The five key things every executive needs to know about identity and access management

  • For new digital business models to succeed, customers’ privacy preferences need to be secure, and that begins by treating every identity as a new security perimeter.
  • Organisations need to recognise that perimeter-based security, which focuses on securing endpoints, firewalls, and networks, provides no protection against identity and credential-based threats. Until they start implementing identity-centric security measures, account compromise attacks will continue to provide a perfect camouflage for data breaches.
  • 74% of data breaches start with privileged credential...

By Louis Columbus, 08 April 2019, 0 comments. Categories: Data Loss, Data Management, Enterprise, Security, Software.

The cloud migration landscape: Multi-cloud and hybrid battle for supremacy as security remains key

A new study from data virtualisation provider Denodo makes for an interesting snapshot of where cloud migration trends sit today, with security remaining top of mind and hybrid and multi-cloud architectures key.

The findings of the study, which surveyed more than 200 business executives and IT professionals, would not have come as a major surprise to regular readers of this publication. Perhaps some of the figures may have...

AWS makes S3 Glacier Deep Archive available for coldest cloud storage needs

It was promised at last year’s re:Invent, and now it is here: Amazon Web Services (AWS) has announced the general availability of S3 Glacier Deep Archive, aimed at being the lowest cost storage in the cloud.

When the company said it was the cheapest around, it wasn’t kidding; offering prices at only $0.00099 per gigabyte per month, or $1 per terabyte per month. This level, as with other cold storage, is aimed at organisations...

By James Bourne, 28 March 2019, 0 comments. Categories: Amazon, Data Management, Software, Storage.

Addressing the concerns of data management and sovereignty in multi-cloud and edge scenarios

MWC Barcelona last month heavily focused on two fast-emerging technology trends; 5G and edge computing. Together, they will significantly impact businesses by enabling massive volumes of digital data to transfer between cloud servers located in multiple regions around the world as well as between IoT devices and edge nodes. This is due to the hyper-fast speed of 5G networks and edge computing architectures that have micro-clouds and data centres located closer to...

Five ways to demystify Zero Trust security – and the vendors who are pushing it

Bottom line: Instead of only relying on security vendors’ claims about Zero Trust, benchmark them on a series of five critical success factors instead, with customer results being key.

Analytics, Zero Trust dominated RSA

Analytics dashboards dominated RSA from a visual standpoint, while Zero Trust Security reigned from an enterprise strategy one. Over 60 vendors claimed to have Zero Trust Security solutions at RSA, with each one defining the concept in a slightly different way.

RSA has evolved into one of the highest energy enterprise-focused...

By Louis Columbus, 25 March 2019, 0 comments. Categories: Compliance, Data & Analytics, Data Loss, Data Management, Security.

Portworx secures $27 million series C funding, unveils update to container management platform

Portworx, a provider of storage and data management software for containers, has announced a $27 million (£20.5m) series C funding round – and touted record revenue and customer growth in the process.

The company’s series C, putting its total funding at $55.5m, was co-led by Sapphire Ventures and the venture arm of Mubadala Investment Company, with new investors Cisco Investments, HPE and NetApp joining Mayfield...

By James Bourne, 22 March 2019, 0 comments. Categories: Containers, Data Management, Economy, Kubernetes, Platform.

Monitoring cloud app activity for better data security: Five key tips

Digitisation has dramatically changed how work gets done. Business-critical apps and data are a keystroke away, no matter where an employee is or what time it is. Perhaps it is this familiarity with data that makes employees feel so connected to it that, when they switch jobs, they often take some of it with them. Maybe it’s why most of them don’t think this is a criminal act.

Whatever the reasoning for this...

By Mike Mason, 22 March 2019, 0 comments. Categories: Applications, Data & Analytics, Data Management, Security.

Alibaba Cloud looks to integrated and intelligent future at Beijing summit

Alibaba Cloud has taken the opportunity provided by its most recent Beijing Summit to elaborate on its near 10-year history – and explore a more integrated and intelligent future.

The company noted that its cloud arm was ‘becoming the main business focus of Alibaba Group’ and that cloud adoption was ‘expected to continue and become more immersive in the traditional sectors across China.’  

By James Bourne, 21 March 2019, 0 comments. Categories: Alibaba, Data & Analytics, Data Management, Infrastructure.

Practical cloud considerations: Security and the decryption conundrum

Compute in the cloud may be cheap but it isn't free. Most of today’s apps are delivered via secure HTTP. That means TLS or the increasingly frowned upon SSL. It means cryptography, which traditionally has been translated to mean performance problems.

Thanks to advances in technology, CPUs are now incredibly fast and many client (and...