Cloud Infographic: What Do You Store In The Cloud?
Included is an infographic provided by the group at Endurance International Group which conducted a survey with a small subset of Endurance subscribers.
Infographic Source: Endurance
Cloud News Round Up February 19th
Synchronoss and Napster to Create Cloud Based Music Platform – Have you heard of Napster recently? It’s unlikely that you have heard much of a revolutionary peep from the formerly hugely popular music service as it has been ousted by platforms like last.fm and Spotify, which let you blast the best tunes on the go with just an Internet connection. Now, Napster is looking to get some of their market share back by pioneering cloud tech, having just announced a new cloud music sharing partnership with Synchronoss to create a “social music platform”. The Napster app, which will be built directly into the Synchronoss Personal Cloud service, subscribers can share music, put together a music library from over 25 million tracks, access music and playlists on mobile devices and PCs via the cloud and use something called ‘Napster TrackMathc’ to “identify, capture and save music”.
Microsoft Revamps and Renames SkyDrive, Now Called OneDrive – ‘Anything Google can do, we can do better’ seems to be Microsoft’s motto here as they have gone to a great deal of effort to pit their cloud documentation offering, OneDrive, against Google’s own digital Google Drive service. Part of that comes in the form of a name change as the witty SkyDrive title has been ditched in favour of OneDrive, likely to be more in line Microsoft’s new ‘all in one’ vision. Microsoft’s new and very high hopes are that people will store their files – be it text, photo or video files – on OneDrive, but they’re looking to do this with few new ground-breaking additions as Android auto uploading and document collaboration tools that do not require a Microsoft account are the leading features here. What is also a draw is that the first 100,000 OneDrive sign ups will get 100GB of storage free for one year, meaning that you will want to head over to OneDrive.com and get access to the deal while you can.
Payroll App ZenPayroll Raises $20 Million In Funding – There are perhaps few ways to top what the all-star funders of Salesforce, Drew Houston (Dropbox CEO and co-founder) and Google Ventures offered with $6.1 million of initial funding, but somehow, payroll app ZenPayroll have managed to surpass the investment that was once offered to them, now raising $20 million to further their business. Bringing a cloud based payroll application to businesses, many have seen this as a lucrative business opportunity, with the Series A funding led by General Catalyst Partners also being participated in by Kleiner Perkins and Caufield & Buyers. The $20 million is just a fifth of the companies real worth as the valuation in this round of funding was just above $100 million, so ZenPayroll has an incredibly large some of money to prove that it is worthy of in the future.
By Jennifer Livingstone
AlgoSec Partners With Qualys Allowing Organizations to Manage Security Risks in a Business Context
New Integration Delivers Application-Centric Vulnerability Management, Aggregating and Scoring Vulnerabilities Based on Risk and Continuously Monitoring for Changes Within Data Center Environments
BOSTON, MA–(Marketwired – Feb 19, 2014) – AlgoSec, the market leader for Security Policy Management and Qualys, Inc. (NASDAQ: QLYS), a pioneer and leading provider of cloud security and compliance solutions, today announced their partnership to enable businesses to manage security and risk across their organizations. With the partnership, the latest version of the AlgoSec Security Management Suite includes integration with QualysGuard Vulnerability Management (VM) to aggregate and score vulnerabilities associated with data center applications and their associated physical or virtual servers. This provides customers with unprecedented visibility into the risk levels of data center applications — even as they change — enabling IT and security teams to effectively communicate with business stakeholders so they can “own their risk” by quickly taking the actions needed to mitigate IT security issues.
“Good risk management influences business decision making, so risks should always be addressed in a business context,” wrote Paul Proctor, Analyst, Gartner Inc. “This can be a challenge for IT leaders grounded in the technology-centric aspects of IT risk.”1
“Today’s cyber-attacks have a direct impact on the bottom line, yet organizations lack the visibility to manage risk from the business perspective,” said Yuval Baron, Chairman, President and CEO, AlgoSec. “By integrating QualysGuard VM with our solution, we are changing this paradigm to provide application-centric vulnerability management, allowing organizations to manage security in the context of business and at the speed of business.”
In addition to aggregating vulnerability information per business application, AlgoSec provides a security rating across each physical or virtual server. As application connectivity flows change, vulnerability scores are automatically updated to ensure the most up-to-date view of risk to a data center application. Additionally, AlgoSec provides an immediate view of any server that has not been scanned for vulnerabilities within a specific interval.
