Make every network change safe: Assurance, observability & lifecycle

In my first blog of this two-part series, I broke down the five automation metrics and principles I rely on most to help leadership demonstrate value. This second blog builds on that thinking. In my e-book, Network automation in 2026: building resilience, assurance and future-ready networks, I explained that one of the biggest challenges that network and operations leaders face today is making every change safe. 

Automation is not just about efficiency, but maintaining control within modern networks that are dynamic, distributed and tightly-connected to cloud platforms and third-party services. While automation is essential, speed without control creates risk. By unifying the three capabilities of assurance, observability and lifecycle management, it becomes possible to execute network changes in a safe and repeatable way.

Assurance: Validate before and after every change

For me, assurance is the foundation. Validate every change is safe and compliant before it goes live, then confirm it behaves as intended after deployment. Continuous validation before and after every change is now expected, helping to ensure changes are safe and compliant. Streaming telemetry and service mesh architectures provide real-time visibility, making it easier to spot issues and respond quickly

How to implement assurance:

  • Define policies as code and embed them in your pipeline. 
  • Run intent checks to catch misconfiguration and drift early. 
  • Use change windows that include automated validation and safe rollback paths.

Outcome: Fewer failed releases and emergency fixes and better audit outcomes because evidence is generated as part of normal work. 

Observability: Real insight from streaming telemetry

In my first blog, I covered MTTR and MTTD with the time it takes you to detect issues and restore normal service. Observability is what drives this. Move beyond static, device-centric health checks to provide continuous visibility across paths, services and users.

How to implement observability: 

  • Stream telemetry from network and edge assets into a common model. 
  • Use service mesh patterns where appropriate to trace requests end-to-end. 
  • Align dashboards to service objectives, not individual devices. 

Outcome: Faster detection, clearer root cause and performance data that stakeholders can actually trust. 

Lifecycle management: Remove tech debt as you modernise

Teams often try to automate on top of legacy risks. Lifecycle management prevents that. You plan upgrades, renewals and retirements proactively to prevent new changes from piling risk onto legacy.

How to implement lifecycle management: 

  • Maintain an accurate inventory and map controls to business risk. 
  • Standardise on reference designs that are easier to secure and support. 
  • Budget for renewal and decommissioning alongside new projects. 

Outcome: Lower exposure, simpler operations and a platform that adapts as the business evolves. 

How to implement a safe automation framework

To bring assurance, observability and lifecycle management together for safe automation, I recommend organisations consider the following best practices:  

  1. Start with responsibility: Assign clear owners for providers and controls. Everyone should know who approves what. 
  2. Use reference designs: Build simple patterns that map known threats to specific controls, then reuse them. 
  3. Automate safely: Codify configuration and policy, prevent drift and escalate recovery with tested rollbacks. 
  4. Adopt Zero Trust: Assume breach, verify access and enforce least privilege across sites and clouds. 
  5. Strengthen monitoring: Track performance, changes, access and compliance in one place. 
  6. Keep governance practical: Set standards that teams can follow, measure them and iterate. 

What to measure

To make progress visible and defensible, you can refer back to the core metrics from my e-book and previous blog:  

  • Change success rate and rollback avoidance 
  • MTTR and MTTD
  • Compliance score and drift
  • Latency and packet loss against service objectives.

These metrics will help you determine whether your automation is actually making change safer.  

Two quick wins for the first 30 days

If you want to quickly build momentum, I recommend: 

  • Pre-change validation on one high-traffic service: Add automated checks for policy compliance and performance impact, then track the effect on change success rate. 
  • Drift detection with weekly remediation: Choose a critical domain, enable drift alerts and close gaps to raise your compliance score. 

Where SD-WAN and SASE fit

At the edge, SD-WAN and SASE extend consistent policy and observability to every site. They simplify operations, support identity-led access that aligns to Zero Trust and reduce risks from technical debt and legacy systems so networks can adapt securely as business needs evolve. 

How we can help

In my work with clients, I see the same challenge time and again: network change needs to move faster, but it also needs to be safer and more predictable. At CACI, we help organisations bring structure, visibility and governance to complex networks so change can happen with confidence. 

We support teams in putting practical assurance and observability in place, improving lifecycle management and reducing configuration drift, without slowing delivery. That means fewer regressions, clearer accountability and a more predictable change pipeline.
 
If you’d like to explore how this approach could work in your environment, visit our Network Automation page to start the conversation with our specialists. 
 
You can also download my new Network Automation in 2026 eBook for a deeper dive into how assurance and automation work together to build resilient, future-ready networks. 

