Helping clients manage their technology for over 30 years.

Cloud Computing best practice: 4 security must-dos

Cloud on blue background with a lock in front. To illustrate Cloud Managed Services and Security services from Quest.

Your Cloud provider isn’t the only one with responsibility for the security of the information and applications your enterprise depends on. When it comes to security in the Cloud, it’s a collaboration between provider and customer.

After all, there are limits to a Cloud provider’s reach. For instance, if your employees use compromised web browsers to access data in the Cloud, your provider cannot be blamed.

Continue reading

Cloud Computing best practice: Evaluate Cloud provider security with these 7 questions

Person writing on glass the words good, better, best. The word best is circled.

Unless you’re an expert in security issues, doing proper Cloud provider due diligence can be daunting. Yet it’s essential, given the importance of your business’s data and applications.

So I offer seven questions for you to ask of every Cloud provider you’re considering. Pay attention to the answers you get and don’t hesitate to demand drilldown details. Remember: You’re contemplating putting at least some of the data and apps your business relies on into this provider’s Cloud environment.
Continue reading

DaaS vs. VDI — Is This the Right Question?

Deciding between two doors

Which is the better solution — DaaS or VDI?

Each camp promotes its approach and dismisses the other while analysts argue about which one will “prevail.” Yet these technology debates do little more than distract you from finding the best solution for your organization.

So pull your eyes from those tech specs and focus on these six questions:
Continue reading

Do your Cloud provider due diligence

Checklist with a cloud on it.

Whether or not we give it much explicit thought, we all do at least some due diligence every time we buy something.

When it comes to Cloud services, due diligence ought to be done explicitly and with forethought — because getting out from under a bad Cloud choice can be onerous. It’s worth your while to choose well in the first place.

Continue reading

Cloud Computing best practice: Conduct a Cloud feasibility assessment

guy holding a piece of paper with a cloud and servers on it.

Not all IT activities are right for Cloud computing. What’s more, you may not have the basic elements you need (such as a sufficiently robust network environment) for Cloud computing. And the last thing you need is to learn those uncomfortable truths after you’ve committed to a Cloud project.

This is why conducting a Cloud feasibility assessment is so important. And unless you have Cloud computing expertise on staff, don’t try to do it alone.

Continue reading

The Disruption Dirty Dozen: Asking the hard DR questions

Register button for Master Your Disaster

Regardless of their cause(s), your ability to minimize business disruptions depends on planning that’s based on a granular understanding of the risks posed to your business processes.

This planning begins with understanding who your key stakeholders are, how your organization conducts business, and what sorts of disruptions are likeliest at your locations (note that recent studies indicate power failures, hardware failures, and network failures account for more than 80% of IT-related disruptions).

Continue reading

When was the last time you reviewed your DR plan?

Data Availability Graph small

Last year, disasters in the United States caused more than $60 billion in damage. And the future promises plenty more of the same, says a recent report from Swiss reinsurer Munich Re — especially in North America, where weather-related loss events have quintupled in the last 30 years.

Now add in concerns about inadequate backup of the data on employees’ smartphones and tablets, wayward virtual machines, cyberattacks and other security incidents …

The challenge: Protect your essential business resources
It all makes now a good time to take another look at your company’s business continuity/disaster recovery plan, which ought to be reviewed and updated at least annually to keep your risk assessment current.

Continue reading

Cloud Computing best practice: Understand available Cloud capabilities

Various cloud icons - cloud in center surrounded by monitors, laptops, etc

I’ve posted before about Cloud computing best practices, and I’m doing it again now (and for the next several posts) for a couple of reasons:

  1. Cloud computing continues to (quickly) evolve, and while some Cloud best practices stay more or less constant, others must be adapted to keep pace,
  2. Cloud success depends on adhering to best practices — so there’s no such thing as talking too much about them or the order in which they should be applied.

Continue reading

Why IT environments managed by service providers are more secure

Cloud with a lock and key to illustrate Cloud Security by Service Providers

For a while now, those of us who provide Cloud services have been saying that a properly run Cloud environment is inherently more secure than traditional on-premise IT environments.

Now a recent study from Alert Logic backs up that claim. The study compared security in traditional on-premise and service-provider-managed environments of 1,500 organizations with active investment in IT security.

Continue reading

Details, details: A look at the hybrid Cloud SLA

Hybrid Cloud Computing

Reading a service-level agreement (SLA) may be as exciting as watching paint dry — but when it comes to creating a hybrid that fits your organization and truly meets its needs, bringing your full attention to your SLA can make all the difference.

So here’s my version of Hybrid Cloud101:

Expect to customize your hybrid cloud SLA. The whole point of a private cloud is to design and customize cloud capabilities to address your unique needs, and you need a Cloud services provider willing and able to do that in ways that precisely reflect your business requirements so you can achieve the flexibility, scalability, cost reductions, efficiencies, redundancy, and disaster recovery protections you need — without overspending on overcapacity.

Continue reading