How the PRISM fallout is impacting cloud adoption

The fallout of the Edward Snowden scandal that broke over the summer is being felt globally, with concerns around governments’ ability to access data prompting many organisations to rethink their investment in ICT and the cloud. It is this information that has contributed to analysts estimating that the US cloud computing industry could lose up to $180 million by 2016. This has opened up a debate – has the PRISM...

By Len Padilla, 27 January 2014, 0 comments. Categories: Adoption, Government, Security.

New cloud contact center capabilities strengthen Aspect’s market position

Aphrodite Brinsmead, Senior Analyst, Customer Engagement

At its industry analyst conference in Phoenix, Arizona in January 2014, Aspect proudly discussed its newly refocused business. Two years ago the vendor was working closely with Microsoft and struggling to gain new business in a saturated contact center infrastructure market. However, Aspect begins 2014 with new products, strong financials for 2013, and a positive growth forecast.

The strategic acquisitions it made in 2013 have helped Aspect get back on...

By Ovum StraightTalk, 21 January 2014, 0 comments. Categories: Consumer, M&A, Security.

Sony’s move to cloud gaming goes up a gear with PlayStation Now

Sony has announced PlayStation Now, a service which allows gamers to stream a variety of PlayStation titles across a range of devices without a console in sight.

The announcement was made at CES, with games from Sony’s previous three consoles being utilised and the service available on the PS4, the PS Vita, as well as Sony’s Bravia TV sets.

The technology for PlayStation Now came from Gaikai, a company which streams high-end video games. Gaikai was bought by Sony in July 2012 for $380m, a clear...

By James Bourne, 09 January 2014, 0 comments. Categories: Infrastructure, Security.

Why cloud and mobile security management is gaining momentum

As more business applications move to the cloud, security seems to be top-of-mind for all concerned parties. Also, the Bring Your Own Device (BYOD) to work trend, along with more smartphones and tablets that require wireless connectivity in the workplace, has increased the level of concern for many IT managers and executives. Keeping business systems safe and protecting the data that they hold has never been more difficult to achieve, according to the latest market study by Ovum. The typical corporate ICT environment continues to be threatened by security attacks -- ranging from opportunistic hackers using pre-built tools through to targeted, well-resourced, state-sponsored cyber activity.Ovum believes that online attack volumes will continue to rise and no...

By David H Deans, 09 December 2013, 0 comments. Categories: Mobility, Research, Security, Trends.

Artmotion CEO Mateo Meier on security, storage and a Swiss Cloud

The negative press surrounding the cloud computing industry following the NSA PRISM leaks in June wasn’t a huge surprise.

But there are usually winners and losers in every situation – and Swiss cloud service providers stand to gain the most from the scandal.

Due to the country’s more stringent data privacy laws – a formal request from a prosecutor would have to be sent off before a CSP allows access to data in Switzerland – those at the eye of the storm are experiencing greater...

By James Bourne, 21 November 2013, 0 comments. Categories: Europe, Interview, Security, Storage.

CipherCloud: NSA PRISM scandal helped company grow “tremendously”

When the NSA PRISM revelations hit back in June, it initially spelled bad news for many cloud industry players, especially in the US. With analysts speculating that the damage to the US cloud computing industry could go as high as $35bn, it was a fractured period of time.

For San Jose-based cloud information protector CipherCloud, however, it was a different story.

CEO and founder Pravin Kothari and senior vice president Paige Leidig were both at a...

By James Bourne, 19 November 2013, 0 comments. Categories: Amazon, Best Practice, Disaster Recovery, Interview, Security.

The reality of data security in the cloud

Data in the cloud is increasingly viewed as the reality of IT infrastructure management.

With such ubiquitous data storage on cloud-based, cloud-based is at odds with the naysayers who continue to cite security concerns as a reason not to move data to the cloud.

So we have a discrepancy – cloud data storage is widely used, yet there are concerns about the security (compliance and privacy also) of the data itself.

What gives?

The rapid rate of cloud adoption has given rise to the natural necessity to...

By Logicworks, 19 November 2013, 0 comments. Categories: Best Practice, Big Data, Infrastructure, Security.

Cloud-based security services growth to reach $3.1bn

Given the differences in market maturity, cultural acceptance and local IT infrastructures, considerable regional differences exist in the deployment rates of cloud-based security systems. They all play a part in the level of spending dedicated to this delivery model -- when compared with on-premises business technology deployments. Moreover, privacy remains an inhibitor in the deployment of all forms of cloud-based services by the late adopter market segment. In particular, it's a big issue in those regions and countries with strong...

By David H Deans, 07 November 2013, 1 comment. Categories: Big Data, Enterprise, Research, SaaS , Security.

Swisscom sets up “Swiss Cloud”...but it’s not in response to NSA

The Switzerland-based telco Swisscom is in the process of building a national “Swiss Cloud” – but denies claims that the primary motivation is around acquiring customers spooked by the NSA scandal.

The story first broke on Reuters, with the news agency reporting that the move is “driven more by a desire to cut costs and make its systems more dynamic”, according to Swisscom head of IT services Andreas...

