Results for the tag,

 

Cloud Security

Cloud Security: Cloud computing security (sometimes referred to simply as "cloud security") is an evolving sub-domain of computer security, network security, and, more broadly, information security. It refers to a broad set of policies, technologies, and controls deployed to protect data, applications, and the associated infrastructure of cloud computing. Cloud security is not to be confused with security software offerings that are "cloud-based" (a.k.a. security-as-a-service). Many commercial software vendors have offerings such as cloud-based anti-virus or vulnerability management. (Source: Wikipedia)

Cloud Services - Mobile & Remote Working


Section: Research
  Cloud Services, which are IT Solutions and Services delivered and consumed real time over the Internet, have now become an integral part of daily operations for small and medium sized enterprises (SMEs).   The ‘workplace’ is no longer a fixed location - remote, mobile and flexible working is now co ...   read more

Unifying Data Encryption


Section: Research
With the growing emphasis on the need to protect sensitive data, encryption has become a focus of interest for organisations worldwide. Yet data encryption has long had its challenges in deployment. If you are responsible for the protection of sensitive information in a Linux environment and often find yourself wondering which way to turn when it comes to simple transparent and unified data encryption, this paper will interest you.
  read more

Cloud, Managed Hosting, Colo or In-house?


Section: Research
The decision to outsource or in-source data centre services is not one taken lightly. Just as organisations felt they had figured out what to outsource and what to keep in-house, cloud computing has fuelled renewed interest in outsourcing, resulting in enterprises reassessing their IT service sourcing strategies. This white paper provides some important considerations when deciding on data centre services and covers the following: < ...   read more

Cloud Computing in the Public Sector


Section: Research
Governments around the world have been looking at how best to reduce functional redundancy through the concept of "shared services” where different departments share a single source of function. This report looks at the promise and issues of cloud computing today in the Public Sector, along with the direction cloud needs to take in order to fulfil on its promise. The following topics are covered: -  The public sector in 2011 and beyond ...   read more

Finding the Right Cloud Solutions for your Organisation


Section: Research
If you manage technology today, you know the story: everything is mobile, connected, interactive, immediate, and fluid. Expectations are high. On any given day, it's all about service delivery. You need to provide technology-enabled services to your people whenever and wherever they need them-and you need to do it cost-effectively, securely, and quickly. This is one of the driving forces behind the rise in cloud computing. Cloud computing can provide new levels of collaboration, agility, ...   read more

Opportunities for the Cloud in the Enterprise


Section: Research
Cloud computing represents the next evolutionary step toward elastic IT.  It promises to transform the way your IT infrastructure is constituted and managed, through consumable services for infrastructure, platform, and applications. The big picture is to convert your IT infrastructure from a "factory” into a "supply chain”. But there are a number of concerns with adopting this model, most notably around maturity levels, security and compliance, performance and reliability, ...   read more

Securing the Cloud for the Enterprise


Section: Research
Clouds offer great promise in improving IT’s agility and flexibility to respond to the requirements of the business cost effectively. New security patterns and practices are emerging to address security challenges in the cloud-based environment. Governance, protection, visibility, and auditability are key elements to establishing confidence and trust in the cloud. These must be achieved in the increasingly scalable enterprise in a cost-effective fashion. read more

Adopting the Cloud: Addressing Management Concerns


Section: Articles
Members of management often have concerns when faced with the adoption of a cloud computing model for their business.  Many times this is the result of a lack of understanding of the cloud, and this can morph into active resistance if it is not addressed promptly and with facts that address those concerns.  Two central issues arise when most migrations to the cloud are being planned:  Financial considerations and security.  &nbs ...   read more

As cloud takes over, what is the role of the IT manager?


