Author Archives: CloudTweaks

Why You Need ITSM Onboard Before You Take Off To The Cloud

Why You Need ITSM Onboard Before You Take Off To The Cloud

Why You Need ITSM Onboard Before You Take Off To The Cloud

Before strapping themselves into the cockpit of a jet airplane, most reasonable people would want to have a pretty detailed idea of what was involved in flying a plane. They’d want to know how the controls worked and how to respond to the variety of situations they could expect to encounter in flight. They would understand that once airborne, things happen much too fast to study up on what to do in an emergency.

The same could be said about cloud computing: like jet airplanes, cloud computing involves many interrelated systems that need to perform within very exact parameters or risk zooming out of control at extremely high speeds. Unfortunately, there are IT directors today who are strapping themselves into a cloud computing strategies without fully understanding what has to happen to deliver IT services to their business users without falling out of the sky.

cloud humor

Go Fast Safely

Cloud computing technology today makes it possible for pools of IT resources to respond intelligently and dynamically to each other and to the changing demands of business requirements. But, as advanced as it is, there is no intelligence inherent in any cloud computing technology. The intelligence to inform the millions of interactions involved in a typical cloud environment needs to come from the people who design, manage and support it.

An ITIL-based ITSM strategy is the most effective framework to upload your collective intelligence into the increasingly educatable technologies in your extended IT environment. The faster you go, the more critical it is to be able to view and govern where you’re headed.

Based on our experience with a range of organizations, here are five reasons ITSM should be a part of every cloud strategy:

1. IT Efficiency – As the delivery of IT services is increasingly pushed to the cloud by business units with tailored needs – often distributed to different service providers or service models – the governance of incident and change management becomes critical to creating a cloud strategy that maintains the efficiencies and speed gained by moving to the new model in the first place.

2. Business Alignment With more service providers targeting individual business units rather than the IT department, IT must be able to quickly assess the impact of new service offerings and how they can be tied into the company’s overall IT strategy.

3. Automated Service Management – IT must manage what it cannot automate, therefore, the automation of key processes in governing the evolution of a company’s service delivery options is critical. Without an ITSM strategy, IT, while trying to control chaos, can become the very bottleneck that its new delivery model exists to resolve.

4. Change Management – IT pros are accustomed to being the controllers of their technology kingdoms, but as cloud models evolve, direct control over every portion of the service delivery landscape lessens. As a result, it is even more critical today to be able to manage and track changes to ensure that what’s working in an in-house data center and what’s being delivered by a host of disparate service providers is all working seamlessly, catching and correcting issues that could cause serious performance degradations or other significant problems before they occur.

5. Self Service – Making it possible for end users to request IT services for themselves is a key component of the cloud computing model. Self-service does not mean instant gratification, however. You need to have things like chargeback and/or show back so you can demonstrate that you are spending money by serving yourself these corporate assets. Without appropriate parameters built into an ITSM strategy, self service provisioning can be like the wild West all over again.

No Excuse

It used to be that only large organizations could justify the cost of implementing ITSM. The available tools were expensive to install and often overwhelming to implement. A new wave of system management toolsets available as software-as-a-service (SaaS), however, has now made developing and implementing an ITSM strategy as doable as it is critical. The current front runner among SaaS ITSM toolsets is ServiceNow, but there are others like Cherwell, and EarlyVista, as well as SaaS applications from the more traditional service management vendors like BMC, HP and IBM.

A key advantage of the new generation of ITSM toolsets is that all the necessary functions are available within a fully integrated application. An ITIL-based framework already exists. You don’t have to spend all your time, and money building it. You can begin by adopting appropriate best practices in phases and tweak them as your strategy evolves.

A key hazard in the development of ITSM strategy is the tendency of IT professionals to seek out technical detail and dive in. Loosing the forest for the trees is probably the most common source of failure of ITSM strategies. The goal of a well designed ITSM strategy is not just to keep technologies interacting intelligently. The ultimate goal is delivery IT services that directly support and enhance an organization’s business objectives, or, in the case of governmental agencies, their mission to serve. ITSM is not just for IT.