“Businesses today need the agility to continuously identify security issues and take the necessary steps to mitigate threats,” said Philippe Courtot, chairman and CEO for Qualys. “With QualysGuard integrated into the AlgoSec Security Management Suite, customers can gain better visibility into the configurations and vulnerabilities in their environments to take the appropriate remediation or mitigation actions.”
The AlgoSec Security Management Suite delivers an automated and application-centric solution for managing complex policies across firewalls, routers, switches and web proxies to improve both security and business agility. The AlgoSec Suite bridges traditional gaps between security, network and application teams to simplify and automate data center and network operations. The AlgoSec Suite simplifies application delivery, streamlines change management, ensures continuous compliance, and delivers a tighter security policy that offers better protection against cyber-attacks.
The AlgoSec Suite, with application-centric vulnerability management is available immediately. The new solution will be demonstrated at RSA at AlgoSec’s booth #427.
To learn more about this solution, join us for a webcast on March 12 at 1pm ET on Managing Risk and Vulnerabilities in a Business Context.
1 – Gartner, Risk Management Key Initiative Overview, Paul E. Proctor, July 16, 2013
Qualys, Inc. (NASDAQ: QLYS) is a pioneer and leading provider of cloud security and compliance solutions with over 6,000 customers in more than 100 countries, including a majority of each of the Forbes Global 100 and Fortune 100. The QualysGuard Cloud Platform and integrated suite of solutions help organizations simplify security operations and lower the cost of compliance by delivering critical security intelligence on demand and automating the full spectrum of auditing, compliance and protection for IT systems and Web applications. Founded in 1999, Qualys has established strategic partnerships with leading managed service providers and consulting organizations, including Accuvant, BT, Dell SecureWorks, Fujitsu, NTT, Symantec, Verizon, and Wipro. The company is also a founding member of the Cloud Security Alliance.
For more information, please visit http://www.qualys.com.
AlgoSec is the market leader for security policy management, enabling organizations to simplify and automate security operations in evolving data centers and networks. More than 1000 of the world’s leading organizations, including 15 of the Fortune 50, rely on AlgoSec for faster security provisioning of business applications, streamlined change management, continuous compliance and tighter security.
AlgoSec’s application-centric approach orchestrates the management of complex policies across firewalls and related network devices, aligning IT teams for improved business agility.
AlgoSec is committed to the success of every single customer, and offers the industry’s only money-back guarantee. For more information, visit www.AlgoSec.com.
Why You Need ITSM Onboard Before You Take Off To The Cloud
Before strapping themselves into the cockpit of a jet airplane, most reasonable people would want to have a pretty detailed idea of what was involved in flying a plane. They’d want to know how the controls worked and how to respond to the variety of situations they could expect to encounter in flight. They would understand that once airborne, things happen much too fast to study up on what to do in an emergency.
The same could be said about cloud computing: like jet airplanes, cloud computing involves many interrelated systems that need to perform within very exact parameters or risk zooming out of control at extremely high speeds. Unfortunately, there are IT directors today who are strapping themselves into a cloud computing strategies without fully understanding what has to happen to deliver IT services to their business users without falling out of the sky.
Cloud computing technology today makes it possible for pools of IT resources to respond intelligently and dynamically to each other and to the changing demands of business requirements. But, as advanced as it is, there is no intelligence inherent in any cloud computing technology. The intelligence to inform the millions of interactions involved in a typical cloud environment needs to come from the people who design, manage and support it.
An ITIL-based ITSM strategy is the most effective framework to upload your collective intelligence into the increasingly educatable technologies in your extended IT environment. The faster you go, the more critical it is to be able to view and govern where you’re headed.
Based on our experience with a range of organizations, here are five reasons ITSM should be a part of every cloud strategy:
1. IT Efficiency – As the delivery of IT services is increasingly pushed to the cloud by business units with tailored needs – often distributed to different service providers or service models – the governance of incident and change management becomes critical to creating a cloud strategy that maintains the efficiencies and speed gained by moving to the new model in the first place.
2. Business Alignment – With more service providers targeting individual business units rather than the IT department, IT must be able to quickly assess the impact of new service offerings and how they can be tied into the company’s overall IT strategy.
3. Automated Service Management – IT must manage what it cannot automate, therefore, the automation of key processes in governing the evolution of a company’s service delivery options is critical. Without an ITSM strategy, IT, while trying to control chaos, can become the very bottleneck that its new delivery model exists to resolve.
4. Change Management – IT pros are accustomed to being the controllers of their technology kingdoms, but as cloud models evolve, direct control over every portion of the service delivery landscape lessens. As a result, it is even more critical today to be able to manage and track changes to ensure that what’s working in an in-house data center and what’s being delivered by a host of disparate service providers is all working seamlessly, catching and correcting issues that could cause serious performance degradations or other significant problems before they occur.
