Developing Your Cloud Infrastructure

Like most organizations, you are probably using the Cloud to share files and backup data. According to a Sage survey*, 85% of construction contractors use or plan to use cloud-based solutions. This trend is driven by an increasing need for architecture, engineering and construction firms to support anywhere, anytime access to information that will improve job site communication and collaboration.

As organizations move mission-critical applications and databases to the Cloud, we recommend an IMS strategy (Identify, Match and Secure), as a blueprint for your cloud infrastructure: (1) Identify your business goals, (2) Match with the right cloud infrastructure, (3) Secure endpoint devices.

Identify and Match

If efficiency and collaboration is your goal, move email to the Cloud to reduce the burden on IT and costs of outdated 3rd party email servers.

Using more than one public cloud provider for storage and collaboration? Link services together with publicly available APIs or consolidate services to avoid creating data silos.

Further down the collaboration path, you can deploy ‘virtual desktops’ to your users with a solution like Lenovo Unified Workspace. This workspace aggregation solution makes it possible to deliver to any device, provides access to public or private web-based apps, legacy Windows apps, remote desktops, cloud storage and file shares—all in a user-friendly, cost effective, web-based workspace.

Migrating on-premises or hosted databases to the cloud? Private cloud is the right solution if you have legacy applications, or security requirements that mandate an on-premises solution, or for organizations that been slow to migrate back-office data to the cloud because of security concerns. Otherwise, consider ‘hybrid cloud’ which combines private and public services. Sensitive data and complex workloads - for example collaborating on diagram and plans - can leverage on-premise infrastructure, improving control and reducing latency, but still enabling scale and efficiency through collaboration services on the public cloud.

Secure Endpoints

Three quarters of cloud data breaches are caused by malicious acts or human error** with most of those targeting endpoint devices through malware, or because data was stored inappropriately on unsecured devices.

Protecting endpoint devices is a critical aspect of cloud security. Issue devices that support multi-factor authentication (e.g. biometric security) and enable MFA policies.

Full-disk encryption of devices will protect them from giving up their cloud access credentials in the event of theft or loss.

And there are ways to improve the security of users’ connection to cloud services. For example, Lenovo Vantage detects and analyzes in real-time any threats or attacks that are present near the laptop and enables it to distinguish between legitimate and possibly malicious networks.

* Sage, IT Spending & Staffing Benchmarks,2017
** Ponemon, 2017 Cost of Data Breach Study
Developing Your Cloud Infrastructure

Reducing operational costs and improving analytical power, there is little doubt that cloud computing is the way to go to optimize organizational business intelligence.


  • Lenovo can help secure endpoint devices that are the gateways to your cloud infrastructure. Our wide portfolio includes technologies such as multi-factor authentication (MFA) with fingerprint readers and infra-red cameras; and full-disk encryption protecting your data if a device is lost or stolen with cloud credentials stored onboard.