This is where having a clear vision of where you want to go and the leadership to execute it is critical. It takes a resolute, guiding hand to steer an ITSM strategy through the inevitable turbulence of special interests as IT and business stakeholders pursue their own objectives.

On the positive side, the challenge of developing a comprehensive ITSM strategy has within it a unique opportunity to develop an environment of active collaboration between business and IT stakeholders that reflects the intelligent, interactive, collaboration you are creating between technologies within your extended IT environment.

In my next column, I would like to map out the stages you need to complete to design and implement an ITSM strategy that will ensure that when you take off for the cloud, you know where you are going and how to get there safely, securely and effectively.


By Mike Alley, Logicalis Director of ITSM

Mike Alley is the resident evangelist at Logicalis for ITSM solutions and has nearly 30 years of experience in the technology industry. Mike joined Logicalis in 2006 through the acquisition of Carotek, a top HP partner in the Southeast. Prior to Carotek, Mike worked as a consulting manager at HP. 

Visit to learn more about the IT Transformation Journey

BYOD Will Continue To Define Workplaces In 2014

BYOD Will Continue To Define Workplaces In 2014

BYOD Will Continue To Define Workplaces

The bring-your-own-device trend has been the subject of scrutiny ever since its initial formation. Given how quickly personal smartphones and tablets became a fixture in everyday life, it makes perfect sense that these mobile machines would slip into workplaces. While BYOD has caused headaches for many businesses, still others have discovered the benefits of it. This is achieved by recognizing that BYOD is not only inevitable, but also – as InformationWeek contributor Peter Waterhouse refers to it – “naturally occurring.”

More companies than ever are recognizing this as a key component to successful unified communications initiatives. According to Waterhouse, “BYOD is happening, whether IT likes it or not.” Personal devices in the workplace will continue to increase throughout 2014, and businesses will need to adapt to change in order to stay afloat.

Advancements In Technology Make Adoptions Easier

As mobile workforce management tools and techniques have matured, more companies have been able to integrate them as part of a UC program deployment. According to IDC analysts Christopher Chute and Raymond Boggs, this has been especially advantageous for small and medium-sized businesses. Their report, the U.S. 2014 SMB Corporate-Owned and BYOD Mobile Device Survey, determined that organizations of this size have seen the biggest increase in BYOD program launches.

With the availability of hosted software and easy-to-implement mobile solutions, SMB IT managers feel much more comfortable allowing personal devices access to internal IT resources,” Chute said.

Given that BYOD has shown no signs of slowing down, it is certain that more SMBs – not to mention major enterprises – will both have and need to manage personal smartphones and tablets in the office. This is especially true given that a new wave of devices is already on the horizon – wearables.

Wearable BYOD Tech To Enter Workplace

While it should still be a priority and must be addressed, mobile UC is expected to get a little more complicated in 2014. Much in the same way that tablets and smartphones started popping up in offices all over the world, wearable tech like Google Glass and the iWatch are highly-anticipated tools that will, with great certainty, enter the workplace.

These tools will ultimately be able to serve a wide variety of professional purposes, but BYOD strategies will have to be re-examined before wearables arrive. According to Krista Napier, IDC Canada’s manager for mobility research, there is a learning process that must occur for both management and employees regarding how these devices can and cannot be used for communications and other critical purposes.

By Katie Maller, Communications Manager at ShoreTel

(Image Source: Joe Seer / )

Are Cloud Servers The Right Choice For Your Business?

Are Cloud Servers The Right Choice For Your Business?

Are Cloud Servers The Right Choice For Your Business?

Cloud servers offer power, flexibility, reliability, and client friendly hosting for small and medium businesses that have outgrown shared hosting.

New business hosting clients are bombarded with an incredible diversity of different choices for their site’s hosting. It can be a challenge to negotiate the range of platforms and the marketing hype that many hosting companies use to promote their products.