Five network automation metrics & principles every CIO should track

In this Article

In my new e-book ‘Network automation in 2026: building resilience, assurance and future-ready networks’, I uncover how network automation is no longer just about speed, but about reducing operational risk, strengthening compliance and stabilising services when the unexpected strikes. To meet the expectations of leadership, network automation must clearly demonstrate its ability to deliver on outcomes.  

This first blog in a two-part series breaks down five automation metrics and principles I rely on to help advise leadership: practical, executive-friendly and aligned to how boards evaluate resilience, risk and customer experience.

1. Change success rate and rollback avoidance 

What it is: This is the proportion of changes that complete as planned without causing incidents or requiring rollback. 
Why it matters: In my experience, this is one of the fastest ways to prove to leadership that automation is about increasing safety and predictability, not just throughput. 

How to improve:  

  • I always begin with applying pre-change validation, policy gates and standardised reference designs that map controls to threats with simple, repeatable patterns. These give teams simple, repeatable patterns that map controls to threats. 
  • Instrument your pipelines to capture change outcomes automatically.
  • Assign clear ownership to execute each change and align teams.  

What good looks like: A steady rise in successful, first-time changes and a consistent fall in rollbacks over consecutive release cycles. 

2. Mean time to detect (MTTD) and mean time to repair (MTTR)

What it is: The time it takes you to detect issues and restore normal service. 
Why it matters: I find that detection and recovery are very important for leadership, especially because automation and observability deliver measurable business value. 

How to improve:  

  • Stream all of your telemetry into a single view, then use intent checks to highlight drift or policy violations and automate first line remediation where safe.  
  • Strengthen monitoring by tracking network performance, changes, access, compliance and security events.

What good looks like: Faster detection windows followed by runbook-driven recovery that is measured in minutes, not hours.

3. Compliance score and configuration drift

What it is: A combined indicator of how closely your estate aligns to policy and how far it strays from approved configurations. 
Why it matters: Boards and auditors need confidence that controls are enforced consistently across hybrid estates. 

How to improve:  

  • Treat policies as code and run continuous checks.  
  • Block non-compliant changes before they land.  
  • Generate audit evidence automatically to save a huge amount of time.  
  • Keep governance practical by setting clear standards, control owners and measurable policies. 

What good looks like: A rising compliance score with drift trending down. Exceptions are documented and time-boxed. 

4. Alert volume reduction

What it is: A measure of how many alerts actually correlate to meaningful incidents. 
Why it matters: High alert volume hides real risk and drains team capacity. 

How to improve:  

  • Consolidate tooling, de-duplicate at the source, only measuring what maps to user or service objectives.  
  • Safely automate by applying Infrastructure as Code and Policy as Code to prevent drift and speed up recovery.

What good looks like: Fewer alerts, higher signal quality and a clear link between alerts and customer impact. 

5. Latency and packet loss against service objectives

What it is: End-to-end performance measured against the targets that matter most for your services. 
Why it matters: User experience is the ultimate goal. Device health means little if transactions stall. 

How to improve:  

  • Set service-level objectives (SLOs) for your priority journeys, instrument path visibility and factor network changes into performance reviews.  
  • Adopt Zero Trust principles to assume breach, verify access and enforce least privilege.  

What good looks like: Stable or improving latency and loss for your top services, even during high change periods. 

How to get started 

I recommend teams start small when adopting these metrics, but take the following into consideration: 

  1. Select two high impact metrics that you can measure today. 
  2. Automate the collection and reporting so data is timely and trusted.
  3. Share a simple scorecard with trend lines and short commentary.
  4. Only add more metrics when the first set is stable. 

How we can help

In my work with CIOs, one of the biggest challenges I see is turning network automation into something that’s measurable, governed and trusted. At CACI, we help organisations align automation with business goals, reduce operational risk and create real clarity around performance and compliance. 

We bring proven architectures, practical operating models and clear measurement frameworks, so teams can track success rates, reduce configuration drift and improve incident response. We also help teams build simple, outcome focused scorecards that connect day-to-day network activity to executive priorities. 

If you’d like support establishing a metrics baseline or shaping an automation roadmap around the principles in this blog, visit our Network Automation page to learn more or get in touch with our specialists. 

You can also download my Network Automation in 2026 eBook for a deeper look at the frameworks and metrics that high performing organisations are using today. 

In the next blog in this series, I’ll explore how assurance, observability and lifecycle management work together to make every network change safe. 