5. Self Service – Making it possible for end users to request IT services for themselves is a key component of the cloud computing model. Self-service does not mean instant gratification, however. You need to have things like chargeback and/or show back so you can demonstrate that you are spending money by serving yourself these corporate assets. Without appropriate parameters built into an ITSM strategy, self service provisioning can be like the wild West all over again.
It used to be that only large organizations could justify the cost of implementing ITSM. The available tools were expensive to install and often overwhelming to implement. A new wave of system management toolsets available as software-as-a-service (SaaS), however, has now made developing and implementing an ITSM strategy as doable as it is critical. The current front runner among SaaS ITSM toolsets is ServiceNow, but there are others like Cherwell, and EarlyVista, as well as SaaS applications from the more traditional service management vendors like BMC, HP and IBM.
A key advantage of the new generation of ITSM toolsets is that all the necessary functions are available within a fully integrated application. An ITIL-based framework already exists. You don’t have to spend all your time, and money building it. You can begin by adopting appropriate best practices in phases and tweak them as your strategy evolves.
A key hazard in the development of ITSM strategy is the tendency of IT professionals to seek out technical detail and dive in. Loosing the forest for the trees is probably the most common source of failure of ITSM strategies. The goal of a well designed ITSM strategy is not just to keep technologies interacting intelligently. The ultimate goal is delivery IT services that directly support and enhance an organization’s business objectives, or, in the case of governmental agencies, their mission to serve. ITSM is not just for IT.
This is where having a clear vision of where you want to go and the leadership to execute it is critical. It takes a resolute, guiding hand to steer an ITSM strategy through the inevitable turbulence of special interests as IT and business stakeholders pursue their own objectives.
On the positive side, the challenge of developing a comprehensive ITSM strategy has within it a unique opportunity to develop an environment of active collaboration between business and IT stakeholders that reflects the intelligent, interactive, collaboration you are creating between technologies within your extended IT environment.
In my next column, I would like to map out the stages you need to complete to design and implement an ITSM strategy that will ensure that when you take off for the cloud, you know where you are going and how to get there safely, securely and effectively.
By Mike Alley, Logicalis Director of ITSM
Mike Alley is the resident evangelist at Logicalis for ITSM solutions and has nearly 30 years of experience in the technology industry. Mike joined Logicalis in 2006 through the acquisition of Carotek, a top HP partner in the Southeast. Prior to Carotek, Mike worked as a consulting manager at HP.
Visit www.unlikeanycloud.com to learn more about the IT Transformation Journey
The bring-your-own-device trend has been the subject of scrutiny ever since its initial formation. Given how quickly personal smartphones and tablets became a fixture in everyday life, it makes perfect sense that these mobile machines would slip into workplaces. While BYOD has caused headaches for many businesses, still others have discovered the benefits of it. This is achieved by recognizing that BYOD is not only inevitable, but also – as InformationWeek contributor Peter Waterhouse refers to it – “naturally occurring.”
More companies than ever are recognizing this as a key component to successful unified communications initiatives. According to Waterhouse, “BYOD is happening, whether IT likes it or not.” Personal devices in the workplace will continue to increase throughout 2014, and businesses will need to adapt to change in order to stay afloat.
As mobile workforce management tools and techniques have matured, more companies have been able to integrate them as part of a UC program deployment. According to IDC analysts Christopher Chute and Raymond Boggs, this has been especially advantageous for small and medium-sized businesses. Their report, the U.S. 2014 SMB Corporate-Owned and BYOD Mobile Device Survey, determined that organizations of this size have seen the biggest increase in BYOD program launches.
“With the availability of hosted software and easy-to-implement mobile solutions, SMB IT managers feel much more comfortable allowing personal devices access to internal IT resources,” Chute said.
Given that BYOD has shown no signs of slowing down, it is certain that more SMBs – not to mention major enterprises – will both have and need to manage personal smartphones and tablets in the office. This is especially true given that a new wave of devices is already on the horizon – wearables.
While it should still be a priority and must be addressed, mobile UC is expected to get a little more complicated in 2014. Much in the same way that tablets and smartphones started popping up in offices all over the world, wearable tech like Google Glass and the iWatch are highly-anticipated tools that will, with great certainty, enter the workplace.
These tools will ultimately be able to serve a wide variety of professional purposes, but BYOD strategies will have to be re-examined before wearables arrive. According to Krista Napier, IDC Canada’s manager for mobility research, there is a learning process that must occur for both management and employees regarding how these devices can and cannot be used for communications and other critical purposes.
