When the Cloud Goes Dark…

The demand for cloud computing is an undeniable, unavoidable trend in business IT. Business managers are hearing all about the benefits of the extensible, flexible and scalable features that the cloud offers. This puts pressure on the IT team to pull together some sort of cloud solution for the organization. However, without a clear set of benchmarks, a defined scope and a thorough assessment of needs and resources, building a cloud quickly turns into a stormy nightmare.

Chuck Hollis of EMC recounts the story of what he saw at a large financial institution in a recent post on his blog. The IT team called him in as an EMC rep to gather more information on EMC products, as they were interested in possibly using them for their pieced-together cloud environment. But when Chuck began asking questions about the project and how it was going, he realized that the situation had some problems.

After offering some advice that the team start measuring its solution against vendor offerings on the market, Hollis closes with this takeaway:

The bottom line? Had they chosen a different path, they would have been using their cloud in production for several months. They’d be moving on to the next challenge. Or, they could look at what VCE had done, and make an informed case to do better themselves.

Instead, it looked like all they had was a pile of assembled components, and nothing really useful to show other than some interesting experiences and some more stuff to put on their resume.

Sure, there are cases I’ve seen where —yes — it could make sense to invest in a big team and a big project to create a hand-crafted cloud. But that’s the rare exception, and only after a sober analysis of the costs and benefits of doing so.

The first few times I saw this, it was unusual. But it seems to be happening more.

And I think that’s not too good for anyone.

Read Hollis’ full post on how a cloud computing solution can go wrong on Chuck’s Blog.

Stay One Step Ahead of IT Security Threats

IT security is in many ways, a living, breathing thing. New threats are generated daily and as solutions and patches are created, malware proprietors are hard at work creating newer, more aggressive malware to infiltrate enterprise IT networks and wreak havoc.

That’s why every business’ approach to IT security has to be one that is consistently looking ahead and scoping out the landscape. In other words, IT security isn’t a one-time fix, so every company needs to be in it for the long haul.

Cisco’s Small Business blog has some helpful advice for businesses that are worth reading up on.

They list three approaches to staying on top of IT security threats:

Taking the DIY approach

If you have the resources and the inclination, you can squarely hit the moving target of security vulnerabilities on your own. First, start by subscribing to the security advisories that each vendor provides free of charge for their networking gear, computers, and software. Many companies publish an advisory for any issue impacting an individual product, so it’s possible you’ll receive a glut of alerts that don’t pertain to your network. So, make sure you know which products are installed on your network and just focus on the relevant advisories.

Signing up for a service

If you want some help with security updates but don’t want to invest a lot of money, you can subscribe to a service that provides an application that can help you find and automate software updates on your computers. Two popular free services are CNET TechTracker and Secunia Personal Software Inspector (PSI). These applications compare the software on a computer against a continuously refreshed database of vendors’ software updates and patches. The service then generates a report from which you can download the necessary software updates. Using your favorite engine, similar “vulnerability management” services are available for your network infrastructure.

Bringing in outside help

Keeping up with the latest security threats can be a full-time job. Sometimes the best way to stay current on vulnerabilities is to enlist the help of an expert, such as a local Cisco reseller who specializes in security. A partner can inventory your network devices and systems, monitor for security holes and other issues and install the appropriate patches or updates as needed.

Read more about keeping up with IT security on the Cisco Small Business blog.  Continue reading…

Contribution By BizTech Magazine

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

The Meaning Of Secure Business Agility In The Cloud

The Meaning Of Secure Business Agility In The Cloud

Secure Business Agility In The Cloud As cloud continues to accelerate business delivery and shift away the balance of power from IT and InfoSec to business users, organizations need to find ways to ensure that security is part of a business process rather than an afterthought. Today’s organizations are transacting some of their most valuable…

Are You Sure You’re Ready For The Cloud?: Connectivity

Are You Sure You’re Ready For The Cloud?: Connectivity

Cloud Connectivity Many times when we think of “cloud” we think of the elastic compute and storage, but we forget one very important thing, connectivity. Even though connectivity is no part of the cloud itself, it does have a direct bearing on how we access it, use it, and play around with it. If our…

What Should SMEs Do To Prevent Common Mistakes?

What Should SMEs Do To Prevent Common Mistakes?

Spending And Planning Wisely Overview – Billions of pounds from valuable IT and communication (ICT) budgets are wasted each year due to common mistakes in the market. These are some of the pitfalls you should avoid. With small businesses (especially start-ups with online ambitions) relying more and more on their understanding and utilisation of ICT, it’s…

On-Premise VoIP vs The Cloud

On-Premise VoIP vs The Cloud

Modern Day Phone Systems The jargon in the business phone system industry is enough to make even the most tech-savvy entrepreneur’s head spin. However, if we cut through all the strange wording and focus on the features that make each system unique, we can develop enough of an understanding to make a well-informed decision for…

How IRM Makes Cloud-Based File Collaboration “Security-Aware”

How IRM Makes Cloud-Based File Collaboration “Security-Aware”

IRM Cloud-Based File Collaboration  Data breaches and data loss due to insider threats, including malicious insiders stealing, manipulating or destroying data, are the fastest-growing risks that keep managers up at night, according to new research by Ernst & Young. How can we ensure that the right people in an organization have the right access to…

The True Power And Potential Of Wearables

The True Power And Potential Of Wearables

The Power of Wearables The potential of wearable computing for efficiency and innovation is enormous. For business leaders and CIOs, wearable technology represents an opportunity to find more intelligent solutions to real problems and to leverage these devices for the benefit of the organization. But before wearables can successfully realize these expectations, there remain basic…

Driving Insight: Analytics And The Internet of Things

Driving Insight: Analytics And The Internet of Things

Analytics And The Internet of Things  For many businesses, the Internet of Things is playing an increasingly important role, influencing day-to-day operations and strategic planning. An ecosystem of growing complexity and sophistication, the IoT calls for careful navigation: advances in connectivity and cloud-based platforms have opened up a wider range of solutions to IT decision-makers…

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Advertising