Case study

How Hertfordshire County Council uses CACI’s Acorn to house displaced Ukrainians

Hertfordshire County Council

Summary

Hertfordshire County Council serves a population of 1.2 million residents and offers a range of services including Adult Care Services, Children’s Services and Public Health Initiatives. The council is responsible for administering the Homes for Ukraine scheme across the county, via a dedicated team working with partners to manage the scheme’s requirements of Ukrainians fleeing conflict. These requirements focus on the safety, suitability and support for those arriving to hosted accommodation in Hertfordshire. The team also provide a service to support guests moving on from a host, including rematching Ukrainian guests with new hosts if their existing arrangement can no longer continue.

Company size

10,000+

Industry

Non-Profit

Products used

Challenge

Rematching Ukrainian guests with new hosts is a substantial part of the council’s Ukraine Sunflower Campaign, as it is aimed at encouraging more rematch hosts to come forward while retaining those already in place. Due to the conflict  continuing, some hosts are unable to house guests longer term. It is also preferable for guests to remain hosted within their original vicinity, district or area, both from a cost perspective to the council and for guests’ wellbeing, as they may have formed relationships and begun settling in.

With a key message being “you only need a spare room”, the council operated under the assumption that the ability to host and likelihood of having a spare room fundamentally came down to affluence. This prompted conversations around the impact that more targeted efforts could have on campaign outcomes rather than operating on a scattered approach and the powerful role that data could play.

Solution

The council decided to concentrate an early phase of their rematch campaign in St Albans, a district within Hertfordshire. Through a blended data approach that leveraged segmentation insights from CACI’s Acorn data, persona profiles from Acorn’s Pen Portraits and HCC records, the council was able to pinpoint St Albans as the area with the highest concentration of likely hosts with the help of Laurel Smithson, Strategic Communications Manager. These typically comprise households with adult children who had moved out or were living in larger properties with spare rooms available, making them an ideal demographic for hosting.

Brianna Schubert-Mordey, Intelligence Analyst and Geodemographic Lead at Hertfordshire County Council, initiated an integrated data strategy by merging Acorn’s demographic data with Hertfordshire-specific datasets. This enabled the creation of a customised segmentation model and development of seven unique personas tailored to reflect the characteristics of the Hertfordshire population. An algorithm, K-modes, was used to analyse data for each postcode and determine the optimal number of clusters, allocating each postcode to one of seven defined clusters. This would eliminate human bias when identifying similar types of residents, with each cluster becoming a persona.

The composition of each segmentation and each of the seven personas was then assessed using the data available. This enabled naming conventions for each persona that represented respective key factors. These 7 Personas are as follows — Young and Financially stretched, Stretched Families, Comfortable Neighbourhoods, Affluent Families, Financially Secure Maturity, Highly Affluent Maturity and Struggling Elders, and have been created to reflect Hertfordshire’s local population.  CACI Data has been used along with proprietary data the council reported on about council tax bands, dwelling values based on sold house prices and the likelihood of individuals calling into their call centre compared to other households within Hertfordshire.

Following this, Laurel approached Brianna and the HCC Homes for Ukraine team regarding the Homes for Ukraine project. Their goal was to identify target households that could potentially host a family based on these seven personas. Brianna’s team sent Laurel a list of postcodes to be aligned to these specific segments to assess the affluence, financial maturity and security of various areas across Hertfordshire, with a particular focus on identifying comfortable neighbourhoods and affluent households to gauge the affluence maturity and financially security of various areas in Hertfordshire, as well as postcodes containing comfortable neighbourhoods and affluent families.

St Albans and its vicinity was ultimately targeted with Royal Mail leaflet drops and digital advertising, with trackable links set up for each form of communication. The leaflets were most one of the most successful in leading people to the council’s rematch website.

Due to the success of the St Albans pilot, the council was inspired to execute this rematch campaign once again in East Hertfordshire, another higher affluence area where the target demographic of potential hosts for displaced Ukrainians is situated. Due to feedback received on the reliance of Royal Mail delivery, including some households within the targeted postcode being considered inappropriate (such as care homes), this phase of the campaign took an even more targeted approach. Colleagues from the Homes for Ukraine team undertook the hand delivery of leaflets, allowing for higher reliance and feedback on the ground. This initiative has seen a higher uptake than the St. Albans targeting.

Results

Through Household Acorn and Acorn, Hertfordshire County Council have been able to:

  • Help Adult Care services identify where to target leafleting and outreach work
  • Allow the Customer Service Centre to identify the Acorn segmentations that are over/underrepresented in terms of calls
  • Highlight the areas most likely to be able to host Ukrainian families
  • Understand the types of residents in an area
  • Profile current foster carers and patrol crossing staff and use this information to communicate with potential new carers/staff.

