Google Cloud and AWS execs slam Microsoft over changes to cloud licensing
Senior execs from Google Cloud and Amazon Web Services (AWS) have slammed Microsoft over changes to how it charges customers using its software on other public clouds.
Microsoft announced that it would be changing how its customers can use their on-prem licences on the dedicated servers from four cloud providers: AWS, Alibaba, Amazon and Google, plus Microsoft itself.
It twinned the move with the announcement of its Azure Dedicated Host service.
Until now, customers have been able to use the same on-premise licence when moving a workload to a dedicated host in the public cloud, without paying any additional fees. This is because the single-tenant host is treated the same as a traditional outsourcing provider.
But customers will now have to pay additional fees from 1 October if they want to run Microsoft software on dedicated services from the listed providers.
For some services, customers will be required to buy Microsoft's Software Assurance package, or procure the software through the Service Provider License Agreement. They will not be able to bring their own licences.
There are however discounts available for customers wanting to move from on-prem to Microsoft's own Azure Dedicated Host, which has irked its competitors.
Google Cloud president Robert Enslin slammed Microsoft on Twitter, accusing it of "vendor lock-in" and "taking its greatest hits from the ‘90s to the cloud".
AWS CTO Werner Vogels, meanwhile, accused Microsoft of "yet another bait and switch".
Vogels' colleague, AWS VP Sandy Carter, published a blog on LinkedIn, accusing Microsoft of taking a leaf from the "old guard software vendor playbook".
She said that Microsoft has made a number of tweaks over recent years that have hampered AWS customers.
"While these changes might not seem as restrictive as yet another threat of a software audit, this isn't the first time Microsoft has made 'subtle' changes to its licensing that are slowly chipping away at your options," she said.
"In 2018, Microsoft removed customer's rights to bring your SQL Server licences to AWS and use them with our managed service, Amazon Relational Database Service.
"Microsoft wants you to believe that this is just "removal of outsourcing rights", but Microsoft is looking to restrict what computer you can use. And what cloud."
At the moment, Microsoft customers are allowed to use the same licence if they want to move a workload from an on-prem environment to hardware managed by a traditional outsourcing firm.
Until now, this had also translated to single-tenanted public cloud servers - but Microsoft said this should not be the case because "dedicated hosted cloud services by major public cloud providers typically offer global elastic scale, on-demand provisioning and a pay-as-you-go model, similar to multi-tenant cloud services."
"The emergence of dedicated hosted cloud services has blurred the line between traditional outsourcing and cloud services and has led to the use of on-premise licences on cloud services," it said in a blog.
"As a result, we're updating the outsourcing terms for Microsoft on-premise licences to clarify the distinction between on-premise/traditional outsourcing and cloud services and create more consistent licensing terms across multi-tenant and dedicated hosted cloud services."
Customers now wanting to run Microsoft software on single-tenant cloud servers of AWS, Alibaba, Microsoft and Google will have to pay additional fees on top of the standard licensing. No other providers will be affected.
However, customers moving from on-prem to Microsoft's own dedicated cloud server offering can save money by using its Azure Hybrid Benefit.
Microsoft says customers can save up to 40 per cent on Azure Virtual Machines and 55 per cent on Azure SQL Database when running Windows Server virtual machines.
- Security infrastructure Engineer - Firewall | IDS | NAC | Cloud. Exclusive project, £75,000+
- United Kingdom
Security infrastructure Engineer - Firewall | IDS | NAC | Cloud. Exclusive project DCL Search exclusive Identifier Project. To join a financial services business. Key hire to be part of / influence the cyber security capability and direction within the business. Hands on experience managing / monitoring / upgrading / implementing / using the following; · Firewalls: SonicWall and or Palo Alto · NAC: Cisco OR Macmon · WAF | CASB | MDM Experience with SIEM monitoring / vulnerability analysis also highly desirable. MUST have current hands on experience with vulnerability management tooling and best practice. Current Financial services is a nice to have. Learn new skills working within a collaborative team. Grow as a security professional.
- Outside IR 35 CONTRACT SC CLEARED Cyber Security Operations Analyst SPLUNK ES- UK REMOTE- £500 a day.
6 month contract Outside IR35 Operational Cyber Security Analyst. Hands on Splunk Security Enterprise and Security clearance is required As is someone that holds SC clearance. SOC and Vulnerability management experience. Vulnerability Analysis / Management - Tenable
- SailPoint Consultant
- Upto €80,000
SailPoint Consultant is need for this rapidly expanding global business, The business is currently in the middle of a SailPoint Deployment, they require an experienced Consultant who is able to help them on this Journey You will be responsible for helping to configure and deploy SailPoint as well as on board applications onto the platform You will also work with the business to understand workflow and process to help align the way the business works to ensure that the business gets the most from the deployment We are looking for an experienced SailPoint consultant who has experience with both Deployment and BAU work and is interested in joining a business which is at the start of an interesting IAM Journey
- SOC Manager Security Operations. SIEM, Threat / Vulnerability, IR, SOC Service- Exclusive
- United Kingdom
SOC Manager- SIEM, Threat / Vulnerability, Incident response. Exclusive Project. Management and on growth growth of Security Operations Centre capability. Managing and maturing the team, technical services line and fronting client engagements where needed. An in-depth technical background is essential, experience across SOC SIEM/ Threat Hunting (IR) tools, processes, techniques, operational is a MUST. The role will include, but not limited to; evolving the technical process, building operational capability, managing and hiring team, involved at a high level overviewing policy/playbooks, fine turning of the go-to-market collateral etc.