What are the best practices for cloud governance within healthcare?

When you think of cloud computing in the healthcare vertical, you also have to think of security and governance.  Indeed, the need to control and secure healthcare data in the cloud is a big issue, and thus cloud governance is critical.

On the whole, cloud computing needs governance to succeed.  If you think about it, at the end state of the cloud computing implementation, we’ll have thousands of services and data elements under management.  To control how they are accessed, added,...

By Logicworks, 04 September 2013, 0 comments. Categories: Industry, Infrastructure, Security.

Cloud networking on the rise, but can NaaS gain traction?

More than two in five (45%) of respondents to a Spiceworks survey admit they are using cloud networking tools in their business, or are going to push forward with it within 12 months.

The survey results, of 500 IT professionals, were collected in a report entitled “The Cloudification of the Network”, produced in association with cloudy networking solutions provider Pertino.

Of course, the more cynical and world-weary CloudTech readers will have worked out the message in this survey given...

By James Bourne, 28 August 2013, 0 comments. Categories: Disaster Recovery, IaaS, Monitoring, Research, Security.

Why the public cloud is not always the most secure option for your business

Public Cloud Security Issues

– Brought to you by the 2X Cloud Computing Team –

The obvious benefits offered by cloud computing technology have not only made it inevitable, but also irresistible for business to embrace this ever-innovating technology. While scalability and agility improve business productivity levels, optimization of resources decreases Capex and Opex. However, choosing the right cloud model for your business requirements is a tough task. Businesses...

By 2X Software, 28 August 2013, 0 comments. Categories: Compliance, Public, Security.

Opinion on cloud services in Europe still fiercely divided

Research from Quocirca in conjunction with CA Technologies has revealed that opinion on cloud services in Europe is still fiercely divided.

The Quocirca report divides respondents into three potential categories; ‘enthusiasts’, ‘avoiders’ and ‘blockers’, and found that overall 57% of those polled were ‘cloud positive’.

In Europe, 22% were considered enthusiasts, for whom “cloud is the future for much of [their] IT requirement”, whilst a further 35%...

By James Bourne, 09 August 2013, 2 comments. Categories: Adoption, Big Data, Migration, Security.

US cloud industry set to lose up to $35bn because of PRISM

According to a report from the Information Technology and Innovation Foundation (ITIF), the repercussions of PRISM means that, over the next three years, the US cloud computing industry can lose from $22bn to $35bn due to reneged market share.

Anyone hoping this is a brand new piece of research may be slightly disappointed, although they’re not entirely wrong either.

Last month, CloudTech reported on a survey from the Cloud...

By James Bourne, 07 August 2013, 1 comment. Categories: Compliance, Industry, Security, Vendors.

CSA warns PRISM is very bad news for US cloud providers

The after-effects of PRISM means that companies are much less likely to use US-based cloud service providers (CSPs), according to a survey from the Cloud Security Alliance.

56% were less likely to use US-based providers, with one in 10 going as far to say that they’d cancelled a project which used US CSPs as a result. Only 3%, interestingly, said their confidence in US vendors had increased.

It’s noticeable that, from the vendors’ perspective, their confidence had not been diminished. 64%...

By James Bourne, 25 July 2013, 2 comments. Categories: Government, Hacking, Regulation, Research, Security.

New Zealand updates cloud policy, follows in Australia’s footsteps

As all eyes were on Australia in the Asia Pacific cloud computing space, New Zealand has taken a similar leap through the Institute of IT Professionals NZ (IITP) and published an updated cloud policy, called the Cloud Code.

The v2.0, released today, has two key agreements for all potential signatories: no cloud washing, and upfront disclosure of cloud products and services.

New Zealand’s cloudy code of practice was first developed in 2011, in partnership with the major CSPs, so it could be argued that...

By James Bourne, 24 July 2013, 0 comments. Categories: Best Practice, Regulation, Security, SLA, Vendors.

Mitigating the data exposure risk of cloud-based email

Of the concerns people have about cloud security today, data control and data loss rank high—just second behind BYOD according to Infonetic’s April 2013 report. No wonder the market for cloud-based security services is growing at 69%.

Despite the popularity of texting and social networking, email remains the preferred method of communication in the enterprise, transporting not only the data within the messages themselves but via the attachments they carry with them.

While most large enterprises...

By Glen Vondrick, 23 July 2013, 1 comment. Categories: Big Data, Enterprise, Hybrid, Security.

How effective identity management reins shadow IT and password sprawl

By Quinton Wall, Director of Technical Platform Marketing, Salesforce.com - @quintonwall

The cloud has sped up and simplified many aspects of IT. Enterprises and end-users alike have incredibly swift and affordable access to more applications and IT resources than ever before.

This access helps cut or keep costs low and enables businesses to innovate and respond to evolving market demands. However, in other ways,...

By Salesforce.com, 22 July 2013, 0 comments. Categories: Applications, Big Data, Enterprise, IaaS, Mobility, Salesforce, Security.

Should your private cloud use a single or a dual firewall?

Should Your Private Cloud Use a Single or a Dual Firewall?