This initiative has brought many more rematch hosts forward and has even inspired council staff to become hosts. In fact, the Ukraine Sunflower Campaign won a comms2point0 award in December 2024 for being “…a campaign that used insight, data and measurement to deliver high impact and change people’s lives.” A comms2point0 ‘UnAward’ honours “creativity, innovation and results in the comms industry”.

With devolution, local government will be changing in the coming years, and Acorn could be used to help Hertfordshire County Council understand the needs of residents throughout this change. Using CACI’s data to map and pinpoint hard-to-reach individuals facing health inequalities would also support the council’s future endeavours.

Case study

How Money and Pensions Service (MaPS) helps people improve their financial futures through a refreshed segmentation solution

Money and Pensions Service logo

Summary

The Money and Pensions Service (MaPS) is a statutory
body sponsored by the Department for Work and
Pensions dedicated to helping people – particularly
those most in need – make well-informed decisions
about their money and pensions and improve their
Financial Wellbeing and resilience to build a more
secure future.

CACI has worked in partnership with MaPS for a
decade, delivering a range of analytical solutions
that have enhanced MaPS’ understanding of the
UK’s financial wellbeing. This work has included the
development of MaPS’ current Financial Wellbeing
segmentation solution, which supported the
understanding and underpinning of their national
strategy.

To fulfil their remit, MaPS must understand the
varying financial needs of UK consumers and the
characteristics, features and locations of consumers
with lower Financial Wellbeing. This insight is critical
for targeting the right groups of consumers and
offering them the necessary support.

Company size

0-500

Industry

Financial Services

Products used

Challenge

The UK’s economic landscape has changed since the development of the previous Financial Wellbeing solution in 2019-2020, with many households’ finances having been and continuing to be affected. As such, MaPS needed CACI to review and refresh the existing segmentation to ensure it remained fit-for-purpose in reflecting the Financial Wellbeing of the UK population and would distil a complex array of characteristics into one cohesive solution.

Solution

The UK’s economic landscape has changed since the development of the previous Financial Wellbeing solution in 2019-2020, with many households’ finances having been and continuing to be affected. As such, MaPS needed CACI to review and refresh the existing segmentation to ensure it remained fit-for-purpose in reflecting the Financial Wellbeing of the UK population and would distil a complex array of characteristics into one cohesive solution.

A blended data approach was instrumental in the innovative development of this segmentation. MaPS’ flagship Financial Wellbeing survey (known as “MoneyView” from 2025) and scoring methodology was used to inform the clustering algorithms alongside CACI’s UK-wide datasets to define the segments and add further colour and context into who these people are. Consolidating research with Fresco, CACI’s powerful individual-level financial services segmentation, and Ocean, CACI’s attribute-rich consumer database, ensured segments and sub-segments would be accurately rolled out across the UK at various geographic levels. This ranged from more granular postcode sectors to local authority area or region and can be applied to financial service providers’ customer databases. Through the range of data inputs, segments and sub-segments could be profiled across over 900 characteristics to enhance understanding and drive ongoing strategy through data-driven insight.

As a result, this refreshed solution is helping MaPS define, describe and outline a set of characteristics of those most in need, as well as who to target and reach. It will also enable the opportunity to profile service users and whether users with lower financial well-being were adequately supported.

Outcomes

MaPS’ refreshed Financial Wellbeing segmentation offers a range of new benefits, including:

  • An enhanced understanding into how consumers’ needs differ and the areas of greatest need.
  • An accurate representation of the current population’s financial situation, given changes to the market.
  • Aligning to MaPS’ Financial Wellbeing scoring for consistency with internal methodologies.
  • Ensuring reach is applicable to the whole of the UK.
  • Underpinned by Fresco, enabling its use by wider financial service organisations to bolster their understanding of Financial Wellbeing (which can be particularly helpful in the context of Consumer Duty).

The refreshed segmentation has been fundamental in aspects of MaPS’ operations, from content design to communications activity. For example:

  • Informing MaPS’ UK strategy for Financial Wellbeing.
  • Identifying the target audience for MaPS’ cost of living campaign
  • Participant recruitment in user research when developing new tools and services.
  • Understanding local regions and areas across the UK most in need of support for partnerships.
  • Understanding needs, issues and policy innovation.

