Helping clients manage their technology for over 30 years.

Why IT environments managed by service providers are more secure

Cloud with a lock and key to illustrate Cloud Security by Service Providers

For a while now, those of us who provide Cloud services have been saying that a properly run Cloud environment is inherently more secure than traditional on-premise IT environments.

Now a recent study from Alert Logic backs up that claim. The study compared security in traditional on-premise and service-provider-managed environments of 1,500 organizations with active investment in IT security.

Continue reading

Details, details: A look at the hybrid Cloud SLA

Hybrid Cloud Computing

Reading a service-level agreement (SLA) may be as exciting as watching paint dry — but when it comes to creating a hybrid that fits your organization and truly meets its needs, bringing your full attention to your SLA can make all the difference.

So here’s my version of Hybrid Cloud101:

Expect to customize your hybrid cloud SLA. The whole point of a private cloud is to design and customize cloud capabilities to address your unique needs, and you need a Cloud services provider willing and able to do that in ways that precisely reflect your business requirements so you can achieve the flexibility, scalability, cost reductions, efficiencies, redundancy, and disaster recovery protections you need — without overspending on overcapacity.

Continue reading

4 reasons for the hybrid Cloud of your dreams

Cloud computing written on a chalkboard

As you spend more and more time using Cloud-delivered services, applications, and data, odds are you’ll end up interested in a hybrid Cloud environment that can be deployed in ways that quite specifically meet your organization’s needs, both business-wise and budget-wise.

If your experience has been limited to public Clouds, you’ll need to tread carefully into the realm of hybrids because, by definition, hybrid Clouds are customized. Very quickly, you’ll come to understand that the success of your hybrid Cloud greatly depends on its customizer.

Continue reading

Hybrid Cloud rising

In a recent post, I focused on market research about the use of Cloud computing, notably the eager and stunningly widespread embrace of SaaS and PaaS.

This time, I want to take a look at another key Cloud computing trend— the rise of hybrid Cloud computing. The North Bridge Venture Partners’ 2012 report reinforces this:

NIST graph of projected cloud computing breakdown from 2012 - 2017

Continue reading

How safe are your apps?

Key icon to represent security

A recent report by Forrester Consulting suggests your web applications may be far more vulnerable than you think. According to Forrester, 51% of the 240 North American and European companies surveyed experienced at least one application security incident since the beginning of 2011. And 18% of those suffered losses of at least $500,000. For 8% of those surveyed, losses topped $1 million.

Continue reading

What is the role of security in application development?

Unlock the Keys to Application Development

The majority of developers are not security experts, and secure coding is historically not identified as a priority. Oftentimes, the arduous task of vulnerability identification and remediation cannot be successfully addressed by limited IT security resources.

Look for an app development services provider who offers a time-saving solution for all types of security testing — outsourced, individual, and enterprise-wide analysis — and for all types of users, including application developers, build managers, Quality Assurance (QA) teams, penetration testers, security auditors, and senior management.

Continue reading

The Dangers Confronting Data in Motion

visual depiction of data files flowing through a desktop computer

Last time, I looked at some of the security issues related to employee mobility, which focused mainly on devices like smartphones and tablets and how people use them.

But smartphones and tablets aren’t the only mobile devices business leaders need to worry about. Consider:

  • USB malware is gaining momentum — so flash drives and other USB-connected devices can become malware vectors.
  • Hackable RFID and radio frequency channels create voicemail vulnerabilities and enable call interception.
  • RAM scraping exploits moments when sensitive encrypted data is unencrypted in browsers, smartphones, point-of-sale system memory, etc.

Continue reading

The Dark Side of Employee Mobility

Closeup of woman entering information on her mobile phone.

Late last year, market researcher IDC reported that by 2015 more U.S. Internet users will access the Internet through mobile devices than through PCs or other wireline devices. Judging by the eager embrace of smartphone and tablets since then, I’d guess their prediction may be conservative.

And unquestionably, this kind of mobility in business is a game-changer both in terms of how we do business and how we do information security.

Continue reading

Security in the cloud: What you need to know

Cloud icon with a lock to represent Cloud computing security

Cloud computing gets immense attention these days as a profound agent of change affecting how IT serves the business. In particular, Cloud computing has begun the untethering of employees from their desks and their offices. Because the mobility of today’s, and tomorrow’s workforce cannot happen without the Cloud.

Yet worries about Cloud security abound, and for good reason: Cloud computing that involves processing sensitive or regulated data in shared environments needs extra scrutiny in terms of security (as well as codifying requirements, defining a cloud services contract, managing the transition from in-house to cloud, and overseeing the resulting mixed IT environment).

Continue reading

Securing your virtual environment

Securing Virtual Cloud Environment

Odds are your IT environment is somehow engaged in virtualization — either directly in your data center or indirectly via the service providers you’ve engaged.

But how much have you — or your IT people — thought about virtualization security? This matters more than you may think. One Gartner analyst has estimated that 60% of virtualized servers will be less secure than the physical servers they’ve replaced.

Continue reading