T-Systems bundles methods and processes for cloud migration and thus sets a new standard for company digitization. With the Cloud Migration Framework (CMF) presented here, business clients have access to the accumulated expertise of T-Systems transformation experts, agile methods and highly automated processes.
The Cloud Migration Framework is more than just a toolbox for cloud migration. It is the heart of our new ‘Public Cloud First’ strategy. We have developed a complete value chain from the strategy through to the operation of cloud landscapes, and this can be adapted flexibly to suit the client’s business. This means it also helps our clients to fully exploit the innovative power of the cloud.
The CMF comprises three phases. It all starts with a strategy consultation and an evaluation of the existing IT landscape (cloud assessment). Phase 2 then involves preparations for migration (cloud mobilization): This covers applications and systems, but the IT organization and its employees are also readied for the cloud. Phase 3 comprises the actual migration of workloads, including necessary modernization work (cloud migration & modernization).
“Our experience and the feedback from our clients have shown that it is hugely important to bring the entire IT organization and its employees on board in the move to the cloud,” says Al-Saleh, “because without a cultural shift away from classic IT operations toward the flexible and highly innovative cloud, many of the advantages of the cloud will go unutilized.”
T-Systems also supports companies after migration to the cloud. The service provider’s Managed Cloud Services cover a lot more than just regular operations. The T-Systems experts are continually integrating innovations and enhancements into ongoing operations (DevOps), whereby T-Systems adopts a “Security by Design” approach. This means that data security and compliance are taken into account in migration to the public cloud and in cloud-native solution developments right from the beginning. The Managed Cloud Services are based on the comprehensive security standards of Deutsche Telekom and are subject to European law (European General Data Protection Regulation). What’s more, Deutsche Telekom protects its network with its own state-of-the-art Security Operations Center.