70% of Workloads to Operate in a Cloud Computing Environment by 2028

According to Gartner, the next phase of cloud computing will involve migrating more complex workloads and presenting new options and requirements for cloud customers. Enterprises currently view the cloud as a way to increase capacity, but by 2028, it will be seen as a necessity and a source of innovation. Legacy applications, including those on mainframes or legacy mid-range systems, will need to be converted or rewritten to be compatible with the cloud. Gartner predicts that by 2028, 70% of tech workloads will run in a cloud environment, compared to the current 25%. Cloud computing will not only be necessary for businesses to compete but also for their survival. However, moving critical applications to the cloud may be challenging. Businesses may choose to impose cloud attributes on these workloads while keeping them in their corporate data centers. Gartner also expects more interest in industry cloud platforms, which combine industry-specific offerings with cloud services. By 2028, over 50% of enterprises will use industry cloud platforms to accelerate their initiatives. Companies will have an expanding range of cloud options beyond the major platforms. Cost governance will remain a focus, and companies will need to manage their cloud spend effectively. Cloud computing is increasingly seen as a secure option, but an area of growing interest is digital sovereignty, ensuring that cloud data is held under the correct data protection regime. To join the new wave of cloud computing, companies should audit their in-house systems and evaluate their application portfolio. Staffing is crucial as well, and companies need a plan to integrate cloud into their technology or business strategy. Executives should monitor and control cloud spending to avoid overspending. Evaluating costs, calculating total cost of ownership and return on investment, considering long-term benefits, and focusing on impactful activities are key recommendations. Cloud resilience is also important, and businesses should align resilience requirements with their needs, take a risk-based approach, build dependency graphs, and implement automated disaster recovery.

Unlock your business potential with our expert guidance. Get in touch now!

silenced-gagged-secret-Michael-adobe.jpg

Post Office Criticized for Deleting Comments on IT Scandal from Social Media

Whitehouse-fotolia-scaled.jpg

When Leaders Overlook Cybersecurity Guidelines, the Entire System Suffers

Police-crime-2-adobe.jpg

Police Digital Service Board Director Resigns Months After CISO’s Departure

surveillance-CCTV-facial-recognition-Gorodenkoff-adobe.jpg

Essex Police Reveals ‘Incoherent’ Facial Recognition Evaluation

chatbot-1-fotolia.jpg

Podcast: RSA 2025 – Navigating AI Risks and the CISO’s Role

hybrid-cloud-storage-fotolia.jpg

Trump’s Visit Strengthens Saudi Arabia’s AI Initiatives

threat-management-fotolia.jpg

Security Tests Uncover Major Vulnerability in Government’s One Login Digital ID System