By Katie Maller, Communications Manager at ShoreTel
Cloud servers offer power, flexibility, reliability, and client friendly hosting for small and medium businesses that have outgrown shared hosting.
New business hosting clients are bombarded with an incredible diversity of different choices for their site’s hosting. It can be a challenge to negotiate the range of platforms and the marketing hype that many hosting companies use to promote their products.
Given the complexity of the hosting market, it’s possible to get decision fatigue and opt for a choice which at first seems to offer great benefits and prices, but may not turn out to be the best choice in the long-run. It can be a pain for a business to move from one hosting company or platform to another — although it’s certainly possible — so it’s best to make a choice that will provide the best foundation for your business well into the future.
With that in mind, in this article we’re going to focus on one form of hosting: the cloud server. Let’s take a look at what a cloud server is, how it differs from other hosting such as shared hosting or a dedicated server, and when it’s the right choice for a business.
A cloud server shares some features with both shared hosting and dedicated server hosting, but with a number of extra features that make it a very different beast from both.
A cloud server is a virtualized server. That means that cloud servers are virtual machines that run on a physical server, which can host multiple virtual cloud servers. Cloud servers are a complete server environment with full root access. They also usually include a guaranteed level of resources like processing power and memory.
To some of you, that might sound exactly the same as a virtual private server, but there are significant differences. The most important difference is the pricing model. Whereas virtual private servers are usually sold with per month contacts, cloud servers are on-demand machines that are charged for by the hour, so users pay only for the resources they use.
The major benefits of cloud servers are:
If you think your business site has outgrown shared hosting and that you need flexibility, scalability, reliability, and a client-friendly payment model, then cloud hosting is for you.
By John Mack / Technical writer for Datarealm
Here is your cloud news round up post for the week.
Front Desk Raises $4 Million to Expand Mobile Cloud Platform – Don’t turn your nose up at Front Desk, as the software startup are preparing for big things. Specifically, Front Desk are looking to process more than $100 million in payments in 2014. Spanning 20 countries with around 1,000 business signed up to make use of Front Desk’s payment offerings, that money could help them to process even more payments on mobile especially, where over 60% of their business takes place. Only around for one year, Jon Zimmerman, Front Desk’s co-founder and CEO says “This has been an incredible first year for Front Desk, and [they are] delighted to secure this financing from such a well-respected group of investors and entrepreneurs. The funding will help [them] step on the gas to meet [their] growing demand.” so that funding will be of good use.
Cloud Startup LoginRadius Raises $1.3 Million in Funding – LoginRadius, the flagship product of a Canadian tech startup called Nya Concepts Inc., has successfully raised $1.3 million in a recent round of funding. The team behind the service, which allows users to register and sign up for websites by way of their Google and Facebook profiles (along with Yahoo, etc.), is set to use the money to “help businesses engage and understand their users by simplifying how users connect to the web. This financing gives [them] additional resources for rapid growth and product innovating so that [they] can continue to transform the way users connect to the web and mobile applications”, according to Rakesh Soni, co-founder and CEO of LoginRadius. The service seems to be useful, and the money will go a long way to furthering that, so it will be interesting to see where the tech goes in the future.
Microsoft Release Details on Oracle on Azure Cloud – It was recently announced that Satya Nadella would be Microsoft’s new CEO, and he was previously one of the driving figures behind Microsoft’s work with the cloud. Now, one of the very first outcomes of that has become apparent as Microsoft have no revealed information on the Oracle on Azure partnership that the tech company have been working on. In a new statement, they have said that “Beginning 12 March, [Microsoft] will charge for the Oracle software running in license included Oracle VMs in addition to [their] charge for the Windows Server VMs in which the Oracle software runs.” but as that’s not set to go live until next month, we’ll keep you posted once we know more.
