Compute
High-performance, scalable computing resources for your critical workloads. Orchestrate your cloud-native applications with our modern container solutions.
Discover the Compute offer
Virtual machines
VM Instances
An on-demand, flexible and secure virtual machine solution on a shared infrastructure.
Dedicated servers
OpenSource IaaS
Open source virtualised infrastructure in a trusted SecNumCloud-qualified cloud environment for complete technological sovereignty.
VMWare IaaS
Your VMware virtual machines in a trusted SecNumCloud-qualified and HDS-certified cloud environment.
Bare Metal
Dedicated, fully customisable servers for total autonomy over your sovereign infrastructure.
Containers
PaaS OpenShift
The unified platform for creating, modernising and deploying your large-scale applications in a sovereign cloud.
Managed Kubernetes
Managed container orchestration solution offering security, resilience and advanced automation on sovereign infrastructure.
Storage
Adaptable, high-performance storage solutions for all your needs. Optimise your data with our highly available block and object solutions.
Discover our Storage offer
Storage
Block storage
The adaptable block storage solution for optimum storage performance in a sovereign cloud.
Object storage
The scalable, cost-effective storage solution for your unstructured data in a sovereign cloud.
Backup
Backup solutions
Differentiated backup solutions tailored to your challenges and environments
Network
Advanced network solutions to connect and secure your infrastructures. Deploy your private networks automatically and securely.
Discover the Network offer
Network
Virtual Private Cloud
Deploy and manage your private networks 100% automatically and securely.
Private Backbone
Take full control of your network with extended Layer 2 connectivity, designed for hybrid architectures and bespoke configurations.
Firewall
Managed Firewall
Advanced security solutions for complete insulation and enhanced protection
Accommodation Dry
Housing - Dedicated space
Secure hosting for your equipment in a dedicated or shared environment, depending on your needs.
Security
Advanced security solutions to protect your critical infrastructures. Control access and defend against online threats.
Discover the Security offer
Detection
Managed SIEM
A centralised platform for collecting and correlating security logs, combining AI-based automation and advanced detection rules (MITRE ATT&CK).
Sovereign SOC
A sovereign SOC offering operated 24/7, deployable from our marketplace, on SecNumCloud-qualified infrastructure.
Protection
Anti DDoS
The shield against online attacks
Bastion host
Transparent, centralised access control for robust protection of your infrastructure
Managed KMS
Sovereign cryptographic key management, with HSM hardware root of trust, to protect your most sensitive data on SecNumCloud infrastructure.
AI
Artificial intelligence solutions to transform your data into insights and accelerate your business processes.
Discover the AI offer
AI
LLMaaS
Access cutting-edge language models on a sovereign, SecNumCloud-qualified and HDS-certified infrastructure for high-performance, secure AI applications.
GPU
NVIDIA GPU instances to accelerate your artificial intelligence and high-performance computing in a sovereign cloud.
Data
Data solutions to manage, analyse and exploit your critical data.
Discover the Data offer
Databases
Managed MariaDB
A fully managed MariaDB relational database and PITR backup on SecNumCloud sovereign infrastructure.
Managed PostGreSQL
The fully managed relational database solution on SecNumCloud sovereign infrastructure
Big Data
Managed Kafka
The open-source distributed platform for streaming data in real time
Managed File System
A managed, sovereign, high-availability distributed file system, accessible via NFS and SMB on the SecNumCloud infrastructure.
Management & Governance
Coaching and support services to help you with your cloud transformation.
Find out about our support services
Support
Support levels
Discover the 3 levels of support available to help you meet your challenges.
Professional services
From design to optimisation, Cloud Temple is with you every step of the way.
Governance
Console - API - Terraform Provider
A single interface for viewing and managing your products and services
Observability
Infrastructure metrics available in market standards
The magazine > Putting an end to preconceived ideas about the cloud and legacy systems

According to a study by the BT Group, 61% of IT decision-makers in France believe that the cloud will transform the way they work. But this key development in business IT is still coming up against a number of prejudices and particularly biased marketing pitches.

It is common to contrast the cloud with a more serious and reliable form of IT, that of legacy systems, which have proved their worth and are the only ones capable of hosting a company's business tools and sensitive data. Yet there are many examples that run counter to these preconceptions.

Why choose to move away from legacy systems

The AMF's information system is hosted in the cloud. This is also the case for many banks and insurance companies. Why have these institutions and companies with particularly sensitive data made this choice, rather than keeping their traditional legacy systems, which are often considered more solid and secure?

Firstly, they assessed the difference between their own security resources and those of cloud operators. The major operators invest colossally in the physical security of their infrastructures, surveillance, redundancy and fire-fighting systems, as well as in protection against intrusions and computer attacks. IT architecture and security issues are handled by specialists whose skills are usually only available to CAC40 groups. Data availability, confidentiality and integrity are therefore much more effectively ensured than by an in-house Information Systems Department (ISD), regardless of the resources at its disposal.

The logic that drives companies to entrust their data to specialist service providers is the same as that which drives everyone to entrust their money to a bank rather than keep it under their ear: the bank has reached a level of equipment and security expertise that no private individual can acquire.

Those financial institutions that have opted for the cloud have also been won over by its flexibility. Predictability of costs, agility and elasticity of resources are decisive advantages that change the life of every IT department and the business as a whole. The risks of overinvestment in infrastructure are eliminated, along with the slowness and downtime associated with peak workloads.

Taking account of the changing role of CIOs

But these arguments, which have made the cloud such a success, are now being supplemented by a new observation: in companies whose information systems have moved to the cloud, the IT department is no longer just a cost and an independent service, but a supplier of applications that is fully integrated with the other business lines. It is these CIOs who are now enabling their companies to keep pace in the race for innovation. The time saved by outsourcing is now devoted to researching and deploying ways of optimising the company's activity, thereby increasing its productivity and helping it to evolve.

The opposition between legacy systems and cloud computing is too often presented in terms of a choice between traditional security and losing control of one's data. It's time to move away from this outdated dichotomy and recognise that the role of IT Departments is no longer simply to maintain a static system, but to innovate and deploy new tools to drive business growth.

Pierre Schaller

INTRINSEC_CLOUD_TEMPLE_RVB_PPT

Deputy CEO of Cloud Temple
Opinion piece originally published on Les Echos.fr

The magazine
Cookie policy

We use cookies to give you the best possible experience on our site, but we do not collect any personal data.

Audience measurement services, which are necessary for the operation and improvement of our site, do not allow you to be identified personally. However, you have the option of objecting to their use.

For more information, see our privacy policy.