2017 is the year when IoT gets serious: Here’s what cloud providers need to know

If you attended Mobile World Congress (MWC) last month you would have heard a lot of buzz about 5G and the Internet of Things (IoT) with many vendors like HPE, IBM, VMware and others talking about their role in 5G and IoT.  As iland is a V-Cloud partner, I was particularly interested to hear about the VMware IoT theatre sessions...

By Monica Brink, 14 March 2017, 0 comments. Categories: Applications, Data & Analytics, Data Management, Regulation, Security.

Access governance and the cloud: Security and organisational insight are the bottom line

How does access governance apply to the cloud? Well, while the cloud has been established as a standard for many organisations, access and governance to manage such solutions has not yet become a standard solution.

Access governance helps organisations of all sizes in every industry by ensuring that each employee has the correct access to the systems that they need to perform their jobs while keeping the company’s data and network secure. Access governance specifically allows organisational leaders to...

By Dean Wiech, 13 March 2017, 0 comments. Categories: Applications, Compliance, Data & Analytics, Data Management, Security.

The AWS security primer: Here’s what you need to know

If you’re considering migrating your business applications to a public cloud, the chances are that you’ve looked into Amazon Web Services. With its higher capacity and wide range of cloud services, AWS has become the most popular choice for businesses looking to take advantage of the scalability and cost-effective storage that cloud computing offers.

Security in AWS is based on a shared responsibility model: Amazon provides and secures the infrastructure, and you are responsible for securing what...

By Avishai Wool, 10 March 2017, 0 comments. Categories: Amazon, Data Management, Public, Security.

How on-demand cloud is contributing to the ransomware problem

“Attention! All your files have been encrypted.” More and more businesses are being greeted with messages such as this one, with ransomware attacks against businesses having increased threefold last year.

Advice for preventing ransomware – which is malicious software that encrypts devices or data until the owner pays a ransom in exchange for access to their data – is...

By Matt Kingswood, 09 March 2017, 0 comments. Categories: Applications, Data Management, Security, Vulnerabilities.

The endpoint and VDI: Moving beyond the last piece of the puzzle

There are mixed feelings on the importance of the endpoint’s role in virtual desktop infrastructure (VDI) deployment.  We are currently living in a time where companies are finally starting to make great use and adoption of VDI and more generally of cloud services (on premise and localised resources are still largely adopted).  If VDI and cloud services define the way resources and applications are delivered, there is still a big question mark on the future of the endpoint device. What are the...

By Alessio Broccardo, 06 March 2017, 0 comments. Categories: Infrastructure, Security, VDI, Virtualisation.

UK businesses remain ‘risk-averse’ and lagging behind in cloud strategy, Intel argues

(c)iStock.com/john shepherd

Organisations in the UK are among the least likely globally to have a cloud-first strategy, according to a new report from Intel Security.

The study, which polled more than 2,000 senior IT professionals, found the UK had pretty miserable scores across the board compared to their international brethren. The UK’s score of 70% for businesses who are cloud-first – whilst still a reasonable number – lagged behind the global average of more than 80%, while only 7% of UK...

By James Bourne, 13 February 2017, 0 comments. Categories: Adoption, Data Management, Europe, Infrastructure, Security.

Microsoft unveils new offering to combat patent trolls in the cloud

(c)iStock.com/RonBailey

Microsoft has announced the launch of the Azure IP Advantage program to help protect intellectual property from ‘patent trolls’ in the cloud.

Patent trolls, defined by the Electronic Frontier Foundation (EFF) as companies or people who ‘use patents as legal weapons, instead of actually creating any new products or coming up with new ideas’, are becoming an increasing problem with code and products hosted on cloud servers.

As a result, Microsoft is making 10,000...

By James Bourne, 09 February 2017, 0 comments. Categories: Data & Analytics, Data Management, Developers, Legal, Microsoft, Security.

Eseye on embracing cloud, Amazon Web Services, and the IoT

(c)iStock.com/DrAfter123

“We changed our business model to align with cloud,” explains Nick McNamara, VP sales Europe at connectivity provider Eseye.

The company has doubled down on both the Internet of Things (IoT) and Amazon Web Services (AWS) strategically, as McNamara, speaking at the IoT Tech Expo event last week, explains. “All connectivity providers, whether you’re an MNO, an MVNO, or like us a smart MNO, sell megabytes per month,” he says. “We no longer sell megabytes...

By James Bourne, 31 January 2017, 0 comments. Categories: Amazon, Applications, Data Sovereignty, Security, Vulnerabilities.

US Army signs $62 million deal to move to IBM’s cloud

(c)iStock.com/DanielBendjy

IBM has secured a major cloud customer win in the form of the US Army with a potential $62 million (£50.3m) contract over five years, the company has announced.

The deal, which is designed for the Army’s Redstone Arsenal in Alabama, is for the Army Private Cloud Enterprise (APCE) program and comes under the Army Private Cloud 2 (APC2) contract, which is an ‘indefinite delivery’ deal which started on December 31 last year and expires exactly five years...

By James Bourne, 19 January 2017, 0 comments. Categories: Applications, Case Studies, IaaS, Infrastructure, Security.