To find out more about the Money and Pensions Service Financial Wellbeing strategy, click here

How to strengthen your network security posture

In this Article

When it comes to strengthening your network security posture, doing so is no longer a nice-to-have, but a strategic necessity. The notion of strengthening your network may sound time-intensive and lengthy, however, there are some immediate changes that can lead to quick wins. In this blog, we uncover four key steps IT leaders can take to strengthen network security posture and immediate quick wins that can be achieved upon doing so.  

Four steps to strengthen your network security posture

Security is no longer optional. These four foundational actions will help you reduce risk and build resilience: 

1. Adopt zero trust principles

Zero trust means “never trust, always verify.” Every user and device inside or outside the network must be authenticated and authorised. This approach limits the impact of breaches and is now recommended by the NCSC and leading global providers.  

  • Implement strong authentication for all users and devices.  
  • Segment networks to limit lateral movement.  
  • Continuously monitor for unusual behaviour.  

2. Automate detection and response

Manual processes cannot keep pace with modern threats. Automation can reduce response times by up to 40%, demonstrating its ability to help defenders stay ahead. 

  • Use AI-driven tools for threat detection and alert triage.  
  • Automate patching, backup, and incident response workflows.
  • Regularly test and updated automated playbooks.

3. Operational load

With many IT teams stretched thin, managed network services allow organisations to focus on strategy while experts handle day-to-day operations, monitoring and compliance. 

  • Consider managed firewall, detection and response and vulnerability management services.  
  • Ensure providers offer transparent reporting and clear SLAs.

4. Secure hybrid work

With two-thirds of UK employees working remotely at least part-time, endpoint protection and secure remote access are essential.  

  • Enforce multi-factor authentication for all remote access.  
  • Protect endpoints with up-to-date security software and policies.
  • Educate staff on secure working practices. 

Quick wins: Immediate actions UK IT leaders should take 

Not every improvement requires a major investment or a long-term project. The following actions can quickly reduce risk and strengthen your security posture:  

Enable multi-factor authentication (MFA) 

Multi-factor authentication (MFA) is one of the most effective ways to prevent account compromise, blocking the majority of phishing and credential stuffing attacks.  

  • Enforce MFA for all users, not just administrators.  
  • Use app-based or hardware tokens for stronger protection. 
  • Regularly review and test MFA coverage.  

Read NCSC guidance on MFA  

Patch the basics consistently and quickly

Most breaches exploit known vulnerabilities. Even delays in patching of a few days can be costly.  

  • Maintain an up-to-date inventory of all assets, including cloud workloads and remote endpoints. 
  • Apply critical patches within 14 days, as recommended by the NCSC.  
  •  Automate patch deployment and monitor for failures.  

Back up critical data securely and test your restores

Ransomware is only effective if you cannot recover your data. Secure, tested backups are essential.  

  • Use immutable, offsite or cloud-based backups.  
  • Regularly test restores to ensure data integrity.  
  • Protect backup credentials with MFA and restrict access.

Review firewall rules and access controls

Firewall policies can become cluttered over time with unused or overly permissive rules, creating hidden vulnerabilities.  

  • Schedule regular firewall reviews to remove unused or risky rules.  
  • Align policies with current business needs.  
  • Use automated tools to analyse policies for overlaps and compliance gaps.   

Run a tabletop incident response exercise 

Plans are only effective if teams can execute them under pressure. Tabletop exercises simulate real-world incidents, allowing teams to rehearse roles and identify gaps.  

  • Involve both technical and business stakeholders.  
  • Use realistic scenarios tailored to your organisation.
  • Capture lessons learned and update your incident response plan.  

See NCSC’s guidance on incident response exercises 

How CACI can help enhance your network security

CACI has helped UK businesses protect their networks for decades. From network security to data centre solutions and IT consulting, our expertise delivers secure-by-design architectures, automation, and incident readiness for robust network security.  

Download our 2026 Network Security Survival Guide today to learn more about how your organisation can set its network environments up for success. 

The 9 biggest challenges in cloud security

In this Article

The demand for cloud-based offerings and cloud adoption has accelerated, with the importance of flexibility and agility now being realised. Without adapting, businesses risk being left behind. What are the benefits, however, and how do you know if it’s the right solution for you? 

We shared the key advantages of cloud adoption in our previous blog. This time around, we identify the biggest challenges of cloud security. 

Cloud adoption has become increasingly important in recent years, with 64% of all enterprises now regarding cloud security as a pressing security discipline. Despite its integral role, more than half of all enterprises find securing cloud environments to be more complex than securing on-premises venues. 

As cybercriminals increasingly target cloud environments, the pressure is on for IT leaders to protect their businesses. Here, we explore the most pressing threats to cloud security you should take note of. 

