstanding expertise in defining IT strategies and in relevant decision making processes. As a leading analyst company KuppingerCole provides first-hand vendor-neutral information. Our services allow you to feel comfortable and secure in taking decisions essential to your business.

KuppingerCole, founded in 2004, is a global, independent analyst organization headquartered in Europe. We specialize in providing vendor-neutral advice, expertise, thought leadership, and practical relevance in Cybersecurity, Digital Identity & IAM (Identity and Access Management), Cloud Risk and Security, and Artificial Intelligence, as well as for all technologies fostering Digital Transformation. We support companies, corporate users, integrators and software manufacturers in meeting both tactical and strategic challenges and make better decisions for the success of their business. Maintaining a balance between immediate implementation and long-term viability is at the heart of our philosophy.

For further information, please contact clients@kuppingercole.com.

top