Infrastructure

08:00 AM
Connect Directly
LinkedIn
RSS
E-Mail
50%
50%

Pressures on Bank IT in the Age of Cloud

IT operations face pressures from both business and development teams to provide new and innovative services. Focus is now on keeping ahead of the wave of startups that harness the cloud's rapid business capabilities.

It may safely be said that the first wave of cloud computing adoption, or Cloud 1.0, is largely a mainstream endeavor in financial services and no longer an esoteric adventure only for brave innovators. A range of institutions are either deploying or testing cloud-based solutions that span the full range of cloud delivery models -- IaaS (infrastructure-as-a-service), PaaS (platform-as-a-service), SaaS (software-as-a-service), etc .  

Figure 1
IT is changing from service provider to service partner.
IT is changing from service provider to service partner.

As Brett King notes in his important work on Bank 3.0, this is the age of the hyper-connected consumer. Customers are expecting to be able to bank from anywhere, be it from a mobile device or via the Internet from their personal computers.

Thus there is significant pressure on banking infrastructures in three major ways:

  • To be able to adapt to this new way of doing things and to be able to offer multiple channels and avenues for such consumers to come in
  • To offer agile applications that can detect customer preferences and provide value-added services on the fly -- services that not only provide a better experience but also help in building a long-term customer relationship
  • To be able to help the business prototype, test, refine, and rapidly develop new business capabilities

The core nature of corporate IT is thus changing from an agency dedicated to keeping the trains running on time to one that is focused on innovative approaches like being able to offer IT as a service (much like a utility) as discussed above. It is a commonplace that large banks are increasingly turning into software development organizations.

Figure 2
IT operations face pressures from both business and line-of-business development teams.
IT operations face pressures from both business and line-of-business development teams.

The example of web-based startups forging ahead of established players in areas like mobile payments is a result of the former's ability to quickly develop, host, and scale applications in a cloud environment. The benefits of rapid application and business capability development have largely been missing in banking IT's private application platforms in the enterprise datacenter.

Figure 3
Business applications need to be brought to market at very high velocity.
Business applications need to be brought to market at very high velocity.

Six key technology paradigms that have to be considered by industry players in 2014  include:

  1. Business process and workflow automation, not only to remove the dependence on hardwired and legacy processes, but also to understand and refine the current state of affairs
  2. Complex event processing capabilities to be able to detect and react to big-data streams like social media feeds for payment data -- the applicability of these technologies in areas like fraud detection has been well documented
  3. In the data space, data grids and data virtualization technology that not only does faster analytics, but also is able to provide regulatory and compliance-related stakeholders with 360 degree views 
  4. Open integration that focuses on bringing together disparate capabilities across the enterprise
  5. Cloud computing as an enabler for infrastructure agility and application mobility -- being able to leverage a mix of private and public cloud capabilities in a secure manner
  6. Platform-as-a-service to deliver faster time to market and change to critical applications and business capabilities around X-as-a-service

A final word of advice in this age of cost cutting is for executives to look to leverage open-source where possible across the above areas. The world's leading web properties and Fortune 1000 institutions use a variety of open-source technologies. Robust and well supported offerings are now available across the spectrum, and these can help cut IT budgets by billions of dollars. 

As Chief Architect of Red Hat's Financial Services Vertical, Vamsi Chemitiganti is responsible for driving Red Hat's technology vision from a client standpoint. The breadth of these areas range from Platform, Middleware, Storage to Big Data and Cloud (IaaS and PaaS). The ... View Full Bio
Comment  | 
Print  | 
More Insights
More Commentary
You’re Doing BYOD Wrong: These Numbers Prove It
Almost 40% of users who connect personal mobile devices to corporate networks have no lock-screen mechanism set in place.
Citibank Brazil Deploys Award-Winning BPM Solution: Now What?
Citibank Brazil automated commercial customer onboarding and reduced cycle time by 70%. But how can a global organization harness the successes of its islands of solutions?
The Focus on Data Security Shapes 2015 Hedge Fund Tech Trends
With tougher penalties associated with exposure of client information on the horizon, firms will need to examine the steps they must take to protect this data from attack.
Stop Using Spreadsheets for Disclosure Management, Says Linedata
The rules for aggregating and calculating disclosures vary tremendously across global jurisdictions, getting well ahead of traditional approaches. Interest in automated solutions rises.
Aequitas Approved: Canadian Regs Green-Light Anti-Predatory HFT Exchange
The newly approved Aequitas exchange wants to correct unfair advantages given to HFTs over retail investors. Competition had prompted TMX Group to plan a similarly minded relaunch of the Alpha exchange. But is the devil in the details?
Register for Wall Street & Technology Newsletters
White Papers
Current Issue
Wall Street & Technology - Elite 8, October 2014
The in-depth profiles of this year's Elite 8 honorees focus on leadership, talent recruitment, big data, analytics, mobile, and more.
Video
7 Unusual Behaviors That Indicate Security Breaches
7 Unusual Behaviors That Indicate Security Breaches
Breaches create outliers. Identifying anomalous activity can help keep firms in compliance and out of the headlines.