Identity management in the cloud: What does it actually mean?


Identity management in the cloud? What does this actually mean to us? We don’t yet have an established definition of cloud identity management - and there is not even a Wikipedia page yet, although identity management is well founded. That says it all. I’m going to attempt to draw up a definition.

Using cloud applications has now become commonplace for many organisations. Certainly in education, cloud applications have been used for years, such as Office 365 and various...

By Robert Doswell, 17 November 2015, 1 comment. Categories: Data & Analytics, Data Management, Privacy, Security.

Bringing DRaaS to the C-suite: The key job roles analysed


A series of large scale cyberattacks have been in the headlines this year and, according to McAfee, the situation will only worsen as hackers use more advanced techniques to infiltrate networks.

Despite this, there are still a large portion of companies that remain vulnerable, mainly due to the lack of executive interest in preparing for worst-case scenarios. The same report states that 79 percent of C-level US and...

By Monica Brink, 13 November 2015, 1 comment. Categories: Data & Analytics, Data Loss, Data Management, Disaster Recovery, Security.

It's time to take your big data strategy beyond the data lake


A well-established – and unsettling – metric we anecdotally hear from organisations is that analysts spend 70% or more of their time hunting and gathering data and less than 30% of its time deriving insights.

The promise of big data is to reverse this 70/30 ratio. Organisations striving to build a data lake and use data for competitive advantage are seduced by the opportunity to discover new insights to better target customers, improve operations, lower costs, and discover new...

By Dr. Paul Terry, 12 November 2015, 0 comments. Categories: Big Data, Data & Analytics, Privacy, Security.

Data centre security: Do you understand your risk?


Let’s assume for a moment that you still manage all or some of your data in-house.

By implication that means that somewhere in the building you have a room full of servers that need to be maintained and protected. And as a manager you’ll be aware of the physical risks that threaten the integrity of your data. These include not only flood, fire and incursions by malicious third parties but also the havoc that can be created by unauthorised members of staff entering the...

By John Hall, 22 October 2015, 0 comments. Categories: Data & Analytics, Data Centres, Data Management, Security.

Addressing the hurdles of cloud security: Why you may be setting yourself up for failure


Security is trumpeted as a top concern for organisations, especially with increased investment in new technologies like mobile, cloud, and the Internet of Things. As new technologies are introduced and adversaries become more sophisticated, the threat landscape and the attack surface within organisations continues to grow. This means that not only do organisations need protection from threats, they need to protect their data and they also need to protect their reputation and brand....

By Monica Brink, 21 October 2015, 0 comments. Categories: Big Data, Data & Analytics, Security.

Who should look after cloud data – the CSP or the end user? Execs undecided


The debate over whether the end user or the cloud service provider (CSP) should be responsible for data security has been reopened after new research from Armor and Ponemon Institute proved inconclusive.

The survey, which quizzed 990 US and UK-based CIOs, CISOs and directors of IT operations, found almost a third (31%) expect their cloud provider to keep SaaS applications secure, while 20% believe the customers are more responsible and only 16% argue it is a shared...

By James Bourne, 16 October 2015, 1 comment. Categories: Security, Vendors.

Managing the risks of cloud collaboration in business today


Gartner predicts that cloud office systems will account for 33% of the overall office market by 2017. This is a big step considering a few years ago collaboration in businesses typically involved emails, phone calls, and perhaps a few instant messages exchanged within the company.

However, nowadays the arrival of cloud computing and all the remunerations that come with it have shaped the path for collaborative cloud-based services, which is reforming how...

By Nigel Moulton, 16 October 2015, 1 comment. Categories: Collaboration, Security.

Securing your data centre from human error with a multi-step security approach


10 years ago, few could have predicted that the world would generate data on today’s colossal scale, that a new social media environment would emerge, or that the Internet of Things (IoT) would integrate devices with intelligent IT. These changes have impacted the way we access data, and the way that businesses manage and store data.

Recently we have seen an evolution in infrastructure and storage to support these new trends, both for the business community and for consumers, which...

By Sean McAvan, 22 September 2015, 0 comments. Categories: Data & Analytics, Data Centres, Data Loss, Data Management, Infrastructure, Security.

Is your data privacy and security bulletproof?


To ensure a completely bulletproof data service, there are certain components you must own and control. At all times, you need to ensure that you’re in the driver’s seat, and that you didn’t hand over your car keys, along with your corporate data security and privacy, to someone else.

As your company's security expert, you are the one chosen to protect your organisation's data so you should invest in a system that allows you to apply your corporate policies,...

By Saimon Michelson, 11 September 2015, 1 comment. Categories: Data & Analytics, Data Management, Privacy, Security.

Data sovereignty and the cloud: How do we fully control data amidst the cloud sprawl?


The problem

One of the basic tenets of cloud computing is the ability to provide access to resources across a geographically dispersed cloud environment. This makes the cloud ideal for global distribution of applications and data. But what about those geographies that have highly restrictive data sovereignty laws or practices, such as Germany, Austria and South Korea? What about governmental bodies attempting to protect information while utilising the cloud?

An interesting example is...

By David Auslander, 09 September 2015, 0 comments. Categories: Big Data, Data & Analytics, Data Sovereignty, Privacy, Security.