HP ‘Master The Cloud’ Event (Toronto) – Part 2

HP ‘Master The Cloud’ Event (Toronto) – Part 2

HP ‘Master The Cloud’ Event (Toronto) – Part 2

Here’s an interesting parallel, one somewhat removed from the busy world of cloud computing. In the world of “people,” social psychologists who specialize in generational issues are starting to refer to the most recent generation of kids coming-of-age as the Purell generation, since they are likely to be aware of every hand sanitizer bottle or station in their homes, schools, and favourite stores.

This thought came to me as I observed a breakout session on cloud security at the HP Master The Cloud conference, in which the presenter discussed the principle of practicing good IT hygiene. Good IT hygiene. That’s a great term to help get the concept of cloud security across to executives and others who are not comfortable with standard IT terms.

While businesses and organizations wrestle with their fears of moving to the cloud, the security analysts at HP reminded the audience that last year 1773 Exabytes of data were transferred. An Exabyte is one quintillion bytes, or 1,000,000,000 gigabytes, or 1,000,000 terabytes. With all of that data zooming around, it is worrisome to learn that in too many cases, the number one threat to data security is a company’s own internal employees, representing 60-70% of security threats, of which only half were accidental.

This is one of the biggest problems a company faces, but one that is not noticed as easily as the larger concepts such as moving to the cloud. When our presenter asked how many in his audience of 60 routinely encrypted their hard drives, less than half raised their hand.

This points to a contentious issue in cloud security. Simply integrating a new technology stream is not a full guarantee of safety and security when the people who use it do not understand or adhere to security proto

cols themselves. This is why HP is working hard at their cloud systems conference and beyond, to discuss the human factor: they want to help customers get their minds around the concepts of safety and prudence in action.

With demands on IT budgets growing disproportionately to the actual available money, HP emphasizes the importance of educating executives and companies as to best practices – IT hygiene – and this further s HP’s mission of becoming a key outsourcing relationship partner.

To best describe the benefits of cloud solutions, HP says, it must be described to executives like insurance – fire insurance, for example, since insurance is one of those intangibles that cannot be seen, but which has achieved legitimacy in the budget cycle. Furthermore, they stress the importance of benchmarking and follow-up – showing executives what has worked, and what it has saved them in time, money and security.

They have come up with a consulting/customer care relationship that stresses building a community of purpose. I repeat that word: purpose: Conscious actions by people to achieve a goal. This helps build physical usage patterns that are a far cry from the rote actions that become the open door for security threats.

Assess, transform, manage, optimize. This is how the HP people move in and walk alongside their customers, ensuring that all technological change (such as data migration to the cloud), is matched with procedures and habits that ensure safety starts at its most vulnerable point – the end users themselves.

By Steve Prentice

Post Sponsored by HP 

About Steve Prentice

Steve Prentice is a project manager, writer, speaker and expert on productivity in the workplace, specifically the juncture where people and technology intersect. He is a senior writer for CloudTweaks.

View Website
View All Articles

Sorry, comments are closed for this post.

Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and orchestration. Although it has been mature for decades, the network security market had to transform rapidly with the advent of the BYOD trend and emergence of the cloud, which swept enterprises a few years ago.…

Do Not Rely On Passwords To Protect Your Online Information

Do Not Rely On Passwords To Protect Your Online Information

Password Challenges  Simple passwords are no longer safe to use online. John Barco, vice president of Global Product Marketing at ForgeRock, explains why it’s time the industry embraced more advanced identity-centric solutions that improve the customer experience while also providing stronger security. Since the beginning of logins, consumers have used a simple username and password to…

Four Recurring Revenue Imperatives

Four Recurring Revenue Imperatives

Revenue Imperatives “Follow the money” is always a good piece of advice, but in today’s recurring revenue-driven market, “follow the customer” may be more powerful. Two recurring revenue imperatives highlight the importance of responding to, and cherishing customer interactions. Technology and competitive advantage influence the final two. If you’re part of the movement towards recurring…

Using Private Cloud Architecture For Multi-Tier Applications

Using Private Cloud Architecture For Multi-Tier Applications

Cloud Architecture These days, Multi-Tier Applications are the norm. From SharePoint’s front-end/back-end configuration, to LAMP-based websites using multiple servers to handle different functions, a multitude of apps require public and private-facing components to work in tandem. Placing these apps in entirely public-facing platforms and networks simplifies the process, but at the cost of security vulnerabilities. Locating everything…

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Cloud Email Migration In today’s litigious society, preserving your company’s data is a must if you (and your legal team) want to avoid hefty fines for data spoliation. But what about when you move to the cloud? Of course, you’ve probably thought of this already. You’ll have a migration strategy in place and you’ll carefully…

Maintaining Network Performance And Security In Hybrid Cloud Environments

Maintaining Network Performance And Security In Hybrid Cloud Environments

Hybrid Cloud Environments After several years of steady cloud adoption in the enterprise, an interesting trend has emerged: More companies are retaining their existing, on-premise IT infrastructures while also embracing the latest cloud technologies. In fact, IDC predicts markets for such hybrid cloud environments will grow from the over $25 billion global market we saw…

Adopting A Cohesive GRC Mindset For Cloud Security

Adopting A Cohesive GRC Mindset For Cloud Security

Cloud Security Mindset Businesses are becoming wise to the compelling benefits of cloud computing. When adopting cloud, they need a high level of confidence in how it will be risk-managed and controlled, to preserve the security of their information and integrity of their operations. Cloud implementation is sometimes built up over time in a business,…

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups Cloud platforms have become a necessary part of modern business with the benefits far outweighing the risks. However, the risks are real and account for billions of dollars in losses across the globe per year. If you’ve been hacked, you’re not alone. Here are some other companies in the past…