Box and Skyhigh Networks come together for greater cloud security and governance


Cloud security services provider Skyhigh Networks and enterprise cloud storage firm Box have announced a partnership designed to enable greater data governance for Box customers.

Users can identify sensitive data, automatically classify it, and enforce collaboration control policies through Skyhigh and Box Security Classification, all without requiring any change in customer behaviour.

To put the partnership into context, take a situation where an employee uploads a document with...

By James Bourne, 21 October 2016, 0 comments. Categories: Security, Software, Storage.

How cloud storage became a target for hackers – and what can be done about it


With the recent revelations that Yahoo! experienced a hack in 2014 where the accounts of around 500 million users were compromised, it brings back into focus the importance of businesses ensuring their customers’ data is always protected.

More and more businesses are now using the cloud to store their data. As with all new technologies though, hackers will look to exploit any security vulnerabilities they can find. While it is not yet clear whether the attack on Yahoo! was on a...

By David Midgley, 20 October 2016, 0 comments. Categories: Security, Software, Storage.

Microsoft launches cloud services due diligence checklist


Microsoft has launched a cloud services due diligence checklist aimed at providing organisations with more standardised procedures for their potential cloud push.

The checklist is based on the emerging ISO/IEC 19086 standard which focuses on cloud service level agreements, and gives structure to organisations of all sizes and sectors to identify their objectives and requirements, before comparing the offerings of different cloud service providers.

“Cloud adoption is no longer simply a...

By James Bourne, 17 October 2016, 0 comments. Categories: Microsoft, Privacy, Security, SLA.

Recovering from disaster: Develop, test, and assess


Disaster recovery (DR) forms a critical part of a comprehensive business continuity plan and can often be the difference between the success and failure of an organisation. After all, disasters do happen — whether that’s a DDoS attack, data breach, network failure, human error, or by a natural event like a flood.

While the importance of having such a strategy is well recognised, how many organisations actually have the right plan in place? Not many, according to the 2014

By Stuart Nielsen-Marsh, 17 October 2016, 0 comments. Categories: Data & Analytics, Data Management, Disaster Recovery, Security.

More apps are being stored in the cloud – but are we putting too much faith there?


While two thirds of organisations polled by cloud storage and data protection provider CTERA Networks deploys more than a quarter of its applications in the cloud, protecting them is a different story altogether.

The findings appear in a report entitled ‘Game of Clouds’ – no prizes for guessing the theme – which makes the research concept clear.

“The emergence and tremendous growth of cloud computing in the enterprise is taking IT environments to uncharted...

By James Bourne, 12 October 2016, 0 comments. Categories: Applications, Migration, Security, Storage.

How cloud and IoT services are driving deployment of public key infrastructures


A new study from Thales and the Ponemon Institute has found that, for more than three in five businesses polled, cloud-based services were the biggest trend driving the deployment of applications using public key infrastructures (PKI).

PKI refers to the ability for users and organisations to send secure data over networks; as defined by TechTarget, it “supports the distribution and identification of public encryption...

By James Bourne, 11 October 2016, 0 comments. Categories: Applications, Data Management, Security, Vulnerabilities.

The hidden dangers of legacy technology – and how to resolve them


Every business has that one legacy system they can’t seem to let go of. You know you’ve got one - a relic hidden away in some dusty server room. But are you aware of the damage these outdated systems can, will and may already be having on your organisation?

The damage inflicted by legacy technology can range from minor systems issues through to major events that could put your organisation out of business – and it’s important to know the hidden dangers.

Increased downtime...

By Ed Jones, 10 October 2016, 0 comments. Categories: Compliance, Data & Analytics, Data Management, Security.

Test, test, then test again: Analysing the latest cloud DR strategies


In September, we hosted a roundtable with fifteen business leaders to discuss and debate the findings from our The State of IT Disaster Recovery Amongst UK Businesses survey.  The debate was chaired by Chris Francis, techUK board member. Customers Wavex and Bluestone also participated in the discussion as did our partner Zerto and industry influencers Ray Bricknell from Behind...

By Monica Brink, 05 October 2016, 0 comments. Categories: Data & Analytics, Data Management, Disaster Recovery, Security.

How Great Western Railway is getting its compliance on the right track


Great Western Railway (GWR) has enlisted the help of CoreStream to provide a new system for its compliance and regulations.

Like many organisations, ensuring compliance is vital – but for GWR it may count more than others. The railway operator is governed by a franchise agreement which includes more than a thousand obligations – and failing to comply with them can result not only in fines, but also disqualification from future franchise bids.

As a result, the company...

By James Bourne, 28 September 2016, 0 comments. Categories: Compliance, Data & Analytics, Data Management, Security.

Skyhigh Networks grabs $40 million in series D funding in profitability push


Cloud security services provider Skyhigh Networks has secured $40 million (£30.9m) in a series D funding round which will aim to steer the California-based firm “through to profitability.”

The round was led by Thomset Ventures, with Sequoia Capital and Greylock Partners also contributing. Total venture capital to Skyhigh, launched only in February 2013, is now at $105.5m.

Skyhigh’s proposition is through being a leading ‘cloud access security broker’...

By James Bourne, 26 September 2016, 0 comments. Categories: Economy, M&A, Security.