By James Bourne, 04 November 2013, 0 comments. Categories: Big Data, Europe, IaaS, Industry, Security.

How to balance cloud security with agility in the healthcare vertical

Back in July, a study released from the Ponemon Institute cited cloud-based storage and mobile applications as the typical sources for cloud security concerns within many healthcare organizations.  However, it was not understood if this worry was around just the concept of cloud computing and mobile computing, or if these organizations are dealing with true issues.  I suspect it was the...

By Logicworks, 16 October 2013, 0 comments. Categories: Architecture, Economy, Infrastructure, Security.

Steve Wozniak: I am a fan of the cloud...but let’s not go all in yet

Exclusive Steve Wozniak says he’s “a fan” of the cloud, yet he’s still worried about what could happen if consumers and companies don’t back things up locally.

This may come as something of a surprise to the tech fraternity, for whom the general consensus was that Woz wasn’t too keen on cloud – to put it politely.

Last August, after a showing of the Mike Daisey monologue ‘The Agony and...

By James Bourne, 02 October 2013, 0 comments. Categories: Applications, Developers, Industry, Interview, Security.

Windows Azure cloud nails FedRAMP qualification, government work to rise

Microsoft has announced that its Windows Azure cloud infrastructure has been given the sought after FedRAMP accreditation for US federal cloud computing.

As the American government is trying to go ‘cloud first’, this represents an important milestone for Redmond – if perhaps a little late.

Back in June, competitors HP and Amazon announced that their clouds were secure after gaining federal...

By James Bourne, 01 October 2013, 0 comments. Categories: Government, IaaS, Microsoft, PaaS, Security.

Examining disaster recovery by the numbers [infographic]

Disaster recovery, or IT Business Continuity as we like to think of it, is a space that’s riddled with traps. Or at best, it suffers from a number of myths and tendencies toward “fingers crossed.” It’s not just about a fundamental difference between backup and disaster recovery; the idea that it’s one thing to have your data duplicated into a repository somewhere but quite another to be able to actually restore it — also downed applications and network configurations — rapidly…

Example 1: If you can’t test it, you don’t know it works

One can’t get serious about DR unless one acknowledges not just the criticality of testing, but also...

By nScaled, 26 September 2013, 0 comments. Categories: Architecture, Disaster Recovery, Infographic, Security.

Nirvanix shuts down, gives customers two weeks to move data

Enterprise-level cloud storage provider Nirvanix has unexpectedly announced it is shutting down effective September 30, with customers frantically searching for another place to store their data by then.

Several sources have reported the news, with the Wall Street Journal claiming that the storage provider had lost its latest round of funding, and had run out of money to continue operating.

The Twittersphere was varied as the community took the news in:

By James Bourne, 19 September 2013, 0 comments. Categories: Big Data, Disaster Recovery, Enterprise, Security, Storage.

New paper questions whether cloud consumers get what they pay for

Consumers need to be made more aware of what they’re purchasing in a cloud solution, according to the latest research paper.

The team of researchers, including IBM and Google, published their findings in a paper entitled ‘Verifying Cloud Services: Present and Future’, and aimed for this to be an education for cloud customers – punters need to examine “in breadth, rather in depth”, how a CSP performs.

The researchers put this down to a series of issues which need answering:...

By James Bourne, 18 September 2013, 0 comments. Categories: IaaS, Research, Security, SLA, Storage.

Is your critical data safe in the cloud?

For a rapidly growing network of companies with critical data, migrating to the cloud has moved from an idea to reality.

But while cloud services promise rich economic benefits, scalability and flexibility, they also can trigger significant perceived risks for companies that are highly concerned about security, data protection, reliability and availability.

Primarily, breaches of one’s data can  prove both devastating and costly, with any breaches sparking downtime that could lead to potential loss...

By Simon Withers, 17 September 2013, 0 comments. Categories: Big Data, Disaster Recovery, Industry, Security.

Before the breach: Cloud breach response best practices

One of the most difficult and damaging events that can occur for any business’ infrastructure is a breach. However, breaches occur when proper planning hasn’t gone into an infrastructure contingency plan.

There are several areas of consideration that need to be fully planned for before any IT strategy and data objectives can be balanced in the face of a potential breach: whether technical, HR, or compliance, have a response plan for each area is necessary before any problem ever arises.

In this...

By Logicworks, 13 September 2013, 0 comments. Categories: Architecture, Best Practice, Compliance, Disaster Recovery, Security.

CloudBees CEO Sacha Labourey on the strength of the PaaS market

It’s been a very good first half of the year for Java-based platform as a service (PaaS) provider CloudBees. The Belgium-based cloud company reported a revenue increase of 148% in the first two quarters of 2013, as well as a 135% increase in its customer base.

The news, which CEO Sacha Labourey describes as “definitely a great step for us”, could also be seen as more affirmation of the sharp rise in the PaaS market.

Almost every recent research paper you come across will mention it.

Market...

By James Bourne, 12 September 2013, 0 comments. Categories: Forecasts, Interview, PaaS, Public, Security.