Is cloud computing ready for prime time?

By John Dixon, Senior Solutions Architect

A few weeks ago, I took part in another engaging tweetchat on cloud computing. The topic: is cloud computing ready for enterprise adoption? You can find the transcript here.

As usual with tweetchats hosted by CloudCommons, five questions are presented a few days in advance of the event. This time around, the questions were:

  • Is public cloud mature enough for enterprise adoption?
  • Should public cloud be a part of every...
  • By GreenPages Technology Solutions, 10 January 2013, 0 comments. Categories: Enterprise, Public, Security, Virtualisation.

    5 cloud server security tips for 2013

    5-Tips-Circle-LargeIf you’re like most, cloud is going to be a big part of your life in 2013. So to help you start the year off right, we’ve prepared the following tips for securing your cloud servers. Here are your 5 cloud security tips for 2013 (in no particular order): Tip #1: Lock down the server firewall Big surprise – a firewall management service provider telling you to lockdown the firewall, but putting aside the...

    By Dome9, 09 January 2013, 0 comments. Categories: Best Practice, Security.

    Amazon Web Services starts to assert itself

    By Laurent Lachal, Senior Analyst, Ovum SoftwareAt the end of November 2012, Amazon Web Services (AWS) held its first partner and customer conference in Las Vegas. Dubbed AWS “re: Invent”, the event was a success. It enabled AWS to assert itself as a large and influential player in the IT marketplace. However, as well as AWS’s strengths, it also highlighted some of its traditional weaknesses. These include poor communications and an inability to put forward messages adapted to the needs of enterprise executives.

    A...

    By Ovum StraightTalk, 08 January 2013, 0 comments. Categories: Enterprise, IaaS, Security.

    How cloud security balances risk versus reward

    riskrewardI spend a great deal of my day thinking about security. How it affects the enterprise; how to best position and protect assets. How it shapes risk management and how it delivers potential benefits through smoother operations, enhanced trust and loss prevention.

    At its core, security is...

    By Cloud Security, 04 January 2013, 0 comments. Categories: Security.

    What are the roadblocks to a worldwide cloud security standard?

    The cloud storage phenomenon has resulted in a widely used platform used by both companies and individuals as an easy means to store their data. However, as is typical with new technology, the security has fallen behind and left many users vulnerable to intrusions on their privacy that could result in data loss and theft. This problem is due in large part to the factors that make cloud security difficult. (At Virtual Internet an intense effort has been made to use the latest technology and standards (including ISO 9001 and 27001 certification) to safeguard and...

    By VI, 03 January 2013, 0 comments. Categories: Security, Storage.

    Demystifying the cloud security hype

    You’re already using it

    You may already be familiar with the term ‘Real Time Protection’, which could just as easily be labeled ‘Cloud Protection’. Simply put, when a vendor’s research team identifies a new email threat, the characteristics of the message are sent to all affected hardware appliances straightaway, so that the malicious content is immediately blocked. This all happens far ahead of the regular update by on-premise virus signatures.

    Because they are outsourced,...

    By Wieland Alge, 21 December 2012, 0 comments. Categories: Security.

    One in three mission critical apps currently in the cloud, says survey

    Research from identity management provider SailPoint has revealed that US and UK based IT leaders see one in three mission critical apps as currently in the cloud, with that figure rising sharply by 2015.

    The Market Pulse Survey of 400 IT and business leaders, which defined ‘mission critical’ as apps mainly focused on storage, file-sharing and communications, forecast that the number is expected to grow to one in two in three years.

    The figures differed slightly dependent on which side of the...

    By James Bourne, 12 December 2012, 0 comments. Categories: Applications, Research, Security.

    When encryption doesn’t mean more secure

    By Ken Smith

    I have had a number of clients reach out to me about how to implement whole disk encryption, SQL transparent data encryption, and encryption of VMware VMDK files in order to satisfy “data at rest” security requirements. My response is usually something like “Say that again?”

    These types of encryption approaches are designed to better protect data at rest on media that may be accessible to individuals who are not authorized to access such data. This is usually some form of...

    By GreenPages Technology Solutions, 12 December 2012, 0 comments. Categories: Security.