Boxee removes cloud DVR after Samsung acquisition

Boxee, the Israel-based media streaming provider, has been bought out by Samsung Electronics – and has immediately announced the removal of its cloud-based digital video recorder (DVR) software.

The bad news for Boxee customers is that the switch off for the cloud DVR comes on July 10, with all recordings being wiped after that date. Expect many Boxee viewers to be bleary-eyed for work in the coming days having ploughed through the recordings they still have.

“We believe that over the next few...

By James Bourne, 08 July 2013, 0 comments. Categories: Security, Storage.

Cloud being “smothered” by CIO IT concerns, claims new report

As cloud computing continues to materialise and mature in the fabric of today’s IT, one of the primary barriers to widespread adoption is the high proportion of legacy ICT in many companies.

That’s according to the latest survey, this time from NTT Europe polling 300 CIOs and IT decision makers on current trends, barriers and solutions.

56% of those surveyed cited the complexity of their IT layout as the biggest barrier to large scale cloud adoption, with the figure rising to 70% in the public...

By James Bourne, 02 July 2013, 0 comments. Categories: CIO, Migration, PublicSector, Research, Security.

IBM’s Big Data and Analytics portfolio needs more tailoring for life sciences

Andrew Brosnan, Senior Analyst, Health SciencesAt its recent Big Data and Analytics Analyst Insights Summit in Toronto, IBM laid out its portfolio of technologies and services specifically for business analytics. The portfolio is a robust and comprehensive offering, encompassing all types of analytics, with specific tools and technologies across the “stack” for organizations of all sizes.The phrase “easy, fast, and smart” was a recurring theme throughout the event, highlighting IBM’s...

By Ovum StraightTalk, 02 July 2013, 0 comments. Categories: Big Data, Data & Analytics, Security.

‘MegaWiped’ – Kim Dotcom’s Megaupload data cleared

The now almost household name, Kim Dotcom, has been in consistent battle against the U.S government over his Megaupload business – in case you’ve been under a rock for over a year.

Now the case has taken a new turn as his old Dutch hosting provider LeaseWeb has wiped 600 servers containing “petabytes” of his company’s data; including legal evidence.

Kim has expressed his...

By Ryan Daws, 20 June 2013, 0 comments. Categories: Big Data, Consumer, Government, Industry, Security.

Identity as a service (IDaaS) is more important than ever

Conspiracy theorists and other concerned citizens will insist the government is watching every keystroke, keeping a record of every website, transaction, text and email. Shades of 1984’s Big Brother, right? These last few weeks, the news has been brimming with revelations of data surveillance and monitoring by the government (not to mention data harvesting corporations like Google, Yahoo, Facebook etc…). Everyone is sensitive as to what is being looked at, stored, and analyzed for hazily defined purposes. Privacy is no longer as private as you...

By Cloud Security, 17 June 2013, 0 comments. Categories: Applications, ERP, Security.

97% of SMBs say security positively impacted by cloud adoption

Over 95% of respondents in a comScore survey of French SMBs said cloud adoption had a positive impact on security, as well as noticing unexpected benefits, such as up-to-date systems and antivirus protection.

The study of French small to midsize businesses with between 25 and 499 PCs was conducted by comScore and commissioned by Microsoft Trustworthy Computing, although the respondents were made unaware of Microsoft’s involvement.

88% of those polled said they had noticed improved uptime as a result of...

By James Bourne, 13 June 2013, 3 comments. Categories: Adoption, Migration, Research, Security.

Did the US just give a big stimulus towards local European cloud activities?

Unless you have been under a rock for the last week it was impossible not to notice the uproar regarding the Guardian’s story on alleged information collection , allegedly called PRISM that -again allegedly- involved several major cloud service providers. The most detailed and nuanced piece so far – but it is only Sunday when I am writing this – is

By Gregor Petri, 12 June 2013, 0 comments. Categories: Europe, Security, Vendors.

HP and Amazon clouds certified secure after nailing FedRAMP qualification

HP Enterprise Services has become the latest CSP (cloud service provider) to announce it has passed Federal Risk and Authorization Management Program (FedRAMP) protocols to get the official US government cloud security stamp.

Amazon, as you’d probably expect, announced its FedRAMP seal of approval last week.  So what’s that stomping sound you’re hearing? It’s all the public cloud competition rushing to catch...

By James Bourne, 11 June 2013, 0 comments. Categories: Government, IaaS, Public, Security.

Latest cloud computing report shows benefits exceed expectations

A report from CA Technologies, entitled ‘Cloud Succeeds. Now What?’ has revealed that, for many companies polled, their cloud solutions have been more successful than they were expecting.

The train of thought here, of course, has to wonder what those expectations were, especially in a week where service level agreements (SLAs) are at the forefront following 100% SLA provider Mimecast’s outage.

Yet for companies experienced with...

By James Bourne, 24 May 2013, 1 comment. Categories: Adoption, Architecture, Research, Security.

It's not you, it's me: How IT can stop the mobility-cloud break up

Enterprises see a lot of promise in mobile devices. Their users should be more productive now that they can craft presentations on the go. Their employees should have more opportunities to collaborate now that they can share documents anytime via their smartphones. Right?

