Why combining access governance with authorisation management is key to identity success

In virtually every organisation or university, data is stored on multiple file servers throughout the network, often in a somewhat haphazard or random structure. Access to the data is likely just as unstructured and may put the organisation at risk by allowing employees access rights where none are required. Managing access to this unstructured data is incredibly difficult, resulting in a significant challenge when the time for an IT audit rolls around.

There are methods to bring order to this madness and...

By Dean Wiech, 17 October 2017, 0 comments. Categories: Best Practice, Compliance, Security, Software.

Google Cloud acquires Bitium for greater identity and access management

Google Cloud has beefed up its identity and access management game with the acquisition of Bitium, a Santa Monica-based firm.

Bitium, founded in 2012, offers a variety of identity management features, including secure access, user provisioning and deprovisioning, app management and single sign on.

In a short blog post confirming the news, Karthik Lakshminarayanan, director of product management for G Suite and Cloud Identity, said the move will...

By James Bourne, 27 September 2017, 0 comments. Categories: Google, M&A, Security, Software.

Stronger cloud security and guaranteed uptimes? Yes we’ll pay more, say organisations

Three quarters of organisations would be willing to pay a premium to enhance their cloud services, according to the latest note from 451 Research.

In the latest from its Voice of the Enterprise series – this time around organisational dynamics in hosting and cloud managed services – the research firm found that companies were most likely to pay more for security guarantees than anything else.

Just under half (48.7%) of those polled said they would pay to enhance their security, ahead of guaranteed...

By James Bourne, 26 September 2017, 0 comments. Categories: Research, Security, SLA, Vendors.

New IDC paper assesses benefits and challenges when moving existing apps to the cloud

Born in the cloud services may be one thing – but what are the key aspects to look out for when migrating existing applications to the cloud? According to a new whitepaper from IDC, security, privacy, and compliance regulations came out on top for organisations.

The study, ‘Critical Application and Business KPIs for Successful Cloud Migration’, polled 600 enterprises and was conducted alongside application performance management provider AppDynamics. Naturally, the paper exists to point...

By James Bourne, 25 September 2017, 0 comments. Categories: Applications, Infrastructure, Migration, Research, Security.

Half of companies fail to meet PCI DSS compliance standards: Is your infrastructure up to it?

Only 55.4% of companies meet all PCI DSS compliance standards, according to a new report released by Verizon. While this number is up 7% from 2015, it still translates to nearly half of retailers, IT services companies, payment software providers and hospitality organisations do not adequately protect credit cardholder information.

Companies had the greatest difficulty meeting the following requirements, many of which are related to infrastructure compliance and policies:

  • Requirement 3 – Protect...

By Logicworks, 22 September 2017, 0 comments. Categories: Applications, Compliance, Infrastructure, Security.

More shared responsibility confusion among cloud hoppers, Barracuda notes

Another day, another research study which reveals the benefits of the public cloud tinged with security concerns.

This time, a report from Barracuda Networks has shown that while respondents – 300 IT decision makers from companies across the US – expect the percentage of their infrastructure in the public cloud to almost double in five years, three quarters (74%) say security concerns restrict their organisations’ migration.

Yet perhaps the most worrying aspect of the research was around...

By James Bourne, 21 September 2017, 0 comments. Categories: Adoption, Hybrid, Infrastructure, Migration, Research, Security.

Organisations losing revenue due to lack of cloud expertise, Rackspace warns

Two in three UK IT decision makers polled in a new study say their organisation is losing out on revenue as they lack specific cloud expertise.

The report, put together by Rackspace and the London School of Economics, polled 950 IT decision makers and 950 IT pros and found 67% of the latter believed they could bring greater innovation to their organisation with the ‘right cloud insight’. 85% said greater expertise within their organisation would help them recoup the return on their cloud...

By James Bourne, 21 September 2017, 0 comments. Categories: Adoption, Economy, Security.

What security roles should SaaS providers have on their teams?

For those at software as a service companies, it's easy to forget that cloud services still aren't standard at most companies.  According to a BetterCloud report, just 43 percent of organisations today operate primarily on cloud services. By 2020, however, BetterCloud expects that figure to hit 73 percent, and by 2022, it predicts that 86 percent of firms will default to cloud services.

Increased cloud usage obviously benefits cloud service...

By Brad Thies, 18 September 2017, 0 comments. Categories: SaaS , Security, Software.

Microsoft launches Azure confidential computing to protect data encrypted in use

Microsoft has announced the launch of ‘confidential computing’ in Azure, claiming to be the first public cloud provider to offer encryption of data while in use.

The project, for which a variety of Microsoft teams have been working for four years, is similar in scope to the Coco Framework, Redmond’s confidential computing blockchain initiative.

“Despite advanced...

By James Bourne, 14 September 2017, 0 comments. Categories: Data & Analytics, Data Management, Microsoft, Security.

The evolution of phishing: Reeling them in from the cloud

Awareness of phishing has grown significantly in recent years, and users are more suspicious than ever of emails that land in their inbox from unknown or questionable senders. In response to this, cybercriminals have had to become savvier with their phishing tactics. They’ve looked to new methods of phishing that are harder for users to expose. The latest of these phishing tactics uses spoofed cloud applications – a new trend that businesses need to watch out for.

Early phishing

Phishing was once...

By Anurag Kahol, 13 September 2017, 0 comments. Categories: Applications, Security, Vulnerabilities.

Why have a strategy for cloud management?