Limited visibility

The traditionally used tools for gaining complete network visibility are ineffective for cloud environments as cloud-based resources are located outside the corporate network and run on infrastructure the company doesn’t own. Furthermore, most organisations lack a complete view of their cloud footprint. You can’t protect what you can’t see, so having a handle on the entirety of your cloud estate is crucial. 

Lack of cloud security architecture and strategy

The rush to migrate data and systems to the cloud meant that organisations were operational before thoroughly assessing and mitigating the new threats they’d been exposed to. The result is that robust security systems and strategies are not in place to protect infrastructure. 

Unclear accountability

Pre-cloud, security was firmly in the hands of security teams. In public and hybrid cloud settings, however, responsibility for cloud security is split between cloud service providers and users, with responsibility for security tasks differing depending on the cloud service model and provider. Without a standard shared responsibility model, addressing vulnerabilities effectively is challenging as businesses struggle to grapple with their responsibilities. This not only obfuscates incident response, but increases the likelihood of risks and misconfigurations. 

Misconfigured cloud services

Misconfiguration of cloud services can cause data to be publicly exposed, manipulated or even deleted. It occurs when a user or admin fails to set up a cloud platform’s security setting properly. For example, keeping default security and access management settings for sensitive data, giving unauthorised individuals access or leaving confidential data accessible without authorisation are all common misconfigurations. Human error is always a risk, but it can be easily mitigated with the right processes. 

Data loss

Data loss is one of the most complex risks to predict, so taking steps to protect against it is vital. The most common types of data loss are: 

  • Data alteration – when data is changed and cannot be reverted to the previous state. 
  • Storage outage – access to data is lost due to issues with your cloud service provider. 
  • Loss of authorisation – when information is inaccessible due to a lack of encryption keys or other credentials. 
  • Data deletion – data is accidentally or purposefully erased, and no backups are available to restore information. 

While regular back-ups will help avoid data loss, backing up large amounts of company data can be costly and complicated. Nonetheless, ransomware attacks swelled by 126% earlier this year, reiterating the necessity for businesses to conduct regular data backups.  

Malware

Malware can take many forms, including DoS (denial of service) attacks, hyperjacking, hypervisor infections and exploiting live migration. Left undetected, malware can rapidly spread through your system and open doors to even more serious threats. That’s why multiple security layers are required to protect your environment. 

Insider threats

While images of disgruntled employees may spring to mind, malicious intent is not the most common cause of insider threat security incidents. Worryingly, the frequency of insider-led incidents is on the rise. According to a report published this year, nearly half of the organisations surveyed noticed an increase in the frequency of their insider threats. The financial repercussions of this increase have led to costs increasing by 109% between 2018 to 2024, posing serious financial risks to affected organisations. 

Compliance concerns

While some industries are more regulated, you’ll likely need to know where your data is stored, who has access to it, how it’s being processed and what you’re doing to protect it. This can become more complicated in the cloud. Furthermore, your cloud provider may be required to hold specific compliance credentials. 

Failure to follow the regulations can result in substantial legal, financial and reputational repercussions. Therefore, it’s critical to handle your regulatory requirements, ensure good governance is in place and keep your business compliant. 

API vulnerabilities

Cloud applications typically interact via APIs (application programming interfaces). However, insecure external APIs can provide a gateway, allowing threat actors to launch DoS attacks and code injections to access company data. 

In 2020, Gartner predicted API attacks would become the most frequent attack vector by 2022. With over half of all enterprises reporting an increase in direct attacks to compromise infrastructure as of 2025, this prediction has become a reality. Addressing API vulnerabilities will therefore be a chief priority for IT leaders in 2025 and beyond. 

Check out our comprehensive guide to cloud security for more insights on overcoming these challenges and safeguarding your business against evolving threats.

The top 6 business benefits of cloud adoption

In this Article

Cloud adoption is no longer seen as a means for storage, but a foundation for intelligent business capabilities. Businesses that have adopted the cloud are able to reap benefits far beyond cost savings, enhancing operational flexibility, enabling faster disaster recovery and much more. In the first blog of our cloud security series, we explore the key advantages of cloud adoption. 

Flexibility

Cloud infrastructure is the key to operational agility, allowing you to scale up or down to suit your bandwidth needs. The pay-as-you-go model offered by most cloud service providers (CSPs) also means that you pay for usage rather than a set monthly fee, making IT spending a more manageable operational expense. The ability to scale resources according to demand also ensures performance will be optimal during peak times and eliminate waste during downtime. 

