When the Cloud Goes Dark…

The demand for cloud computing is an undeniable, unavoidable trend in business IT. Business managers are hearing all about the benefits of the extensible, flexible and scalable features that the cloud offers. This puts pressure on the IT team to pull together some sort of cloud solution for the organization. However, without a clear set of benchmarks, a defined scope and a thorough assessment of needs and resources, building a cloud quickly turns into a stormy nightmare.

Chuck Hollis of EMC recounts the story of what he saw at a large financial institution in a recent post on his blog. The IT team called him in as an EMC rep to gather more information on EMC products, as they were interested in possibly using them for their pieced-together cloud environment. But when Chuck began asking questions about the project and how it was going, he realized that the situation had some problems.

After offering some advice that the team start measuring its solution against vendor offerings on the market, Hollis closes with this takeaway:

The bottom line? Had they chosen a different path, they would have been using their cloud in production for several months. They’d be moving on to the next challenge. Or, they could look at what VCE had done, and make an informed case to do better themselves.

Instead, it looked like all they had was a pile of assembled components, and nothing really useful to show other than some interesting experiences and some more stuff to put on their resume.

Sure, there are cases I’ve seen where —yes — it could make sense to invest in a big team and a big project to create a hand-crafted cloud. But that’s the rare exception, and only after a sober analysis of the costs and benefits of doing so.

The first few times I saw this, it was unusual. But it seems to be happening more.

And I think that’s not too good for anyone.

Read Hollis’ full post on how a cloud computing solution can go wrong on Chuck’s Blog.

Stay One Step Ahead of IT Security Threats

IT security is in many ways, a living, breathing thing. New threats are generated daily and as solutions and patches are created, malware proprietors are hard at work creating newer, more aggressive malware to infiltrate enterprise IT networks and wreak havoc.

That’s why every business’ approach to IT security has to be one that is consistently looking ahead and scoping out the landscape. In other words, IT security isn’t a one-time fix, so every company needs to be in it for the long haul.

Cisco’s Small Business blog has some helpful advice for businesses that are worth reading up on.

They list three approaches to staying on top of IT security threats:

Taking the DIY approach

If you have the resources and the inclination, you can squarely hit the moving target of security vulnerabilities on your own. First, start by subscribing to the security advisories that each vendor provides free of charge for their networking gear, computers, and software. Many companies publish an advisory for any issue impacting an individual product, so it’s possible you’ll receive a glut of alerts that don’t pertain to your network. So, make sure you know which products are installed on your network and just focus on the relevant advisories.

Signing up for a service

If you want some help with security updates but don’t want to invest a lot of money, you can subscribe to a service that provides an application that can help you find and automate software updates on your computers. Two popular free services are CNET TechTracker and Secunia Personal Software Inspector (PSI). These applications compare the software on a computer against a continuously refreshed database of vendors’ software updates and patches. The service then generates a report from which you can download the necessary software updates. Using your favorite engine, similar “vulnerability management” services are available for your network infrastructure.

Bringing in outside help

Keeping up with the latest security threats can be a full-time job. Sometimes the best way to stay current on vulnerabilities is to enlist the help of an expert, such as a local Cisco reseller who specializes in security. A partner can inventory your network devices and systems, monitor for security holes and other issues and install the appropriate patches or updates as needed.

Read more about keeping up with IT security on the Cisco Small Business blog.  Continue reading…

Contribution By BizTech Magazine

Also read their popular Top 50 Must-Read IT Blogs list

Follow Us!

CloudTweaks

Established in 2009, CloudTweaks.com is recognized as one of the leading authorities in cloud computing information. Most of the excellent CloudTweaks articles are provided by our own paid writers, with a small percentage provided by guest authors from around the globe, including CEOs, CIOs, Technology bloggers and Cloud enthusiasts. Our goal is to continue to build a growing community offering the best in-depth articles, interviews, event listings, whitepapers, infographics and much more...
Follow Us!
FacebookTwitterLinkedInGoogle+Share

Sorry, comments are closed for this post.

Join Our Newsletter

Receive updates each week on news, tips, events, comics and much more...

Popular

Top Viral Impact

Cloud Infographic – Cloud Fast Facts

Cloud Infographic – Cloud Fast Facts

Cloud Infographic – Cloud Fast Facts It’s no secret that Cloud Computing is more than just a buzz term as that ship has sailed off a long time ago. More and more companies are adopting the uses and benefits of cloud computing while aggressively factoring cloud services spending into their budget. Included is an excellent

Cloud Infographic: Disaster Recovery

Cloud Infographic: Disaster Recovery

Cloud Infographic: Disaster Recovery  Business downtime can be detrimental without a proper disaster recovery plan in place. Only 6% of businesses that experience downtime without a plan will survive long term. Less than half of all businesses that experience a disaster are likely to reopen their doors. There are many causes of data loss and

Can I Contribute To CloudTweaks?

Yes, much of our focus in 2015 will be on working with other influencers in a collaborative manner. If you're a technology influencer looking to collaborate long term with CloudTweaks – a globally recognized leader in cloud computing information – drop us an email with “tech influencer” in the subject line.

Please review the guidelines before applying.

Whitepapers

Top Research Assets

HP OpenStack® Technology Breaking the Enterprise Barrier

HP OpenStack® Technology Breaking the Enterprise Barrier

Explore how cloud computing is a solution to the problems facing data centers today and highlights the cutting-edge technology (including OpenStack cloud computing) that HP is bringing to the current stage. If you are a CTO, data center administrator, systems architect, or an IT professional looking for an enterprise-grade, hybrid delivery cloud computing solution that’s open,

Public Cloud Flexibility, Private Cloud Security

Public Cloud Flexibility, Private Cloud Security

Public Cloud Flexibility, Private Cloud Security Cloud applications are a priority for every business – the technology is flexible, easy-to-use, and offers compelling economic benefits to the enterprise. The challenge is that cloud applications increase the potential for corporate data to leak, raising compliance and security concerns for IT. A primary security concern facing organizations moving

Hewlett-Packard Company On-Demand Webinar

Hewlett-Packard Company On-Demand Webinar

Shifting Workloads and the Server Evolution Learn more about the latest industry trends and the challenges customers are talking about. Every ten to fifteen years, the types of workloads servers host swiftly shift. This happened with the first single-mission mainframes and today, as disruptive technologies appear in the form of big data, cloud, mobility and