Section: Articles
The industrialisation of IT has long commenced. Legacy systems requiring manual management of IT structure have fallen to the wayside, one by one, as automated cloud computing systems have usurped the place of typical IT professionals and infrastructure managers. Unrest has shaken the industry since at least 2010, and the same advice has been issued over and over again, in varying tones. F ...   read more

Best of both worlds: Virtual privacy in the public cloud


Section: Articles
Enterprises looking for the benefits of cloud computing may be averse to the idea, out of concern over lack of control, compliance issues or security. Those with a transaction-based environment or which collect credit card information will be especially aware of the potential risks, no matter how remote they may be. The virtual private cloud option, a relatively new and almost unheard-of concept, often makes sense and is not as confusing as it sounds.     read more

Cloud Compliance: Is the Cloud Keeping your Data Private?


Section: Articles
Public cloud computing, convenient and cost-saving, has replaced the large, on-site server rooms usually relied upon by companies. Data once saved in server rooms is stored in data centres often far from the company site, managed by a cloud provider that secures and protects the data. But at what point can conveni ...   read more

Cloud computing risk factors, and the real and imaginary bogeymen that lurk in data centres


Section: Articles
Nearly every company, from one-person startups to FTSE 100 enterprises, either has an active cloud strategy or is at least considering one. The maturity of the technology and robustness of cloud data centre offerings has overcome most irrational fears of the cloud and the technology has earned its place in the canon of acceptable business practices. Excitement abounds over the prospect of lowered or nonexistent capital expenditure, the ability to roll out a p ...   read more

Cloud Security Management | Gartner


Section: Articles Video
Cloud computing combines new technology with unproven vendors and service providers, bringing both business benefits and potential risks. Security, reliability and manageability need to be key elements in the planning and selection processes for cloud services.  read more

Cloud Trends for 2013 and Beyond


Section: Articles
The cloud has settled in to stay. Since its first emergence, cloud has been both a curiosity and a concern for CIOs and IT professionals. Now that this modern computing system has swept the information industry, what will happen next?

read more


Do IT professionals still have their heads in the clouds?


Section: Articles
According to a Cloud.com survey of IT professionals, yes, they do. At this point in the evolution of the increasingly pervasive dotcloud boom, the discussion has changed from whether to move to the cloud, to how to implement the cloud. Among those CTOs surveyed, scalability, elasticity, and the need to accommodate fluct ...   read more

High Availability Cloud Computing


Section: Articles Video
Brian Gracely of The CloudCast Video Channel discusses the basics of High Availability for applications in both Public Cloud and Private Cloud environments. He discusses legacy applications, virtualized applications and new web-scale applications, along with the underlying infrastructure t  read more

Protecting Sensitive Data is Number One Security Priority


Section: Articles
With an explosion of data breaches in recent years, the protection of sensitive information has become a top priority for security organisations worldwide. According to the Privacy Rights Clearinghouse, more than 535 million records have been breached in 2,651 incidents made public since 2005.1 Attackers have targeted virtually the entire gamut of sensitive content, from personal financial account data to intellectual property and high-value information of concern to the most senior lev ...   read more

The Case for Virtual Data Centres


Section: Articles
In an Infrastructure-as-a-Service (IaaS) scenario,  the  cloud-based  service being provided will include virtual server space, network connections, bandwidth, IP addresses and load balancers. Physically the pool of hardware resource is pulled  from  a  multitude  of  servers  and  networks  usually distributed across numerous data centres, all of which the cloud provider is responsible for maintaining. Th ...   read more

The Cloud Computing Model – A Lifeline for Business in Challenging Times


Section: Articles
The language of IT backup, security, disaster preparedness and business continuity can be confusing. Having a network backup procedure in place doesn't necessarily mean you also have a disaster plan, and having a disaster plan doesn't mean you also have a business continuity plan. In short, the disaster plan outlines what to do when disaster strikes, the business continuity plan outlines how to keep things moving in the aftermath. As any CIO who has been through a fire, ...   read more

What's Holding Businesses Back From the Cloud?


Section: Articles
The typical internal IT infrastructure is mired in complexity; costly and cumbersome to manage; and the opposite of dynamic and agile. Any on-premise server that is not fully utilised represents a costly waste of resources. Extrapolate that across the entire company, and the inefficiencies are likely to assume staggering proportions. It is in this context that an organisation’s interest in cloud-based systems and services will typically originate. An overwhelm ...   read more

1 2 3 4 5