– Brought to you by 2X Cloud Computing guest blogger Brien M. Posey –

Many private clouds are constructed in a way that allows clients to connect either locally or from the Internet. In the case of Internet connectivity, the Web Portal and Secure Client Gateway components that are used to facilitate the connection are almost always located behind a perimeter firewall. While the need for an Internet...

By 2X Software, 12 July 2013, 0 comments. Categories: Hacking, Private, Security.

Boxee removes cloud DVR after Samsung acquisition

Boxee, the Israel-based media streaming provider, has been bought out by Samsung Electronics – and has immediately announced the removal of its cloud-based digital video recorder (DVR) software.

The bad news for Boxee customers is that the switch off for the cloud DVR comes on July 10, with all recordings being wiped after that date. Expect many Boxee viewers to be bleary-eyed for work in the coming days having ploughed through the recordings they still have.

“We believe that over the next few...

By James Bourne, 08 July 2013, 0 comments. Categories: Security, Storage.

Cloud being “smothered” by CIO IT concerns, claims new report

As cloud computing continues to materialise and mature in the fabric of today’s IT, one of the primary barriers to widespread adoption is the high proportion of legacy ICT in many companies.

That’s according to the latest survey, this time from NTT Europe polling 300 CIOs and IT decision makers on current trends, barriers and solutions.

56% of those surveyed cited the complexity of their IT layout as the biggest barrier to large scale cloud adoption, with the figure rising to 70% in the public...

By James Bourne, 02 July 2013, 0 comments. Categories: CIO, Migration, PublicSector, Research, Security.

IBM’s Big Data and Analytics portfolio needs more tailoring for life sciences

Andrew Brosnan, Senior Analyst, Health SciencesAt its recent Big Data and Analytics Analyst Insights Summit in Toronto, IBM laid out its portfolio of technologies and services specifically for business analytics. The portfolio is a robust and comprehensive offering, encompassing all types of analytics, with specific tools and technologies across the “stack” for organizations of all sizes.The phrase “easy, fast, and smart” was a recurring theme throughout the event, highlighting IBM’s...

By Ovum StraightTalk, 02 July 2013, 0 comments. Categories: Big Data, Data & Analytics, Security.

‘MegaWiped’ – Kim Dotcom’s Megaupload data cleared

The now almost household name, Kim Dotcom, has been in consistent battle against the U.S government over his Megaupload business – in case you’ve been under a rock for over a year.

Now the case has taken a new turn as his old Dutch hosting provider LeaseWeb has wiped 600 servers containing “petabytes” of his company’s data; including legal evidence.

Kim has expressed his...

By Ryan Daws, 20 June 2013, 0 comments. Categories: Big Data, Consumer, Government, Industry, Security.

Identity as a service (IDaaS) is more important than ever

Conspiracy theorists and other concerned citizens will insist the government is watching every keystroke, keeping a record of every website, transaction, text and email. Shades of 1984’s Big Brother, right? These last few weeks, the news has been brimming with revelations of data surveillance and monitoring by the government (not to mention data harvesting corporations like Google, Yahoo, Facebook etc…). Everyone is sensitive as to what is being looked at, stored, and analyzed for hazily defined purposes. Privacy is no longer as private as you...

By Cloud Security, 17 June 2013, 0 comments. Categories: Applications, ERP, Security.

97% of SMBs say security positively impacted by cloud adoption

Over 95% of respondents in a comScore survey of French SMBs said cloud adoption had a positive impact on security, as well as noticing unexpected benefits, such as up-to-date systems and antivirus protection.

The study of French small to midsize businesses with between 25 and 499 PCs was conducted by comScore and commissioned by Microsoft Trustworthy Computing, although the respondents were made unaware of Microsoft’s involvement.

88% of those polled said they had noticed improved uptime as a result of...

By James Bourne, 13 June 2013, 3 comments. Categories: Adoption, Migration, Research, Security.

Did the US just give a big stimulus towards local European cloud activities?

Unless you have been under a rock for the last week it was impossible not to notice the uproar regarding the Guardian’s story on alleged information collection , allegedly called PRISM that -again allegedly- involved several major cloud service providers. The most detailed and nuanced piece so far – but it is only Sunday when I am writing this – is

By Gregor Petri, 12 June 2013, 0 comments. Categories: Europe, Security, Vendors.

HP and Amazon clouds certified secure after nailing FedRAMP qualification

HP Enterprise Services has become the latest CSP (cloud service provider) to announce it has passed Federal Risk and Authorization Management Program (FedRAMP) protocols to get the official US government cloud security stamp.

Amazon, as you’d probably expect, announced its FedRAMP seal of approval last week.  So what’s that stomping sound you’re hearing? It’s all the public cloud competition rushing to catch...

By James Bourne, 11 June 2013, 0 comments. Categories: Government, IaaS, Public, Security.

Latest cloud computing report shows benefits exceed expectations

A report from CA Technologies, entitled ‘Cloud Succeeds. Now What?’ has revealed that, for many companies polled, their cloud solutions have been more successful than they were expecting.

The train of thought here, of course, has to wonder what those expectations were, especially in a week where service level agreements (SLAs) are at the forefront following 100% SLA provider Mimecast’s outage.

Yet for companies experienced with...

By James Bourne, 24 May 2013, 1 comment. Categories: Adoption, Architecture, Research, Security.