Symantec survey examines increase in “rogue clouds”

A new research report from Symantec has warned against the use of ‘rogue’ clouds for best practice.

The survey, entitled ‘Avoiding the Hidden Costs of Cloud’, spoke to IT execs at 3,236 organisations across nearly 30 countries worldwide and found that there was a link between using rogue clouds and losing confidential information, resulting in hidden costs.

A rogue cloud is one which is...

By James Bourne, 21 January 2013, 0 comments. Categories: Enterprise, Research, Security.

Is cloud computing ready for prime time?

By John Dixon, Senior Solutions Architect

A few weeks ago, I took part in another engaging tweetchat on cloud computing. The topic: is cloud computing ready for enterprise adoption? You can find the transcript here.

As usual with tweetchats hosted by CloudCommons, five questions are presented a few days in advance of the event. This time around, the questions were:

  • Is public cloud mature enough for enterprise adoption?
  • Should public cloud be a part of every...
  • By GreenPages Technology Solutions, 10 January 2013, 0 comments. Categories: Enterprise, Public, Security, Virtualisation.

    5 cloud server security tips for 2013

    5-Tips-Circle-LargeIf you’re like most, cloud is going to be a big part of your life in 2013. So to help you start the year off right, we’ve prepared the following tips for securing your cloud servers. Here are your 5 cloud security tips for 2013 (in no particular order): Tip #1: Lock down the server firewall Big surprise – a firewall management service provider telling you to lockdown the firewall, but putting aside the...

    By Dome9, 09 January 2013, 0 comments. Categories: Best Practice, Security.

    Amazon Web Services starts to assert itself

    By Laurent Lachal, Senior Analyst, Ovum SoftwareAt the end of November 2012, Amazon Web Services (AWS) held its first partner and customer conference in Las Vegas. Dubbed AWS “re: Invent”, the event was a success. It enabled AWS to assert itself as a large and influential player in the IT marketplace. However, as well as AWS’s strengths, it also highlighted some of its traditional weaknesses. These include poor communications and an inability to put forward messages adapted to the needs of enterprise executives.

    A...

    By Ovum StraightTalk, 08 January 2013, 0 comments. Categories: Enterprise, IaaS, Security.

    How cloud security balances risk versus reward

    riskrewardI spend a great deal of my day thinking about security. How it affects the enterprise; how to best position and protect assets. How it shapes risk management and how it delivers potential benefits through smoother operations, enhanced trust and loss prevention.

    At its core, security is...

    By Cloud Security, 04 January 2013, 0 comments. Categories: Security.

    What are the roadblocks to a worldwide cloud security standard?

    The cloud storage phenomenon has resulted in a widely used platform used by both companies and individuals as an easy means to store their data. However, as is typical with new technology, the security has fallen behind and left many users vulnerable to intrusions on their privacy that could result in data loss and theft. This problem is due in large part to the factors that make cloud security difficult. (At Virtual Internet an intense effort has been made to use the latest technology and standards (including ISO 9001 and 27001 certification) to safeguard and...

    By VI, 03 January 2013, 0 comments. Categories: Security, Storage.

    Demystifying the cloud security hype

    You’re already using it

    You may already be familiar with the term ‘Real Time Protection’, which could just as easily be labeled ‘Cloud Protection’. Simply put, when a vendor’s research team identifies a new email threat, the characteristics of the message are sent to all affected hardware appliances straightaway, so that the malicious content is immediately blocked. This all happens far ahead of the regular update by on-premise virus signatures.

    Because they are outsourced,...

    By Wieland Alge, 21 December 2012, 0 comments. Categories: Security.

    One in three mission critical apps currently in the cloud, says survey

    Research from identity management provider SailPoint has revealed that US and UK based IT leaders see one in three mission critical apps as currently in the cloud, with that figure rising sharply by 2015.

    The Market Pulse Survey of 400 IT and business leaders, which defined ‘mission critical’ as apps mainly focused on storage, file-sharing and communications, forecast that the number is expected to grow to one in two in three years.

    The figures differed slightly dependent on which side of the...

    By James Bourne, 12 December 2012, 0 comments. Categories: Applications, Research, Security.

    When encryption doesn’t mean more secure

    By Ken Smith

    I have had a number of clients reach out to me about how to implement whole disk encryption, SQL transparent data encryption, and encryption of VMware VMDK files in order to satisfy “data at rest” security requirements. My response is usually something like “Say that again?”

    These types of encryption approaches are designed to better protect data at rest on media that may be accessible to individuals who are not authorized to access such data. This is usually some form of...

    By GreenPages Technology Solutions, 12 December 2012, 0 comments. Categories: Security.

    Study shows differences between cloud users and non-users

    A cornerstone study into cloud computing in the UK has revealed the key difference in opinion between cloud users and non-cloud users.

    The study, from Raconteur Media and written by Mike O’Driscoll entitled ‘Navigating the Cloud’, had a relatively small survey base – just under 250 completed at least part of the survey – but of that number, there was a lot of clout – 84% saw themselves as the key IT decision maker.

    Again, software as a service (SaaS) proved itself to be the...

    By James Bourne, 23 November 2012, 1 comment. Categories: PaaS, Research, SaaS , Security.

    Preventing data leakage: Proactive security from the cloud

    In business, data is currency. It is the oil that keeps the commercial engine in motion and databases are the digital banks that store and retrieve this valuable information. And, according to IDC, data is doubling every two years. But as the overall amount of data grows, so does the amount of sensitive and regulated data. All this data...

    By Cloud Security, 15 November 2012, 0 comments. Categories: Big Data, Security.

    SaaS “continues to be entryway” for cloud platforms, says Symform

    Recent research from Symform has shown that software-as-a-service (SaaS) continues to be the most mature cloud market, but platform-as-a-service (PaaS) is lacking by comparison.

    The survey of over 500 respondents showed that nearly four in five (79%) companies surveyed in the cloud were using SaaS, yet nearly half (48%) of companies in the cloud were not planning on utilising PaaS at any time during the next 12 months.

    This correlates with

    By James Bourne, 12 November 2012, 1 comment. Categories: PaaS, Research, SaaS , Security.

    Challenges of data privacy in the era of cloud computing

    More than eight in ten companies are now using some form of cloud computing solution; proof that the benefits of the cloud are becoming more widely accepted amongst enterprises.

    Moreover, positive steps are being made toward further boosting cloud services in the EU.

    In September, Neelie Kroes, Europe's Commissioner for the Digital Agenda, released the paper, "

    By Mark Dunleavy, 06 November 2012, 1 comment. Categories: Big Data, Enterprise, Europe, Security.

    Stratsec research reveals potential alarm for cloud security

    A new piece of research from security providers Stratsec has inferred that some cloud providers are unable to block malicious attacks, which could lead to cyber hackers being able to infiltrate systems in a botnet-styled attack.

    As a result, according to the research at the Stratsec Winter School, there was an alarming number of reasons why attacking cloud systems was a good idea, such as being relatively easy to set up, costing less, and taking significantly less time to build.

    Instead of a traditional...

    By James Bourne, 31 October 2012, 0 comments. Categories: Adoption, Migration, Security.