Given the complexity of the hosting market, it’s possible to get decision fatigue and opt for a choice which at first seems to offer great benefits and prices, but may not turn out to be the best choice in the long-run. It can be a pain for a business to move from one hosting company or platform to another — although it’s certainly possible — so it’s best to make a choice that will provide the best foundation for your business well into the future.

With that in mind, in this article we’re going to focus on one form of hosting: the cloud server. Let’s take a look at what a cloud server is, how it differs from other hosting such as shared hosting or a dedicated server, and when it’s the right choice for a business.

What Is A Cloud Server?

A cloud server shares some features with both shared hosting and dedicated server hosting, but with a number of extra features that make it a very different beast from both.

A cloud server is a virtualized server. That means that cloud servers are virtual machines that run on a physical server, which can host multiple virtual cloud servers. Cloud servers are a complete server environment with full root access. They also usually include a guaranteed level of resources like processing power and memory.

To some of you, that might sound exactly the same as a virtual private server, but there are significant differences. The most important difference is the pricing model. Whereas virtual private servers are usually sold with per month contacts, cloud servers are on-demand machines that are charged for by the hour, so users pay only for the resources they use.

Is A Cloud Server Right For Your Business?

The major benefits of cloud servers are:

  • Flexibility — Cloud servers are the most flexible hosting option: they can be created, destroyed, replicated, and resized as needed.
  • Scalable – Hopefully, your business is going to grow, and that means more traffic to your website. A cloud server can grow with your business by simply increasing the resources available to it — known as vertical scaling. It’s also very easy to spin up additional servers to create a cluster of cloud servers. For example, you could replicate your web servers and put them behind a cloud-based load balancer — this is horizontal scaling.
  • Reliable — If you have a dedicated server and something goes wrong with the hardware, then your site goes down. Because cloud servers are so much more flexible, you can have redundant servers waiting to activate in case of a problem. You can completely back-up a cloud server and have a replica up and running in seconds. High availability cloud servers are configured so that there is no single point of failure. Using failover systems, proactive monitoring, and recovery, it’s possible to achieve levels of reliability that would be vastly more expensive with dedicated servers.
  • On-demand Pricing — Businesses pay for only the resources they use, and are not committed to a long-term contract.

If you think your business site has outgrown shared hosting and that you need flexibility, scalability, reliability, and a client-friendly payment model, then cloud hosting is for you.

By John Mack / Technical writer for Datarealm

Cloud News Round Up Post – February 15th

Cloud News Round Up Post – February 15th

Here is your cloud news round up post for the week.


Front Desk Raises $4 Million to Expand Mobile Cloud Platform – Don’t turn your nose up at Front Desk, as the software startup are preparing for big things. Specifically, Front Desk are looking to process more than $100 million in payments in 2014. Spanning 20 countries with around 1,000 business signed up to make use of Front Desk’s payment offerings, that money could help them to process even more payments on mobile especially, where over 60% of their business takes place. Only around for one year, Jon Zimmerman, Front Desk’s co-founder and CEO says “This has been an incredible first year for Front Desk, and [they are] delighted to secure this financing from such a well-respected group of investors and entrepreneurs. The funding will help [them] step on the gas to meet [their] growing demand.” so that funding will be of good use.

Cloud Startup LoginRadius Raises $1.3 Million in FundingLoginRadius, the flagship product of a Canadian tech startup called Nya Concepts Inc., has successfully raised $1.3 million in a recent round of funding. The team behind the service, which allows users to register and sign up for websites by way of their Google and Facebook profiles (along with Yahoo, etc.), is set to use the money to “help businesses engage and understand their users by simplifying how users connect to the web. This financing gives [them] additional resources for rapid growth and product innovating so that [they] can continue to transform the way users connect to the web and mobile applications”, according to Rakesh Soni, co-founder and CEO of LoginRadius. The service seems to be useful, and the money will go a long way to furthering that, so it will be interesting to see where the tech goes in the future.