By Jennifer Livingstone
10 Trending US Cities For Tech Jobs And Startups Traditionally actors headed for Hollywood while techies made a beeline for Silicon Valley. But times are changing, and with technological job opportunities expanding (Infographic), new hotspots are emerging that offer fantastic opportunities for tech jobs and startup companies in the industry. ZipRecruiter, an online recruitment and job…
Understanding the “Insider Threat” The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…
Containerization And The Cloud “Right now, the biggest technology shift in the cloud is a rapid evolution from simple virtual machine (VM) hosting toward containerization’’ says the CTO of Microsoft Azure, Mark Russinovitch, a man who deals with the evolving cloud infrastructure every day. In his words, containerization is “an incredibly efficient, portable, and lightweight…
Digital Marketing Successful digital marketing campaigns are being driven largely by trending technologies, specifically the Internet of Things (IoT), Big Data, and The Cloud. These may be used for a huge number of marketing applications, from optimizing the performance of sports teams to improving science and research, even helping to aid law enforcement. Amazon Web…
Small Business Cloud Computing Trepidation is inherently attached to anything that involves change and especially if it involves new technologies. SMBs are incredibly vulnerable to this fear and rightfully so. The wrong security breach can incapacitate a small startup for good whereas larger enterprises can reboot their operations due to the financial stability of shareholders. Gordon Tan contributed an…
DDoS Attacks October 21st, 2016 went into the annals of Internet history for the large scale Distributed Denial of Service (DDoS) attacks that made popular Internet properties like Twitter, SoundCloud, Spotify and Box inaccessible to many users in the US. The DDoS attack happened in three waves targeting DNS service provider Dyn, resulting in a total of about…
Benefits of Cloud Computing Based on Aberdeen Group’s Computer Intelligence Dataset, there are more than 1.6 billion permutations to choose from when it comes to cloud computing solutions. So what, on the face of it, appears to be pretty simple is actually both complex and dynamic regardless of whether you’re in the market for networking,…
What’s Missing in the IoT? While the Internet of Things has become a popular concept among tech crowds, the consumer IoT remains fragmented. Top companies continue to battle to decide who will be the epicenter of the smart home of the future, creating separate ecosystems (like the iOS and Android smartphone market) in their wake.…
Selecting The Right Cloud Services Provider How to find the right partner for cloud adoption on an enterprise scale The cloud is capable of delivering many benefits, enabling greater collaboration, business agility, and speed to market. Cloud adoption in the enterprise has been growing fast. Worldwide spending on public cloud services will grow at a…
Big Data Analytics Trends As data information and cloud computing continues to work together, the need for data analytics continues to grow. Many tech firms predict that big data volume will grow steadily 40% per year and in 2020, will grow up to 50 times that. This growth will also bring a number of cost…
Cloud Beacons Flying High When Apple debuted cloud beacons in 2013, analysts predicted 250 million devices capable of serving as iBeacons would be found in the wild within weeks. A few months later, estimates put the figure at just 64,000, with 15 percent confined to Apple stores. Beacons didn’t proliferate as expected, but a few…
Online Data Data storage is often a real headache for businesses. Additionally, the shift to the cloud in response to storage challenges has caused security teams to struggle to reorient, leaving 49 percent of organizations doubting their experts’ ability to adapt. Even so, decision makers should not put off moving from old legacy systems to…
The Legal Battle For Privacy In early June 2013, Edward Snowden made headlines around the world when he leaked information about the National Security Agency (NSA) collecting the phone records of tens of millions of Americans. It was a dramatic story. Snowden flew to Hong Kong and then Russia to avoid deportation to the US,…
Data Insecurity In The Cloud Today’s escalating attacks, vulnerabilities, breaches, and losses have cut deeply across organizations and captured the attention of, regulators, investors and most importantly customers. In many cases such incidents have completely eroded customer trust in a company, its services and its employees. The challenge of ensuring data security is far more…
Machine Learning and Data Scientists In a recent study, almost all the businesses surveyed stated that big data analytics were fundamental to their business strategies. Although the field of computer and information research scientists is growing faster than any other occupation, the increasing applicability of data science across business sectors is leading to an exponential…
Cloud-Based Services vs. On-Premises The surface costs might give you pause, but the cost of diminishing your differentiators is far greater. Will a shift to the cloud save you money? Potential savings are historically the main business driver cited when companies move to the cloud, but it shouldn’t be viewed as a cost-saving exercise. There…
Virtual Immersion And Virtual Reality This is a term I created (Virtual Immersion). Ah…the sweet smell of Virtual Immersion Success! Virtual Immersion© (VI) an extension/expansion of Virtual Reality to include the senses beyond visual and auditory. Years ago there was a television commercial for a bathing product called Calgon. The tagline of the commercial was Calgon…
The Rise of BI Data Every few years, a new concept or technological development is introduced that drastically improves the business world as a whole. In 1983, the first commercially handheld mobile phone debuted and provided workers with an unprecedented amount of availability, leading to more productivity and profits. More recently, the Cloud has taken…
Identity and Access Management The identity and access management market continues to grow in a wide variety of industries of all sizes. As has been much discussed in many headlines, this is primarily because of three main reasons: 1) It is much more cost effective to implement than in past years; 2) Solutions can be…