Cloud computing scenario for SMEs in India | SupportBiz

Tech Mate

Cloud computing scenario for SMEs in India

Indian SMEs have become more open towards adopting cloud computing for a sophisticated technological infrastructure. Far from remaining a “hype” majority of the CIOs started opting for cloud services as a “cost saving” measure.

A study conducted by NASSCOM in association with Deloitte, revealed that cloud computing is expected to have a significant impact on the service industry in terms of ­– services rendered, delivery mechanism, and business models.

A recent Gartner survey found  19 per cent organizations are using cloud services for most of production computing, and 20 per cent  organizations are using storage as a service for all or most storage requirements. "Public cloud adoption is accelerating and public cloud services do, and will, cannibalize IT services spending in the coming years, most notably in the data center," said Bryan Britz, a research director at Gartner.

It has been noted that application hosting and email have become the preferred mode of cloud service for most organizations especially among the SMBs. Among the big names in cloud computing; Amazon, Microsoft, and Google have developed a considerable reach in the small business segment of India.

With the advent of cloud services, SMEs can challenge large-scale enterprises. It gives them flexibility and scalability of a sophisticated technological set-up with limited overheads. Automation of business processes became financially viable for the small business segment. Cloud has a positive impact on the IT scenario of India Inc. offering a host of service portfolio with consumption-based payment.

Cloud computing has revolutionized the Indian IT market heralding new opportunities for the IT service providers and vendors.  Indian IT players have started gearing up in leading the cloud mainstream. Vendors/service providers need to collaborate proactively to develop a robust framework for security, data, and risk management that would comply with the most stringent security guidelines mandated by IT laws.