Microsoft Release Details on Oracle on Azure Cloud – It was recently announced that Satya Nadella would be Microsoft’s new CEO, and he was previously one of the driving figures behind Microsoft’s work with the cloud. Now, one of the very first outcomes of that has become apparent as Microsoft have no revealed information on the Oracle on Azure partnership that the tech company have been working on. In a new statement, they have said that “Beginning 12 March, [Microsoft] will charge for the Oracle software running in license included Oracle VMs in addition to [their] charge for the Windows Server VMs in which the Oracle software runs.” but as that’s not set to go live until next month, we’ll keep you posted once we know more.

By Jennifer Livingstone

Cloud Infographic: Preventing Disasters In The Cloud

Cloud Infographic: Preventing Disasters In The Cloud

Cloud Infographic: Preventing Disasters In The Cloud

Data backups form an important part of an enterprise’s Disaster Recovery/Business Continuity planning (DR/BC). Traditionally the data was stored on tapes and physical media, at an off-site location, to mitigate the effect of the disaster. Saving the data on-site would have negated the benefit of having a backup, since there is a high probability that the backup would have been as compromised as the original. Now, the availability of cloud based backup and recovery services have created an option for enterprises to store at a virtual drive off-site.

Included is an infographic provided courtesy of the group at Novastor


Infographic Source: Novastor

Microsoft CEO Shows That Cloud Is The Way Forward

Microsoft CEO Shows That Cloud Is The Way Forward

Microsoft’s new CEO appointment shows that the world’s largest desktop software developer has seen that the cloud is the future of enterprise IT.

Microsoft’s long and public CEO selection process has come to a close, with veteran Redmond employee Satya Nadella taking up the reins to lead the company through what will be a period of unprecedented change.

In the four decades since Microsoft was founded both the enterprise and consumer IT space has undergone radical evolution. It was Microsoft more than any other company that lead the way in past decades, shaping the industry with its massively popular enterprise, productivity, and operating system software. But, although Microsoft is still the dominant player in those arenas, that dominance is being challenged by a changing environment. Those changes are largely the result of new IT paradigms brought about by the cloud, including SaaS applications and IaaS platforms.

Microsoft is a huge company with fingers in many pies, from gaming with the Xbox, to mobile devices with Windows Phone and its recent purchase of Nokia, and from productivity and collaboration software with Microsoft Office and SharePoint, to its own cloud services like Windows Azure and SkyDrive.


(Image Source360b /

The choice of CEO for a company that has only had two leaders in the past, Bill Gates and his close friend Steve Ballmer, is a crucial indication of where it sees its future. The selection committee might have chosen to double down on the traditional PC market, put its entertainment division first and foremost, given the reins to someone with mobile experience — Steven Elop was considered a front runner by some — or brought someone from the outside to take the company in a new direction. Instead they chose Satya Nadella, an insider to be sure, but an insider who has had more influence than anyone else in shaping the company’s cloud and services strategy.

The 46-year-old Nadella has been with the company for over two decades, previously having worked at Sun Microsystems. He is currently head of cloud services and enterprise business, and his appointment clearly demonstrates where Microsoft believes its future revenue lies. The PC market is stagnating, including the market for enterprise desktops, and although it’s unlikely to dwindle significantly any time soon, that traditional cash-cow can’t be relied on to generate new business.

In spite of Xbox and its constant experimentation with consumer devices, the enterprise has always been Microsoft’s major money-spinner. In the modern IT space, enterprise IT spending is being increasingly transferred to the cloud as businesses seek to exploit the cost-benefits, reduced management burden, and scaling advantages of cloud platforms. If Microsoft is to flourish, it must provide cloud solutions that will enable it to generate revenue that will supplement its less successful operations. That makes Nadella the perfect choice — he knows how to build services and platforms that give businesses what they need.

We’re in a transitional phase between legacy IT strategies and new cloud paradigms. Microsoft was the winner in the legacy IT world. Nadella’s appointment shows that Microsoft is determined to win in the cloud too.

