AT&T Announces New Cloud Capabilities

AT&T Announces New Cloud Capabilities

Communications giant AT&T is launching new cloud capabilities, new mobile applications for the cloud and increases third-party development and industry activity, the company said in a press release. The communications holding will continue its partnership with other leading companies in the cloud such as IBM and Vmware, the company added.

New features include an enhanced computing offer allowing customers to tie their cloud computing systems to AT&T’s network in an easier manner. The company’s enhanced storage offer includes features that help companies meet corporate governance and compliance requirements.

The company also releases a new mobile application offering extended cloud capabilities to users on the go who need to store and access content remotely in a highly-secure manner.

Cloud computing vendors and third party developers will be able to assemble capabilities based on the company’s networking technologies. Thus, business customers will be able to derive more benefits from AT&T cloud solutions.

The company also announced it participates in a working group with the Cloud Security Alliance to define cloud-based security-as-a-service offers.

With cloud-based solutions powered by AT&T’s global network, we can enable companies to become more efficient, more mobile, and more nimble while helping to control their costs,” John Stankey, President and CEO, AT&T Business Solutions, said in the press release.

Additionally, AT&T announced that IBM technology is being used in its new release of AT&T Synaptic Compute as a Service(SM). “We believe business caliber clouds need to run on a robust virtual private network and we see AT&T as offering one of the best business class VPN services,” Scott Stainken, general manager, IBM global telecommunications industry, commented in a press release.

Enhancements to AT&T Synaptic Compute as a Service solution include integration with AT&T’s VPN Service to enable virtual private clouds. Other features include an expanded number of operating system templates, improvements to firewall policies to meet special security requirements, and new self-service and self-provisioning capabilities.

The company also introduced new enhancements to its Synaptic Storage as a Service including long term data retention options to help meet corporate governance or compliance requirements and new data management and compression capabilities.

The new mobile application will allows users to reliably move data to and from AT&T Synaptic Storage as a Service using mobile devices. Mobile access to business information stored in the cloud such as documents or reference material which may be needed while on the go is implemented in the new application.

Third-party developers and vendors are allowed to assemble capabilities that can help business customers more easily, flexibly and more efficiently transport data to/from AT&T-based cloud solutions. Companies that participate in AT&T’s program include vendors like Cirtas, CommVault, Dolphin, EMC, Gladinet, Metalogix, Nasuni, Riverbed Technology, Seven10, StorSimple, and TwinStrata.

The company joined a working group with the Cloud Security Alliance to develop industry-wide definitions and categories of service for cloud-based Security-as-a-Service offers, AT&T said.

Although the company is considered a blue chip company its shares experienced significant fluctuations since the start of 2011. Recently, the company stock prices on the NYSE are going up and market analysts forecast even further growth based on new offerings and introduction of new technology solutions.

By Kiril Kirilov

Sorry, comments are closed for this post.

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Cloud Email Migration In today’s litigious society, preserving your company’s data is a must if you (and your legal team) want to avoid hefty fines for data spoliation. But what about when you move to the cloud? Of course, you’ve probably thought of this already. You’ll have a migration strategy in place and you’ll carefully…

5 Things To Consider About Your Next Enterprise Sharing Solution

5 Things To Consider About Your Next Enterprise Sharing Solution

Enterprise File Sharing Solution Businesses have varying file sharing needs. Large, multi-regional businesses need to synchronize folders across a large number of sites, whereas small businesses may only need to support a handful of users in a single site. Construction or advertising firms require sharing and collaboration with very large (several Gigabytes) files. Financial services…

Using Private Cloud Architecture For Multi-Tier Applications

Using Private Cloud Architecture For Multi-Tier Applications

Cloud Architecture These days, Multi-Tier Applications are the norm. From SharePoint’s front-end/back-end configuration, to LAMP-based websites using multiple servers to handle different functions, a multitude of apps require public and private-facing components to work in tandem. Placing these apps in entirely public-facing platforms and networks simplifies the process, but at the cost of security vulnerabilities. Locating everything…

3 Keys To Keeping Your Online Data Accessible

3 Keys To Keeping Your Online Data Accessible

Online Data Data storage is often a real headache for businesses. Additionally, the shift to the cloud in response to storage challenges has caused security teams to struggle to reorient, leaving 49 percent of organizations doubting their experts’ ability to adapt. Even so, decision makers should not put off moving from old legacy systems to…

How The CFAA Ruling Affects Individuals And Password-Sharing

How The CFAA Ruling Affects Individuals And Password-Sharing

Individuals and Password-Sharing With the 1980s came the explosion of computing. In 1980, the Commodore ushered in the advent of home computing. Time magazine declared 1982 was “The Year of the Computer.” By 1983, there were an estimated 10 million personal computers in the United States alone. As soon as computers became popular, the federal government…

Disaster Recovery – A Thing Of The Past!

Disaster Recovery – A Thing Of The Past!

Disaster Recovery  Ok, ok – I understand most of you are saying disaster recovery (DR) is still a critical aspect of running any type of operations. After all – we need to secure our future operations in case of disaster. Sure – that is still the case but things are changing – fast. There are…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

There is a Difference – So Stop Comparing We are all familiar with the old saying “That’s like comparing apples to oranges” and though we learned this lesson during our early years we somehow seem to discount this idiom when discussing the Cloud. Specifically, IT buyers often feel justified when comparing the cost of a…

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Once upon a time, only a select few companies like Google and Salesforce possessed the knowledge and expertise to operate efficient cloud infrastructure and applications. Organizations patronizing those companies benefitted with apps that offered new benefits in flexibility, scalability and cost effectiveness. These days, the sharp division between cloud and on-premises infrastructure…