Reduced cost

Kind to your cash flow, cloud computing cuts out the high hardware cost. The availability of the aforementioned pay-as-you-go models can significantly cut costs. Not to mention the cost-savings of reduced resources, lower energy consumption and fewer delays.  

Disaster recovery

From natural disasters to power outages and software bugs, if your data is backed up in the cloud, it is at a reduced risk of system failure as the servers are typically far from your office locations. You can recover data anywhere to minimise downtime by logging into the internet’s cloud storage portal. 

Accessibility

We’ve all heard that the office is dead. Workers want the ability to work anytime, anywhere. With cloud (and an internet connection), they can. The cloud enables workforces to be distributed through secure access to data and applications from any location, which is critical in today’s hybrid working world. 

Greater collaboration

Cloud infrastructure makes collaboration a simple process, changing the parameters of how and where teams can work. The cloud can drastically improve workplace productivity, from online video calls to sharing files and co-authoring documents in real-time. It offers a centralised, secure and real-time working environment that bolsters communication and helps streamline workflows. These cloud-native applications are designed to make our lives more efficient through greater collaboration.  

Strategic value

Ultimately, businesses that have adopted the cloud typically experience greater cost efficiencies, faster speed to market and enhanced service levels. Adopting the cloud not only reimagines business models and builds resilience but also enables organisations to be agile and innovative. For example, adopting DevOps methodologies can be an essential element for businesses looking to get ahead of their competitors. 

But what about security? Earlier this year, a reported 61% of organisations felt security and compliance were their primary barriers to cloud adoption. Rushed application and the resulting lacklustre security have only intensified security concerns as cybercriminals increasingly target cloud environments. 

Download our comprehensive guide to cloud security and start securing your cloud today.

Case Study

The benefits St. Helens Youth Justice Service realises from CACI’s fully managed hosting solution

Summary

St. Helens Youth Justice Service has been using ChildView from CACI for over 15 years. In May 2020 it decided to utilise CACI’s fully managed hosting solution to support its work. In this case study, we speak to Helen Williams, St. Helens Youth Justice Service’s Information Officer about why the council decided to use the service and the benefits that it has brought about.

“One of the main reasons we decided to use the fully managed hosting service was to take the burden off the council’s internal IT department,” explains Helen. “Previously, any upgrades and issues went through that department. Being the council’s team, they are always very busy. We had to log issues with the internal helpdesk and take it from there. Given the scope of the council’s operations and the fact that we’re a small part of it, it often depended on who you got to speak to within the IT team as to whether they would fully understand the software and the problem. Now, when we go through CACI’s helpdesk, we know that we’ll be speaking to someone who fully understands the software and can help us immediately with the problem.

Company size

30

Industry

Support services

Products used

Challenge

Security and storage

“Another factor was storage and server space,” continues Helen. “We hold a lot of data and this was taking up a lot of space in the council’s server room. The council was trying to reduce the number of servers it was hosting internally, so the offer from CACI to host our data was an appealing one. This also meant that we were able to utilise CACI’s security arrangements, whilst at the same time reducing the amount of space we were taking up in the council.”

Security was another factor for St Helens Youth Justice Service. CACI meets rigorous international security standards and is routinely tested to identify potential weaknesses. This enables customers to leverage CACI’s security spend in protecting their own data.

“We recently suffered a cyber-attack at the council which shut down most of our systems and we, as a council, lost access to a number of databases,” says Helen.

“Because ChildView is hosted separately, however, we were still able to access the system and our data. This meant that we could continue to focus on our work, improving outcomes for the young people in our services.

“It also highlighted that we always have easy access to our data. I can grant access to the data to other people as required very easily and securely. The data works across other systems that we work with, too, making it easy to call upon and rely on.”

Solution

Efficiency is often a buzzword in local services. How can it be achieved? St. Helens Youth Justice Service no longer has to wait for internal mechanisms to be run before upgrading ChildView or resolving any issues in the system. “Everything is much quicker now,” says Helen. “Any updates that we need are scheduled and done, there’s no hassle.

“Previously there was a lot of back and forth on available dates and when would be best to conduct the updates. Then there were times when our internal IT team were unsure of exactly what they needed to do. It’s now just much quicker.

“It’s the same as the CACI helpdesk. I can grant them remote access to my desktop and they can fix issues instantly. There’s no more logging the issues with our internal IT department and hoping that someone can fix it quickly. It just gets done now.”

