Cloud delivery models – NaaS, DEaaS, STaaS, DBaaS, DaaS, SECaaS, IDaaS

cloud-computing

You’ve seen the terms like Software-as-a-Service (SaaS), Platform-as-a-Service (PaaS), and Infrastructure-as-a-Service (IaaS) plenty of times. However, newer concepts are emerging daily as part of Everything as a Service (XaaS), also called Anything-as-a-Service, referred to as the universe of all cloud deliverable services.

There are plenty of XaaS models than you can imagine, such as Analytics as a Service, Authentication as a Service, Backup as a Service, Business as a Service, Communications as a Service, Content as a Service, Fraud as a Service, Knowledge as a Service, Payments as a Service, Recovery as a Service, Security as a Service, Storage as a Service, Testing as a Service, Utilities as a Service, and Virtualization as a Service to name a few.

All these offerings are being made available in the same pay-as-you-go business model. This article will briefly explain an overview of various other service models such as NaaS, DEaaS, STaaS, DBaaS, DaaS, SECaaS, and IDaaS.

1. Network as a Service (NaaS)

It allows end-users to use virtual network services provided by the service provider. It is a pay-per-use approach similar to other cloud service models; NaaS allows users to access virtual network services through the Internet. On-premise organizations have spent expenditure on network equipment to run their networks in their data centers. On the other hand, Naas are transformed into a utility to make virtual organizations, virtual organization interface cards, virtual switches, and other systems administration components in the cloud environment. There are several popular services provided by NaaS, including VPNs, bandwidth-on-demand, and virtualized mobile networks.

2. DEaaS (Desktop as a Service)

It allows end-customers to enjoy desktop virtualization service without acquiring and managing their own computing infrastructure. It is a pay-per-use model in which the provider handles data storage, backup, security, and updates on the back end. DEaaS services are easy to set up, secure, and provide a better user experience across many devices.

3. STorage as a Service (STaaS)

It allows end-users to store data on the service provider’s storage services. Users may access their files from anywhere and at any time with STaaS. Virtual storage emulates from physical storage is abstracted by the STaaS provider. STaaS is a utility-based cloud business model. Customers may rent storage space from the STaaS provider, and they can access it from any location. STaaS provides disaster recovery backup storage solutions.

4. Database as a Service (DBaaS)

This service allows end users to access databases without installing or managing them. Installing and maintaining databases is the responsibility of the service provider. End consumers may utilize the services immediately and pay for them based on their use. Database administration is automated using DBaaS. The database services may be accessed by end-users using the service provider’s APIs or web interfaces. The database management procedure is made easier using DBaaS. DBaaS provides popular services such as ScaleDB, SimpleDB, DynamicDB, MongoDB, and GAE data storage.

5. Data as a Service (DaaS)

It is an on-demand service provided by a cloud vendor to users to access the data over the Internet. Data consists of text, photos, audio, videos, etc. all are part of the data. Other service models, for example, SaaS and STaaS are closely related to DaaS. For offering a composite service, DaaS may simply include either SaaS or STaaS. Geographical data services and financial data services are two areas where DaaS is widely employed. Some of the benefits of DaaS are agility, cost efficiency, and data quality.

6. SECurity as a Service (SECaaS)

It is a pay-per-use security service that allows users to access the cloud provider’s security service. The service provider combines its security services to benefit end customers in SECaaS. It provides various security-related functions, including authentication, virus and malware/spyware protection, intrusion detection, and security event management. SECaaS service providers often protect infrastructure and applications within a company or organization. Cisco, McAfee or Panda, etc, provide SECaaS services.

7. Identity as a Service (IDaaS)

It is possible to leverage a third-party service provider’s authentication infrastructure on behalf of end customers, which is called Identity as a Service (IDaaS). A company or business is the most common end-user of IDaaS. Any company may maintain its workers’ identities with IDaaS services without incurring extra costs. Services such as directory services and single sign-on are all included within IDaaS. Integrated services include registration, authentication, risk and event monitoring, identification, and profile management.