Applications without Constraints: Optimizing the IT Budget

F5 Ecosystem | January 25, 2016

With the end of the year came the traditional spate of predictions and forecasts from trade publications, pundits, and analysts alike. Among these were the number-laden forecasts for IT budgets in 2016.

None of which were particularly impressive. While the consensus seems to be that IT budgets are at least beginning to show some signs of forward (upward) progress, it still remains true that many view budgetary constraints as a barrier.

clip_image002

We’ve seen this truism in action ourselves as customers responding to our latest State of Application Delivery survey noted security budgets being too small (41%) as one of their top five security challenges. More than half of CIOs, as well, declared in the latest CSC survey that budget constraints are a general barrier to innovation.

This constraint needs to be relieved, of course, in order to open the flood-gates of innovation and help IT realize its goal of making money for the business, rather than simply consuming it in support of it.

But as the old saying goes, that’s easier said than done.

To achieve this, the CIO needs to enable an environment (embrace a culture) that can optimize core areas of the budget, like operations, security, and app deployments. Such optimization can either reduce costs, enabling savings to shift toward projects focused on innovation (that make money) or mitigate the need to increase spending at all, allowing increases in the budget to focus on innovation.

This ultimately means embracing DevOps, which includes all the Dev(insert IT silo here)Ops.

  • Optimize Operations
    One of the catch phrases associated with DevOps is “infrastructure as code.” This can – nay, it should – include the network infrastructure delivering the average 10 app services 60% of organizations rely on to ensure apps are fast, secure, and available. The availability of APIs and templates can be used to enable the automation and management of app services to lower costs and improve stability that reduces costly downtime. Those savings can be shifted to innovation.
  • Optimize Security
    A key concern across cloud and on-premises continues to be security. Security budgets are on the rise, but continue to be a source of frustration for professionals who are trying valiantly to maintain governance of increasingly hybrid environments. Increasingly disjointed security controls, policies, and services are wreaking havoc with IT’s ability to maintain a positive secure posture without driving up costs due. One way to optimize security and address rising security costs is by consolidating on a shared platform with standardized policy templates that can be used on-premises as well as in the cloud. Doing so reducing costs associated with training, management, and the double (and triple) review required to make sure policies designed in disparate environments actually comply with corporate policies.
  • Optimize App Deployments
    Lastly, one of the benefits of many of the application-centric app services available can be to alleviate the need to design, architect, and develop the same services. Scalability, app security, identity management, and even many performance-enhancing services can be shifted from dev to ops (into the network infrastructure) to let dev focus on dev and ops focus on delivery. Reinventing the wheel can be – but rarely is – necessary. By taking advantage of existing services available on existing platforms, both operational and dev costs can be reduced and the savings shifted again to innovation.

Budgetary constraints on innovation are a growing concern, but we all know that the day-to-day “keep the lights on” costs are not going to get any lower unless we actively seek to find ways to optimize the budget we have right now. Devops, shared platforms, cloud, and standardization can be valuable tools in the CIOs war chest as they take a serious swipe at reducing costs through optimization in order to enjoy the spoils of victory: bigger budgets for innovation.

Share
Tags: 2016

About the Author

Lori Mac Vittie
Lori Mac VittieDistinguished Engineer and Chief Evangelist

More blogs by Lori Mac Vittie

Related Blog Posts

The everywhere attack surface: EDR in the network is no longer optional
F5 Ecosystem | 11/12/2025

The everywhere attack surface: EDR in the network is no longer optional

All endpoints can become an attacker’s entry point. That’s why your network needs true endpoint detection and response (EDR), delivered by F5 and CrowdStrike.

F5 NGINX Gateway Fabric is a certified solution for Red Hat OpenShift
F5 Ecosystem | 11/11/2025

F5 NGINX Gateway Fabric is a certified solution for Red Hat OpenShift

F5 collaborates with Red Hat to deliver a solution that combines the high-performance app delivery of F5 NGINX with Red Hat OpenShift’s enterprise Kubernetes capabilities.

F5 accelerates and secures AI inference at scale with NVIDIA Cloud Partner reference architecture
F5 Ecosystem | 10/28/2025

F5 accelerates and secures AI inference at scale with NVIDIA Cloud Partner reference architecture

F5’s inclusion within the NVIDIA Cloud Partner (NCP) reference architecture enables secure, high-performance AI infrastructure that scales efficiently to support advanced AI workloads.

F5 Silverline Mitigates Record-Breaking DDoS Attacks
F5 Ecosystem | 08/26/2021

F5 Silverline Mitigates Record-Breaking DDoS Attacks

Malicious attacks are increasing in scale and complexity, threatening to overwhelm and breach the internal resources of businesses globally. Often, these attacks combine high-volume traffic with stealthy, low-and-slow, application-targeted attack techniques, powered by either automated botnets or human-driven tools.

Volterra and the Power of the Distributed Cloud (Video)
F5 Ecosystem | 04/15/2021

Volterra and the Power of the Distributed Cloud (Video)

How can organizations fully harness the power of multi-cloud and edge computing? VPs Mark Weiner and James Feger join the DevCentral team for a video discussion on how F5 and Volterra can help.

Phishing Attacks Soar 220% During COVID-19 Peak as Cybercriminal Opportunism Intensifies
F5 Ecosystem | 12/08/2020

Phishing Attacks Soar 220% During COVID-19 Peak as Cybercriminal Opportunism Intensifies

David Warburton, author of the F5 Labs 2020 Phishing and Fraud Report, describes how fraudsters are adapting to the pandemic and maps out the trends ahead in this video, with summary comments.

Deliver and Secure Every App
F5 application delivery and security solutions are built to ensure that every app and API deployed anywhere is fast, available, and secure. Learn how we can partner to deliver exceptional experiences every time.
Connect With Us