Google launches cloud-based key management with new service

(c)iStock.com/tarik kizilkiya

Google has announced the launch of Cloud Key Management Service (KMS), which enables admins to manage their encryption keys in Google Cloud Platform without maintaining an on-premise management system.

The news marks Google’s entry into this particular security arena, following Amazon Web Services (AWS) and Microsoft who launched such initiatives as far back as 2014 and 2015 respectively.

“Customers in regulated industries, such as financial services and healthcare,...

By James Bourne, 18 January 2017, 0 comments. Categories: Google, Platform, Security.

Netskope gives another warning to businesses struggling with GDPR compliance

(c)iStock.com/maxkabakov

An overwhelming 94% of cloud apps in enterprises across EMEA are not enterprise-ready, while two thirds of overall cloud services are not up to scratch, according to the latest research from Netskope.

The findings, which appear in the company’s latest quarterly cloud report, found that 82.4% of services do not encrypt data at rest, 66.4% of cloud services do not specify that the customers owns the data in their terms of services, while 42% do not allow admins to enforce password...

By James Bourne, 12 January 2017, 0 comments. Categories: Compliance, Data & Analytics, Data Management, Security.

Building your data castle: Protecting from ransomware and restoring data after a breach

(c)iStock.com/Pobytov

The data centre is the castle. You can pull up the drawbridge, fill up the moat, or pull down the portcullis. But at some point, you have to let data in and out, and this opens up the opportunity for ransomware attacks.

No longer is it a matter of pride and peer recognition in the hacker community for circumnavigating and exposing the security of an organisation because it is now a fully-fledged industry in its own right with the use of...

By David Trossell, 11 January 2017, 0 comments. Categories: Data Centres, Data Management, Security, Vulnerabilities.

‘Security by design’ and adding compliance to automation

(c)iStock.com/maxkabakov

By Jason McKay, CTO and SVP of Engineering, Logicworks

Security is “job zero” for every company. If you are putting your customers or users at risk,  you will not be in business for long. And that begins with taking a more proactive approach to infrastructure security — one that does not rely on the typical protective or reactive third party security tools, but builds security into your infrastructure from the ground...

By Logicworks, 09 January 2017, 1 comment. Categories: Compliance, DevOps, Infrastructure, Security.

That was the year that was: 2016 in cloud - and what’s on the horizon for 2017

(c)iStock.com/joloei

2016 was an interesting year in cloud computing. For the European market, data protection regulation came into force, while many of the major cloud providers began to move their operations into and build data centres in Europe, from AWS, to Microsoft, to IBM. Regarding acquisitions, Oracle bought NetSuite, Microsoft bought LinkedIn and Samsung acquired Joyent, while in terms of trends, DevOps, containers and security continued to be the primary talking points.

Here is our short review of the main...

By James Bourne, 05 January 2017, 1 comment. Categories: Amazon, Infrastructure, Security.

Security through visibility: Seeing into virtual and cloud networks

(c)iStock.com/alashi

Imagine an IT security team as a navy crew at sea. A torpedo blasts the ship’s side below the water line. As the water floods in, they can’t even see the hole, let alone fix it. Instead, everyone turns to the pumps to keep the ship afloat.

This is the state of many security programs today. Despite a plethora of point solutions, security teams lack visibility into what they’re trying to protect, their most pressing risks and the security tools at their disposal. Thus...

By Ravid Circus, 23 December 2016, 0 comments. Categories: Hybrid, Infrastructure, Security.

Preparing for a year of ‘unknown unknowns’ in cyber security

(c)iStock.com/tonefotografia

Today’s threat landscape is constantly evolving. In 2016 in particular, we’ve seen a huge shift with adversaries penetrating organisations from the DNC to WADA and gaining access to sensitive documents that were later leaked to embarrass individuals. Yet, while many believe that this trend starts and ends with a contentious election, it’s not something that’s going away in 2017. In fact, we’re starting to see continued and varied threats, most...

By Mike East, 07 December 2016, 0 comments. Categories: Security, Vulnerabilities.

How software asset management needs to adapt to changing cloud conditions

(c)iStock.com/whiteson

A new report issued today by Flexera Software argues that software asset management (SAM) needs to evolve to keep up with software as a service (SaaS) and virtualisation moving into the mainstream.

The study, which polled almost 500 respondents answering questions on enterprise and application production, found that for 20% of respondents, more than a quarter of their software is SaaS-based, while 39% say more than a quarter is virtualised. Interestingly, while three quarters say 80% or...

By James Bourne, 06 December 2016, 0 comments. Categories: Research, Security, Software, Vulnerabilities.

Latest survey data warns SMBs are not using automation for cloud backups

(c)iStock.com/fazon1

Almost 70% of small businesses in a survey from B2B analyst and reviews firm Clutch say they rely on their cloud storage provider for backups, with only 15% opting for automated services and 12% not bothering at all.

The findings appear as the second of two reports on SMBs and cloud strategy, with the first in November advising that many small firms are risking their...

By James Bourne, 02 December 2016, 0 comments. Categories: Data Management, Security, Software, Storage.