We use the recommended framework of Assess, Migrate, Optimize, and Monitor as a path for migration.
We will show you a very high-level version of what each stage involves.
We start with a full assessment of your environment or the servers, applications and services that are in scope. We want to bring the teams that use or manage those services in as early as possible. This will ensure that we gather the guidance, feedback and support for the migration successfully.
Next, we can carry out a full inventory and dependency map of the servers and services. We know that businesses can have hundreds of applications across the estate. These must be fully investigated.
Is it worth migrating? Moving to the cloud isn’t always beneficial cost wise but there can be some savings over a course of time that we can calculate. We can find the Total Cost of Ownership (TCO) to estimate the real costs of supporting the project in light of the company's longer-term financial goals.
It's often best to start with a small migration instead of migrating a large, business-critical workload. This approach lets you become familiar with the tools, processes, and procedures for migration. It can reduce the risk of issues when you migrate larger workloads. As you become more comfortable with the migration process, you can progress to larger and more business-critical workloads.
We aim to keeps things as simple as possible. The high level, the steps are:
Now the workloads have been migrated we can decommission the on-premises systems that were identified during the discovery stage.
All the top cloud providers have a cost explorer/analyse section in their portal. We can use these to make sure and that they are as efficient as possible in both cost and performance needed.
Also, within these portals you can also get suggestions on improving security, performance (increasing or decreasing) and high availability. These recommendations can really improve and fine tune your environment.
Now your workloads have been migrated into the cloud we can utilise some of the great features like reporting and alerting.
You can set up alerts based on a range of data sources, such as:
Security information and event-management (SIEM) capabilities, along with artificial intelligence to help you protect against, detect, and respond to security events. This information helps security operations (SecOps) teams triage critical alerts and prioritize work effectively if required.