With the general cloud hype and the widely declared corporate intent to base future business solutions on cloud technology stacks, businesses may take the view that deploying cloud solutions involves little more than accessing a vendor’s cloud portal and following a few clicks, have your virtual services deployed and ready for operations.

Whilst this approach will give an enterprise a cloud-based virtual environment, what’s delivered is far from being part of a corporate information...

By Paul Ryder, 12 September 2017, 0 comments. Categories: Adoption, Infrastructure, Security.

How cloud and DevOps combine for software delivery success

Throughout the global economy and across all industries, companies are re-inventing themselves to become better at sensing the next big thing their customers need, and finding ways to deliver it to get ahead of the competition.

The concept of DevOps dates back nearly 10 years now. During this time, a lot has changed. As DevOps has matured, we have seen many successful implementations, lessons learnt and copious amounts of data gathered. One thing that remains unchanged to this day – DevOps is...

By Mike Adcock, 04 September 2017, 0 comments. Categories: Developers, DevOps, Infrastructure, Security.

Cloud Security Alliance aims to improve cyber security with introduction of new metrics

As any medical professional will explain, prevention is always better than cure. So why are so many organisations reactive instead of proactive when it comes to cybersecurity threats? A new report from the Cloud Security Alliance (CSA) aims to introduce new metrics for enterprises to improve their security game.

The report, titled ‘Improving Metrics in Cyber Resiliency’, introduces Elapsed Time to Identify Failure (ETIF) and Elapsed Time to Identify Threat (ETIT), as well as processes to measure...

By James Bourne, 30 August 2017, 0 comments. Categories: Disaster Recovery, Security, Vulnerabilities.

Why commodity management companies are shifting towards the cloud

Much like the earth’s climate has been undergoing a gradual shift, so has the climate for cloud-based business applications and systems. The use of cloud-based applications for personal purposes including email, picture-sharing, and listening to music has become ubiquitous.

As a result, people have become accustomed to accessing what they want, when they want, from wherever they want. Their tolerance for traditional desktop software has diminished. Each day, more businesses are embracing the cloud as...

By Rajeev Warrier, 29 August 2017, 0 comments. Categories: Adoption, Data & Analytics, Data Management, ERP, Security.

Things that go bump in IT: Eliminate shadow IT nightmares to improve compliance and governance

Lurking in the background of any IT manager’s nightmares is the spectre of shadow IT. Shadow IT can be described as hardware or software used in an enterprise that is not supported by the enterprise. The negativity of the term is justified because it implies that employees are using technology without the knowledge or approval of the IT department – a recipe for disaster.

The risks of shadow IT are well-known and have the potential to damage a business’s ability to function effectively. Even...

By Tom Grave, 22 August 2017, 0 comments. Categories: CIO, Collaboration, Security, Software, Vulnerabilities.

AT&T, GE and Oracle offer juiciest cloud salaries, new data reveals

Cloud computing skills continue to be in high demand – and new figures from PayScale reveal that AT&T, General Electric and Oracle provide the best remuneration for top performers.

The figures, first reported by Forbes, cover a variety of metrics, from employers, to different roles, to company size and years’ experience, with the data coming from more than 1000 US-based respondents in...

By James Bourne, 21 August 2017, 0 comments. Categories: Economy, Infrastructure, Research, Security.

Why analytics and good identity hygiene are key to cloud security

As cloud computing has matured, the benefits it delivers to organisations of all sizes are undeniable. Companies are enjoying agility, scale and speed like never before.

And cloud adoption shows no signs of slowing. Gartner earlier this year forecasted that the worldwide public cloud services market would grow 18 percent in 2017, and Forrester said global cloud services revenues totalled £100 billion in 2016, up from £50 billion just two years ago — that’s annual growth of 30...

By Don Shin, 15 August 2017, 0 comments. Categories: Data & Analytics, Developers, Security, Vulnerabilities.

Gartner changes EFSS Magic Quadrant to content collaboration with Box and Microsoft leading

Box and Microsoft lead the way on vision and execution in Gartner’s recently released Magic Quadrant for content collaboration platforms – but it doesn’t quite tell the full story.

If you are unfamiliar with the name of the report, there is a good reason. The Quadrant was previously known as EFSS (enterprise file sync and share), with the analyst firm changing the definitions this year to reflect a shift in the market.

As Box puts it, content collaboration platforms ‘go beyond EFSS to...

By James Bourne, 04 August 2017, 0 comments. Categories: Collaboration, Research, Security, Software, Storage.

The top three approaches for improving cloud migration and security

For many enterprises, migrating towards a cloud delivered approach for IT systems is an attractive proposition. Cost efficiency and business agility are big drivers for CIOs to make the move.  Most modern companies have either started migrating toward a public cloud or they are in the early planning and analysis phases of doing so.

At the same time, making the jump from on-site infrastructure to cloud-hosted platforms is not free of challenges such as, regulations, data governance, billing and cost...

By Mike Kail, 21 July 2017, 0 comments. Categories: CIO, Data & Analytics, Data Management, Migration, Regulation, Security.

Cloud security spending goes up for organisations as app-level responsibility bites

Organisations are more likely to prefer storing data in the cloud instead of on a legacy system – but are spending significantly on security to keep up.

That is the latest finding from Clutch, a B2B research firm, which put out the latest report from its annual cloud computing survey earlier this week.

Nearly 70% of the 283 IT professionals polled said they would be more comfortable storing data in the cloud; yet more than half of companies surveyed admitted to spending more than $100,000 per year on...

By James Bourne, 21 July 2017, 0 comments. Categories: Applications, Data & Analytics, Security.