cloud services

Your Cloud Migration Optimized the Workloads.

Nobody's Governing the Circuits That Connect Them.

When I was Head of Telecommunications at Simon Property Group, we managed a telecom footprint that touched every property in the portfolio. Hundreds of locations. Dozens of vendors. Invoices that ran to thousands of line items a month.

The carriers counted on one thing: that nobody on our side had the time or the system to reconcile what they billed against what we actually had.

That was telecom in 2010. That’s cloud connectivity in 2025.

The governance gap nobody's talking about

Most enterprises have built meaningful cloud FinOps discipline. Compute costs are tracked. Storage is right-sized. Reserved instances are managed. Teams watch the cloud console the way we used to watch server racks.

Here’s what they’re not watching: the circuits.

AWS Direct Connect. Azure ExpressRoute. Google Cloud Interconnect. These are the dedicated private connections that tie your data centers, branch locations, and cloud environments together. They carry your most sensitive traffic. They underpin the performance of every cloud-dependent workload in your portfolio.

And almost universally, they are ungoverned.

Not because CIOs don’t care. Because these circuits live at an organizational seam nobody owns clearly. The cloud team monitors performance inside the console. The telecom team manages carrier contracts. The connectivity circuits that sit at the intersection — provisioned by a carrier, billed on a telecom invoice, tied to a cloud port — fall into a gap where neither team has full visibility.

What's actually on those carrier invoices

When your organization provisions Direct Connect or ExpressRoute, two separate billing streams activate:

  • The cloud provider charges for the port (connection capacity at their end)
  • The carrier charges for the circuit (the physical or logical path to the cloud)

The cloud console shows you one. The carrier invoice shows you the other. Nobody shows you both in the same place.

Which means nobody is reconciling the two. And where there’s no reconciliation, there are errors. Unauthorized charges. Commitments that no longer match your architecture. Credits from migration negotiations that were promised but never posted.

This isn’t theoretical. It’s the pattern we see consistently in enterprise environments that have completed cloud migrations but haven’t extended governance into the connectivity layer.

The five governance gaps that keep costs flat after optimization

You’ve optimized the workloads. The cloud console looks clean. And yet the telecom invoice hasn’t moved. Here’s where to look:

  1. Circuit charges not reconciled against cloud port charges. The carrier bills for the circuit. The cloud provider bills for the port. Neither knows what the other billed. Without a reconciliation process, discrepancies accumulate unchallenged.
  2. Bandwidth commitments that no longer match your architecture. Circuits were provisioned for peak migration load. The migration is done. The bandwidth commitment isn’t. You’re paying for capacity your architecture no longer needs, and the carrier isn’t going to call you about it.
  3. Migration credits promised but never confirmed posted. Carriers routinely offer credits to support enterprise cloud migrations. Those credits require follow-through to apply correctly. Without verification, they expire or get applied to the wrong account period.
  4. Redundant circuits provisioned for migration, never decommissioned. Redundancy is the right engineering call during a migration. After the migration, those circuits should be evaluated and rightsized. In practice, they stay provisioned because decommissioning requires coordinated action across teams, and no team is accountable for the cost outcome.
  5. No cost-per-GB measurement across the full path. Your cloud FinOps team measures egress cost inside the cloud console. Your telecom team tracks circuit costs as a flat monthly charge. Nobody is measuring the combined cost per GB across the full path — which means nobody can tell the business whether private connectivity is actually delivering ROI relative to alternatives.

What the proof looks like when governance is in place

In a multi-brand retail portfolio engagement, our team recovered between $1.85M and $2.1M in telecom charges across a complex, multi-vendor environment. Collection rate was 87%.

In Year Two: billing error recurrence dropped 64%.

Not because the carriers changed. Because a governance process made unauthorized charges structurally harder to sustain.

The connectivity layer was part of that recovery. Charges that fell between teams — carrier-billed circuits tied to cloud connectivity — had accumulated for years without challenge. Once a reconciliation process was in place, the errors became visible. Once they were visible, they were disputable. Once they were disputable, they hit the ledger.

64% recurrence reduction in Year Two isn’t a one-time cleanup. It’s what happens when governance is ongoing and the vendor knows someone’s watching.

What a connectivity governance process actually looks like

BearGuard’s discipline at the connectivity layer includes:

  • Monthly inventory validation: active circuits confirmed against what’s provisioned and billed
  • Reconciliation of carrier charges against cloud port charges — both sides of the billing seam
  • Commitment review: bandwidth contracts evaluated against actual utilization and architecture state
  • Credit verification: migration credits and negotiated adjustments confirmed as posted, not just promised
  • Dispute execution: unauthorized charges identified and formally challenged with documentation

This is not a one-time audit. It’s an ongoing governance process with a monthly cadence — because billing errors don’t stop after the first review, and carriers don’t self-correct.

The CIO question worth asking right now

Your cloud migration is behind you. The workloads are optimized. The FinOps team is watching compute and storage costs with real discipline.

Who is watching the circuits?

If the answer is “the carrier manages that” or “we handle it between teams,” you have a governance gap at the connectivity layer. And that gap is billing you every month.

Take Bearstone's 3-Minute Telecom Risk Quiz

or download the Telecom Governance Guide

Facebook
Twitter
LinkedIn

Ready to Get Started?

If you would like to know more about any of our services, please reach out and we will happily answer all of your questions!

Let us guide your organization to maximize savings.

You can also fill out the contact form below.

Are You Being Ripped Off?

Uncover the Secrets Your Carrier Doesn’t Want You to Know

5 secret ways cover

The 5 Secret Ways Your Telecom Carrier Is Overbilling You — And How to Fix It

Get your free access to my new book by filling out the form below: