AT&T Announces New Cloud Capabilities

AT&T Announces New Cloud Capabilities

Communications giant AT&T is launching new cloud capabilities, new mobile applications for the cloud and increases third-party development and industry activity, the company said in a press release. The communications holding will continue its partnership with other leading companies in the cloud such as IBM and Vmware, the company added.

New features include an enhanced computing offer allowing customers to tie their cloud computing systems to AT&T’s network in an easier manner. The company’s enhanced storage offer includes features that help companies meet corporate governance and compliance requirements.

The company also releases a new mobile application offering extended cloud capabilities to users on the go who need to store and access content remotely in a highly-secure manner.

Cloud computing vendors and third party developers will be able to assemble capabilities based on the company’s networking technologies. Thus, business customers will be able to derive more benefits from AT&T cloud solutions.

The company also announced it participates in a working group with the Cloud Security Alliance to define cloud-based security-as-a-service offers.

With cloud-based solutions powered by AT&T’s global network, we can enable companies to become more efficient, more mobile, and more nimble while helping to control their costs,” John Stankey, President and CEO, AT&T Business Solutions, said in the press release.

Additionally, AT&T announced that IBM technology is being used in its new release of AT&T Synaptic Compute as a Service(SM). “We believe business caliber clouds need to run on a robust virtual private network and we see AT&T as offering one of the best business class VPN services,” Scott Stainken, general manager, IBM global telecommunications industry, commented in a press release.

Enhancements to AT&T Synaptic Compute as a Service solution include integration with AT&T’s VPN Service to enable virtual private clouds. Other features include an expanded number of operating system templates, improvements to firewall policies to meet special security requirements, and new self-service and self-provisioning capabilities.

The company also introduced new enhancements to its Synaptic Storage as a Service including long term data retention options to help meet corporate governance or compliance requirements and new data management and compression capabilities.

The new mobile application will allows users to reliably move data to and from AT&T Synaptic Storage as a Service using mobile devices. Mobile access to business information stored in the cloud such as documents or reference material which may be needed while on the go is implemented in the new application.

Third-party developers and vendors are allowed to assemble capabilities that can help business customers more easily, flexibly and more efficiently transport data to/from AT&T-based cloud solutions. Companies that participate in AT&T’s program include vendors like Cirtas, CommVault, Dolphin, EMC, Gladinet, Metalogix, Nasuni, Riverbed Technology, Seven10, StorSimple, and TwinStrata.

The company joined a working group with the Cloud Security Alliance to develop industry-wide definitions and categories of service for cloud-based Security-as-a-Service offers, AT&T said.

Although the company is considered a blue chip company its shares experienced significant fluctuations since the start of 2011. Recently, the company stock prices on the NYSE are going up and market analysts forecast even further growth based on new offerings and introduction of new technology solutions.

By Kiril Kirilov

Sorry, comments are closed for this post.

Comic
In The Fast Lane: Connected Car Hacking A Big Risk

In The Fast Lane: Connected Car Hacking A Big Risk

Connected Car Hacking Researchers and cybersecurity experts working hard to keep hackers out of the driver’s seat. Modern transportation has come a million miles, and most all of today’s vehicles are controlled entirely by digital technology. Millions of drivers are not aware that of the many devices in their digital arsenal, the most complex of…

Having Your Cybersecurity And Eating It Too

Having Your Cybersecurity And Eating It Too

The Catch 22 The very same year Marc Andreessen famously said that software was eating the world, the Chief Information Officer of the United States was announcing a major Cloud First goal. That was 2011. Five years later, as both the private and public sectors continue to adopt cloud-based software services, we’re interested in this…

Building a Data Security Strategy – More Important Than Ever

Building a Data Security Strategy – More Important Than Ever

Data Security Strategy Article sponsored by SAS Software and Big Data Forum Security and privacy have been an integral concern of the IT industry since its very inception, but as it expands through web-based, mobile, and cloud-based applications, access to data is magnified as are the threats of illicit penetration. As enterprises manage vast quantities…

Pitney Bowes Selects Aria Systems for Billing on the New Commerce Cloud

Pitney Bowes Selects Aria Systems for Billing on the New Commerce Cloud

Top-Ranked Cloud Billing Company Enables Greater Speed and Frictionless Billing for Unparalleled Customer Experience San Francisco, CA – August 23, 2016 – Aria Systems, which helps enterprises grow subscription and usage-based revenue, today announced that Pitney Bowes has selected Aria’s cloud-based monetization platform as the key billing and monetization component of their new Commerce Cloud…

The Golden Age of Wearable Technology

The Golden Age of Wearable Technology

The Golden Age One of the biggest fads in the technology sector right now is wearable tech. From Smartwatches that let you check your emails, chat with friends and search the web, to fitness accessories that monitor your heart rate and your sleep patterns, this is truly the Golden Age of wearable technology. But some…

The Age of Data: The Era of Homo Digitus

The Age of Data: The Era of Homo Digitus

The Age of Data In our digital era data deluge – soaring amounts of data, is an overriding feature. That’s why it’s fitting to focus on the concept of Homo Digitus, which I first learned about about in“The creative destruction of medicine: How the digital revolution will create better health care,” by Eric Topol, and…

Are Cloud Solutions Secure Enough Out-of-the-box?

Are Cloud Solutions Secure Enough Out-of-the-box?

Out-of-the-box Cloud Solutions Although people may argue that data is not safe in the Cloud because using cloud infrastructure requires trusting another party to look after mission critical data, cloud services actually are more secure than legacy systems. In fact, a recent study on the state of cloud security in the enterprise market revealed that…

Rounding Out Your Security Strategy With The Enterprise Cloud

Rounding Out Your Security Strategy With The Enterprise Cloud

Enterprise Cloud Security Strategy No company wants to be the one to have to announce one of the world’s biggest data breaches. From managing networks and datacenters to protecting hundreds of applications, today’s enterprises face enormous challenges. With all the surface area that needs to be tracked and protected including APIs on the front-end, customer integrations…

Connecting With Customers In The Cloud

Connecting With Customers In The Cloud

Customers in the Cloud Global enterprises in every industry are increasingly turning to cloud-based innovators like Salesforce, ServiceNow, WorkDay and Aria, to handle critical systems like billing, IT services, HCM and CRM. One need look no further than Salesforce’s and Amazon’s most recent earnings report, to see this indeed is not a passing fad, but…

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

There is a Difference – So Stop Comparing We are all familiar with the old saying “That’s like comparing apples to oranges” and though we learned this lesson during our early years we somehow seem to discount this idiom when discussing the Cloud. Specifically, IT buyers often feel justified when comparing the cost of a…

Cloud Computing Offers Key Benefits For Small, Medium Businesses

Cloud Computing Offers Key Benefits For Small, Medium Businesses

Cloud Computing Benefits A growing number of small and medium businesses in the United States rely on as a means of deploying mission-critical software products. Prior to the advent of cloud-based products — software solutions delivered over the Internet – companies were often forced to invest in servers and other products to run software and…

SaaS And The Cloud Are Still Going Strong

SaaS And The Cloud Are Still Going Strong

SaaS And The Cloud With the results of Cisco Global Could Index: 2013-2018 and Hosting and Cloud Study 2014, predictions for the future of cloud computing are notable. Forbes reported that spending on infrastructure-related services has increased as public cloud computing uptake spreads, and reflected on Gartner’s Public Cloud Services Forecast. The public cloud service…

Five Cloud Questions Every CIO Needs To Know How To Answer

Five Cloud Questions Every CIO Needs To Know How To Answer

The Hot Seat Five cloud questions every CIO needs to know how to answer The cloud is a powerful thing, but here in the CloudTweaks community, we already know that. The challenge we have is validating the value it brings to today’s enterprise. Below, let’s review five questions we need to be ready to address…

Using Big Data To Analyze Venture Capitalists’ Ability To Recognize Potential

Using Big Data To Analyze Venture Capitalists’ Ability To Recognize Potential

Big Data To Analyze Using Big Data to Analyze Venture Capitalists’ Ability To Recognize Potential For those who are regularly involved with SMEs, venture capital, and company valuations, it is common knowledge that start-ups that exit for more than $1 billion dollars are extremely rare – often termed ‘unicorn’ companies. Despite their rarity, it should…

7 Common Cloud Security Missteps

7 Common Cloud Security Missteps

Cloud Security Missteps Cloud computing remains shrouded in mystery for the average American. The most common sentiment is, “It’s not secure.” Few realize how many cloud applications they access every day: Facebook, Gmail, Uber, Evernote, Venmo, and the list goes on and on… People flock to cloud services for convenient solutions to everyday tasks. They…

What Top SaaS Vendors Do To Ensure Successful Onboarding

What Top SaaS Vendors Do To Ensure Successful Onboarding

What Top SaaS Vendors Do I am not going to mention names in this article, but if you want to be the best, you must look at what the best do – and do it better. The importance of investing in SaaS onboarding can be easily overlooked in favor of designing efficient and powerful software…