Results

Finally, there’s the issue of cost benefit and cost efficiency. “The people operating above us, who sign off on expenditure such as this, can see the value in the service and are supportive of us using it, so there has been no issue on that front,” concludes Helen. “We have to justify the value, of course, but in terms of security, data access and space saved, it satisfies this. Our council understands the cost benefit of this and we’ve got support for it internally.”

Support worker caring for a child, putting hand on her shoulder to show care and empathy

Case study

The Care Quality Commission’s journey to become more intelligence driven

Summary

In 2015, the Care Quality Commission (CQC) significantly revised its inspection methodology to become more intelligence driven. The new methodology required more resource and time to visit organisations, with up to 3,000 external resources added to an existing pool of 3,000 CQC inspectors to meet the demand of 20,000 inspections a year.

Company size

1,000 – 5,000

Industry

Support services

Products used

Challenge

The old ways

Initially, CQC managed the scheduling and processes for this change through localised spreadsheets, disparate systems, emails and paper. CQC quickly realised, however, that there were difficulties with this approach. A spreadsheet crashed or data accidentally got overridden, wasting time and adding pressure to an already complex operation. Resource allocation was not necessarily based on demand, which resulted in inconsistencies and potential for local variation. Recording how much actual time was spent on inspections was not visible, and management information was difficult to collect and interpret.

Changing course

To address these issues, CQC decided to invest in a centralised scheduling and operational management system. The vision was to find a single, national system that could handle scheduling right across the organisation and its various remits. This would need the flexibility to have different business rules for different areas, whilst still driving resource allocation as efficiently and fairly as possible. Additionally, the system would need to allow elements of digital self-service for the inspection workforce, as well as the ability to effectively record their work. Imperative to all of this was the ability to easily and clearly draw upon – and make business decisions using – reliable management information from within the system.

CQC was keen to implement a web-based cloud solution that would ease internal IT demands. The new solution needed to interact with CQC’s existing core systems and meet the stringent security levels required for processing CQC’s data.

Solution

Following a rigorous procurement process through a Crown Commercial Services framework, CQC selected the Cygnum system from technology supplier CACI. Cygnum is a digital solution for resource scheduling and case management that helps organisations work smarter, improve service quality and reduce risk.

Scheduling engine: Primarily CQC’s core functional requirements were to be met by Cygnum’s powerful demand driven scheduling engine. This functionality was configured to match CQC’s business rules, including automation and optimisation, and the provision of a centralised view of scheduling, inspections and resources. 

Workflow functionality: Additionally, Cygnum’s web portal was configured to give Inspectors their own self-service capability, with features such as declaring availability, swapping and accepting additional work, and requesting leave, all accessible and underpinned by Cygnum’s workflow functionality. 

Timesheet module: Cygnum’s timesheet module was also implemented to record actual work done. Based on planned time, this feature allows staff to confirm what they have actually spent time on during a working week. 

Reporting toolsets: The reporting toolsets within Cygnum were important to CQC too. Cygnum is shipped with many standard reports, however, the reporting tools were configured during implementation to provide additional graphical dashboards and reports for specific user groups, completely bespoke and relevant for CQC. 

System implementation: CACI provided CQC’s Cygnum implementation as a secure, cloud-based solution, removing effort and risk for the internal IT department. The system was successfully implemented to integrate with CQC’s existing service-orientated integration tool, providing real-time integration with the NHS Payroll system and the in-house CRM system. 

Using proven tools and process, CACI’s delivery team worked closely and collaboratively with CQC’s team to foster a strong partnership and successful delivery on time and to budget. 

Results

CQC now uses Cygnum to schedule and resource all inspections, across all inspection directorates. This includes 1,500 inspectors that utilise the self-service capabilities of Cygnum daily, self-scheduling inspections for their portfolio. 

Automation

Additionally, in 2018/19, up to 45% of annual inspections were scheduled automatically based on CQC specific rules using Cygnum’s auto-allocation software. This has freed up time for inspectors, enabling them to focus on other work and has ensured fair and consistent schedules are maintained. 

Cygnum also manages resource availability and absence, with an end-to-end workflow process in place from user request through to approval, which streamlines the process, reduces administrative cost and generates centralised management information. 

Introduction of timesheets across the organisation has been a major change of culture but is now proving invaluable for CQC in carrying out demand modelling for future planning and budgeting.

Independence

A further significant benefit for CQC has been the ability to maintain aspects of the system itself. This has meant that CQC’s trained team can change areas such as reports, forms and workflow settings without having to contact CACI. 

CQC continues to build on the investment made in Cygnum with an ongoing system change scheme in place to consider agile and incremental ongoing improvement for the future.