By John Mack,

John is a technical writer for Datarealm, one of the oldest web hosting companies. You can follow Datarealm on Twitter, @datarealm, Like them on Facebook, and check out more of their web hosting articles on their blog,

The Sticking Points Of Security And Privacy

The Sticking Points Of Security And Privacy

The Sticking Points Of Security And Privacy

No matter how many times a privileged straight white male technology executive pronounces the death of privacy, Privacy Is Not Dead. People of all ages care deeply about privacy and they care just as much about privacy online as they do offline” (Danah Boyd)


Security and Privacy are the two sticking points when it comes to moving business systems into the cloud. Out of the two, security is obviously the most important. After all, you can securely store data in a way that doesn’t ensure privacy, but you can’t maintain privacy if your supporting systems aren’t secured. Thankfully, there are a number of straightforward internationally agreed upon standards and best practices that companies can use to ensure that their servers are secured either in-house or in the cloud. Privacy however is a much newer field, and although everyone seems to have their own opinion about what constitutes adequate privacy protection, the law may have a different opinion than you and doing business in the cloud you may be dealing with conflicting privacy regulations that span multiple countries and industries.

As we’ve seen with recent controversies such as the NSA scandal, this is still a relatively new area of concern and the courts are struggling to catch up with new developments. Although we can’t offer any legal advice, we would like to present some good general tips that companies should consider when evaluating the privacy of their data in the cloud.

1. Limit the Data you Collect – It’s common sense that protecting a small amount of personally identifiable data should be easier than protecting a very large quantity, and you should also ensure that any personally identifiable information that you collect should be obtained in an open, transparent and lawful manner. As privacy regulations continue to change and evolve you should expect to see a growing trend where notification and consent will be required from consumers. And as consumers become more knowledgable about their rights you can expect to see an increase in the number of disclosure requests or lawsuits made by consumers. By minimizing the amount of the data you keep on file, you minimize both the risk and the cost associated with administrating the sensitive information.

2. Limit the Use of personally identifiable information. – This includes letting them know why you need this information and what will be done with this information once it’s been collected and once you’ve collected this information don’t share it with anyone or use it for purposes other than those agreed upon by you and the client.

3. Keep the Data Secure – Make sure that you have tight controls in place to prevent privacy breaches or data leaks. Once personally identifiable information goes into your possession, you have a responsibility to protect it against unauthorized use, theft, improper disclosure or deletion. Talk to your IT department and make sure that you have all of the proper mechanisms in place to protect yourself against hackers, viruses, data storage theft and other technology attacks. Even if this data is stolen and misused by a 3rd party without your permission, the victims and the courts will still hold your company responsible

4. Set Policies for Retention – Regarding the limit of use, many people will mistakenly assume that an alternative method will simply be to collect data, use it and then destroy it when they’re done. Although this approach is good in theory, many regulations stipulate that business documents and collected customer information must be retained on file for several years. If you store data for too long you increase your exposure, but if you deleted too soon, you can fall out of compliance and face stiff penalties. Judges are also very aware of the fact that digital data can be easily altered without leaving a trace. So your company should have controls in place to ensure the integrity of the data and demonstrate to a judge that it hasn’t been tampered with.

5. Set policies for destruction – When you delete a file and empty the Recycle Bin you only erase the label and address which points to the data, the actual data blocks that make up the file are still on your hardrive and can be retrieved using special software. In order to completely destroy a file you must 1st delete it and then write over those data block with random bits. Let’s suppose that you are hosting a virtual server with a cloud provider. If that the cloud provider moves your virtual server to another physical device, the actual moving leaves out residual data blocks at the original location. If this section will be assigned to another client, they could potentially discover your data. How can you been absolutely sure that this data has really been destroyed?

So how do you make sure that you are protected in the cloud?

