Access and identity governance in the cloud: Problems and solutions

(c)iStock.com/yipengge

There has been a consistent growth and increase in cloud application usage over the past five years as organisational IT leaders have realised the benefits of implementing them. This is also, in part, because of the fact that there is a major increase in remote employees, who need applications in the cloud to be able to work. Cloud applications have many obvious benefits to an organisation, such as improving efficiency, reducing costs and improving security.

Once these applications are...

By Dean Wiech, 22 January 2016, 0 comments. Categories: Applications, Security, Software.

The cloud is the limit: Disaster recovery, compliance, and other key 2015 trends

(c)iStock.com/roberthyrons

We are well into the first month of 2016, and many predictions from the cloud sector have started to reveal different trends that we may see over the next 12 months. In 2015 we saw IaaS (infrastructure as a service) and PaaS (platform as a service) growing 51%, with cloud firmly being pushed into the limelight. Looking to the future, there are many indications of what to expect in the year to come, including improvements to current-generation cloud environments as well as private...

By Monica Brink, 13 January 2016, 0 comments. Categories: Compliance, Disaster Recovery, Security.

Research shows increased proliferation of endpoints for IT service providers

(c)iStock.com/pederk

The extent of the proliferation of endpoints and how IT service providers (ITSPs) are reacting to it has been revealed in a new survey released by IT management provider Autotask.

More than half of the 1,100 global ITSPs polled (55%) said they have seen ‘significant’ or ‘steady’ endpoint growth, with four in five respondents saying they rely on cloud delivery to manage and secure endpoints.

90% say they offer cloud-based services while 55% say they expect between...

By James Bourne, 12 January 2016, 0 comments. Categories: Adoption, Data & Analytics, Security.

Enterprise IT in 2016: Why it is no longer enough to just be the best in your industry

(c)iStock.com/tomazl

Over the course of 2015, we’ve seen many of the trends we predicted last year come to fruition. As cloud adoption in the UK soared past 84% in May, it was evident that we had been right that the technology would become even more mainstream. With enterprises aiming to become more mobile, 2015 has also seen the normalisation of “anytime, anywhere working” and the increased dependency on...

By Sean McAvan, 07 January 2016, 0 comments. Categories: Adoption, Developers, Enterprise, Security.

Why it is vital to talk about security with your cloud provider

(c)iStock.com/creative-idea

Cyber security is currently centre stage – no matter where you turn, it is all over the news.

Just this last month we’ve certainly heard a plethora of stories about companies that have been affected by breaches and hacks. A UK telecoms provider experienced a detrimental cyber security attack where customers’ personal data was breached, and in a separate incident...

By Monica Brink, 02 December 2015, 0 comments. Categories: IaaS, Infrastructure, Security.

Why security will make small businesses move to the cloud in 2016

(c)iStock.com/eric1513

It has long been said that security concerns are what drives small businesses away from putting their data in the cloud. Yet according to Oscar Arean, technical operations manager at disaster recovery provider Databarracks, 2016 will see more small to medium firms move towards cloud services as managing security in-house becomes an increasing headache.

In particular, Arean argues the need for small businesses to move to Office 365 – almost by default – because of its...

By James Bourne, 01 December 2015, 3 comments. Categories: Adoption, Security.

Identity management in the cloud: What does it actually mean?

(c)iStock.com/mihau

Identity management in the cloud? What does this actually mean to us? We don’t yet have an established definition of cloud identity management - and there is not even a Wikipedia page yet, although identity management is well founded. That says it all. I’m going to attempt to draw up a definition.

Using cloud applications has now become commonplace for many organisations. Certainly in education, cloud applications have been used for years, such as Office 365 and various...

By Robert Doswell, 17 November 2015, 1 comment. Categories: Data & Analytics, Data Management, Privacy, Security.

Bringing DRaaS to the C-suite: The key job roles analysed

(c)iStock.com/samxmeg

A series of large scale cyberattacks have been in the headlines this year and, according to McAfee, the situation will only worsen as hackers use more advanced techniques to infiltrate networks.

Despite this, there are still a large portion of companies that remain vulnerable, mainly due to the lack of executive interest in preparing for worst-case scenarios. The same report states that 79 percent of C-level US and...

By Monica Brink, 13 November 2015, 1 comment. Categories: Data & Analytics, Data Loss, Data Management, Disaster Recovery, Security.

It's time to take your big data strategy beyond the data lake

(c)iStock.com/Bastar

A well-established – and unsettling – metric we anecdotally hear from organisations is that analysts spend 70% or more of their time hunting and gathering data and less than 30% of its time deriving insights.

The promise of big data is to reverse this 70/30 ratio. Organisations striving to build a data lake and use data for competitive advantage are seduced by the opportunity to discover new insights to better target customers, improve operations, lower costs, and discover new...

By Dr. Paul Terry, 12 November 2015, 0 comments. Categories: Big Data, Data & Analytics, Privacy, Security.

Data centre security: Do you understand your risk?

(c)iStock.com/baranozdemir

Let’s assume for a moment that you still manage all or some of your data in-house.

By implication that means that somewhere in the building you have a room full of servers that need to be maintained and protected. And as a manager you’ll be aware of the physical risks that threaten the integrity of your data. These include not only flood, fire and incursions by malicious third parties but also the havoc that can be created by unauthorised members of staff entering the...

By John Hall, 22 October 2015, 0 comments. Categories: Data & Analytics, Data Centres, Data Management, Security.