Well, not really. For too many businesses, the promise of the bring-your-own-device (BYOD) trend has been swallowed up by mobile workflow challenges and insecure, consumer-grade cloud sharing solutions.

It would be easy to predict the...

By Moti Rafalin, 24 May 2013, 1 comment. Categories: Enterprise, Mobility, Security.

7 causes of security paralysis and cloud-based cures

Over and over again we are pummeled with statistics on how risk is growing in disproportion to security readiness.

-91% of companies have experienced at least one IT security event from an external source.

-90% of all cyber crime costs are those caused by web attacks, malicious code and malicious insiders.

-40% reported rogue cloud issues (shadow IT) experienced the exposure of confidential information as a result

-34% share passwords with their co-workers for applications like FedEx, Twitter, Staples,...

By Cloud Security, 23 May 2013, 0 comments. Categories: Adoption, Best Practice, Security.

Google plays its IaaS hand with Compute Engine general release

Among the hive of activity at Google I/O, one of the search giant’s more interesting announcements has come in the form of a general preview release of Google Compute Engine (GCE), giving developers increased access to Google infrastructure.

Google’s latest push is a further move into the infrastructure as a service (IaaS) space, and culminates in the Silicon Valley company finding itself jockeying for position in a three horse race alongside Amazon and Microsoft.

By James Bourne, 21 May 2013, 0 comments. Categories: Developers, IaaS, Security.

Hybrid cloud “wave of the future” for seven out of 10 IT pros

Another day, another cloud survey, and for 69% of the near 250 IT professionals quizzed by business process automation firm PMG, the hybrid cloud is the “wave of the future within their organisations”.

The combination of public and private cloud is really starting to gain traction in 2013. But why?

The most important reason for adopting hybrid clouds, according to 38% of respondents, was that cloud apps were deployed faster. Delivering better value (21%), and being able to meet requirements more...

By James Bourne, 09 May 2013, 0 comments. Categories: Hybrid, Private, Public, Research, Security.

Kim Dotcom fights back at US government in new whitepaper

After a raid at his New Zealand mansion in January last year, the larger than life Kim Dotcom has released a whitepaper taking direct aim at the US government.

The paper goes into detail how the raid wasn’t enough for “The Government Communications Security Bureau” who continued to illegally spy on Kim Dotcom for ten days after the raid on his home, according to his lawyers.

These very lawyers, US lawyer...

By Ryan Daws, 08 May 2013, 0 comments. Categories: Compliance, Government, Security.

Brass tacks: Answering the security questions that matter

Enterprise security can be a labyrinthine, complex beast with many moving parts, dozen upon dozen of requirements, needs, implications, options and alternatives.

But when we get down to the nitty gritty (the brass tacks if you will), security can be simplified by six simple questions:

WHO is logging in?

WHAT are they accessing/viewing?

WHERE is the device from which that person logs in?

WHEN was any asset changed/modified/moved

HOW are they authorised/credentialed?

WHAT is the impact of the event?

Now determining the answers to those questions might require a bit of...

By Cloud Security, 23 April 2013, 0 comments. Categories: Architecture, Enterprise, Infrastructure, Security.

Proactive security is required in highly regulated industries

Andrew Kellett, Principal Analyst, Infrastructure and SecurityMaintaining security that meets the risk and compliance requirements of the enterprise is a constant challenge. Systems and networks are becoming more open and accessible, but at the same time, threats have become more advanced, persistent, and complex. This is a particularly important issue in highly regulated markets such as financial services, where failure to protect sensitive information will have a negative effect on the business and how it is...

By Ovum StraightTalk, 22 April 2013, 0 comments. Categories: Architecture, Data & Analytics, Enterprise, Hacking, Infrastructure, Security.

Cloud security: From hacking the mainframe to protecting identity

By Andi Mann, Vice President, Strategic Solutions at CA

Cloud computing, mobility, and the Internet of Things are leading us towards a more technology-driven world. In my last blog, I wrote about how the Internet of Things will change our everyday lives, but with these new technologies comes new risks to the organization.

To understand how recent trends are shifting security, let’s revisit the golden age of

By GreenPages Technology Solutions, 12 April 2013, 0 comments. Categories: Hacking, Security.

Private cloud drives data centre expansion, says survey

Half of those polled in the latest cloudy survey have said they will “definitely” look to expand their data centres in the coming year, with the vast majority of remaining respondents claiming they will expand in 2014.

The survey, commissioned by data centre services provider Digital Realty Trust and conducted by Campos Research and Analysis, spoke to 300 IT execs and concluded that this explosion in data centre usage was primarily down to the proliferation...

By James Bourne, 10 April 2013, 0 comments. Categories: Big Data, Private, Security.

Fears of cloud insecurity “should not drive infrastructure decisions”

Alert Logic’s latest cloud security report has summarised that cloud security providers (CSPs) are “inherently no less secure than enterprise data centres”, and that cloud security threats continue to follow a consistent pattern.

In its State of Cloud Security Report, subtitled “Targeted Attacks and Opportunistic Hacks”, the network security provider observed over 45,000 security incidents and found that some things don’t change; Web application attacks are the biggest...

By James Bourne, 27 March 2013, 0 comments. Categories: Hacking, Infrastructure, Research, Security.