Cloud Providers are frequently audited by governments, stakeholders or larger customers in order to ensure that the proper security procedures are being strictly followed. For small businesses with limited IT resources the cloud is a good option because these service providers have much stricter security measures in place. But you shouldn’t rely on this alone. There are also mechanical precautions you can take in order to make sure your cloud data is destroyed. By encrypting your data blocks using strong encryption standards, such as 256 bit AES, you can store your data on a cloud provider servers without exposing it.

By Roland Conner

CloudPassage Secures $25.5 Million – Strategy For Securing Cloud Environments

CloudPassage Secures $25.5 Million – Strategy For Securing Cloud Environments

Series C Funding Round Led by Shasta Ventures Validates Need for Purpose-Built Cloud Security and Compliance Platform 

SAN FRANCISCO, CA–(Marketwired – Feb 13, 2014) – CloudPassage®, the Software Defined Security (SDSec) company, announced today that it has closed a $25.5 million Series C financing round. The round is led by Shasta Ventures and includes new investors, Meritech Capital Partners and Stephen Luczo, CEO of Seagate, with participation from existing investors, Tenaya Capital, Benchmark Capital and Musea Ventures.

cloud-passageCloudPassage’s new financing will be used to expand sales and marketing to meet increasing demand from enterprises seeking to secure their public, private and hybrid cloud environments. The round brings CloudPassage’s total capital raised to $53 million. The company is growing rapidly and closed 2013 with the addition of 50 new enterprise customers.

Security continues to be the number one barrier to cloud adoption, but legacy security tools haven’t been able to adapt to address these concerns,” said Jason Pressman, Managing Director of Shasta Ventures. “Businesses are moving to the cloud at an incredible rate with most forecasts running at 30 percent or higher compound annual growth rates, and security must keep pace. CloudPassage is the only company that is helping organizations make that transition seamlessly, while delivering the security and compliance that they demand.”

Halo®, CloudPassage’s security automation platform purpose-built for the cloud, delivers security and compliance for large-scale, distributed environments. Halo was built to be flexible, lightweight and fast to deploy and scale, regardless of the environment. Halo also integrates with leading cloud and security technologies such as VMware, Rackspace, Amazon Web Services, RightScale, Splunk and HP ArcSight, among others.

Cloud security will be a multi-billion dollar market in just a few short years, and CloudPassage has an amazing first-mover advantage,” said Stephen Luczo, CEO of Seagate. “CloudPassage has developed an innovative platform that is purpose-built for the cloud. Its rapid growth and increasing adoption among large enterprises serves as validation the company has the right approach to cloud security.”

CloudPassage currently protects more than 400 production cloud application deployments, including a number of Fortune 1000 enterprises, and automates security for more than 10,000 new cloud workload instances each month.

The combination of agility and immediate scalability make cloud infrastructure a powerful strategy that is being rapidly adopted in every industry. These same characteristics create complexity for security and compliance. Halo was built to be as scalable, automated and agile as the cloud itself,” said Carson Sweet, CEO of CloudPassage. “We’re excited to welcome our new investors as we continue to enable enterprise cloud adoption and enter the next phase of our company’s growth.”

About CloudPassage

CloudPassage is the leading Software Defined Security (SDSec) company and creator of Halo, the industry’s first and only security and compliance platform purpose-built for elastic cloud environments. Halo’s patented architecture operates seamlessly across any mix of software-defined data center, public cloud, and even hardware infrastructure. Industry-leading enterprises trust Halo to protect their cloud and software-defined datacenter environments. Headquartered in San Francisco, CA, CloudPassage is backed by Benchmark Capital, Meritech Capital Partners, Tenaya Capital, Shasta Ventures, Musea Ventures and other leading investors. For more information, please visit

CloudPassage® and Halo® are registered trademarks of CloudPassage, Inc.

CloudTweaks Comics
Cloud Infographic: Security And DDoS

Cloud Infographic: Security And DDoS

Security, Security, Security!! Get use to it as we’ll be hearing more and more of this in the coming years. Collaborative security efforts from around the world must start as sometimes it feels there is a sense of Fait Accompli, that it’s simply too late to feel safe in this digital age. We may not…

A New CCTV Nightmare: Botnets And DDoS attacks

A New CCTV Nightmare: Botnets And DDoS attacks

Botnets and DDoS Attacks There’s just so much that seems as though it could go wrong with closed-circuit television cameras, a.k.a. video surveillance. With an ever-increasing number of digital eyes on the average person at all times, people can hardly be blamed for feeling like they’re one misfortune away from joining the ranks of Don’t…

Cloud Infographic – DDoS attacks, unauthorized access and false alarms

Cloud Infographic – DDoS attacks, unauthorized access and false alarms

DDoS attacks, unauthorized access and false alarms Above DDoS attacks, unauthorized access and false alarms, malware is the most common incident that security teams reported responding to in 2014, according to a recent survey from SANS Institute and late-stage security startup AlienVault. The average cost of a data breach? $3.5 million, or $145 per sensitive…

Reuters News: Powerfull DDoS Knocks Out Several Large Scale Websites

Reuters News: Powerfull DDoS Knocks Out Several Large Scale Websites

DDoS Knocks Out Several Websites Cyber attacks targeting the internet infrastructure provider Dyn disrupted service on major sites such as Twitter and Spotify on Friday, mainly affecting users on the U.S. East Coast. It was not immediately clear who was responsible. Officials told Reuters that the U.S. Department of Homeland Security and the Federal Bureau…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

The Cancer Moonshot: Collaboration Is Key

The Cancer Moonshot: Collaboration Is Key

Cancer Moonshot In his final State of the Union address in January 2016, President Obama announced a new American “moonshot” effort: finding a cure for cancer. The term “moonshot” comes from one of America’s greatest achievements, the moon landing. If the scientific community can achieve that kind of feat, then surely it can rally around…

Are Cloud Solutions Secure Enough Out-of-the-box?

Are Cloud Solutions Secure Enough Out-of-the-box?

Out-of-the-box Cloud Solutions Although people may argue that data is not safe in the Cloud because using cloud infrastructure requires trusting another party to look after mission critical data, cloud services actually are more secure than legacy systems. In fact, a recent study on the state of cloud security in the enterprise market revealed that…

How To Humanize Your Data (And Why You Need To)

How To Humanize Your Data (And Why You Need To)

How To Humanize Your Data The modern enterprise is digital. It relies on accurate and timely data to support the information and process needs of its workforce and its customers. However, data suffers from a likability crisis. It’s as essential to us as oxygen, but because we don’t see it, we take it for granted.…

Maintaining Network Performance And Security In Hybrid Cloud Environments

Maintaining Network Performance And Security In Hybrid Cloud Environments

Hybrid Cloud Environments After several years of steady cloud adoption in the enterprise, an interesting trend has emerged: More companies are retaining their existing, on-premise IT infrastructures while also embracing the latest cloud technologies. In fact, IDC predicts markets for such hybrid cloud environments will grow from the over $25 billion global market we saw…

Adopting A Cohesive GRC Mindset For Cloud Security

Adopting A Cohesive GRC Mindset For Cloud Security

Cloud Security Mindset Businesses are becoming wise to the compelling benefits of cloud computing. When adopting cloud, they need a high level of confidence in how it will be risk-managed and controlled, to preserve the security of their information and integrity of their operations. Cloud implementation is sometimes built up over time in a business,…

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And Virtual Reality This is a term I created (Virtual Immersion). Ah…the sweet smell of Virtual Immersion Success! Virtual Immersion© (VI) an extension/expansion of Virtual Reality to include the senses beyond visual and auditory. Years ago there was a television commercial for a bathing product called Calgon. The tagline of the commercial was Calgon…

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Cloud Email Migration In today’s litigious society, preserving your company’s data is a must if you (and your legal team) want to avoid hefty fines for data spoliation. But what about when you move to the cloud? Of course, you’ve probably thought of this already. You’ll have a migration strategy in place and you’ll carefully…


Sponsored Partners