Author Archives: CloudTweaks

iWeb Launches Microsoft Private Cloud Hosting

iWeb Launches Microsoft Private Cloud Hosting

Cloud scalability on dedicated private infrastructure takes business IT to the next level

MONTREAL, QUEBEC (January 30, 2014) – iWeb, Canada’s leading cloud service provider, today announced its new Microsoft Private Cloud service, designed to give businesses complete control and flexibility of their IT infrastructure. Businesses can now choose the Microsoft Private Cloud to quickly add or scale up virtual servers as needed, without the expense or complexity of deploying their own data centers and network infrastructure.iWeb

Available immediately, the Microsoft Private Cloud from iWeb takes IT to the next level, allowing businesses to use virtualization to build a software defined data center hosted at iWeb, but managed by their own IT teams. iWeb’s dedicated infrastructure is fully-managed in the company’s state-of-the-art data centers and delivered on one of the world’s most reliable networks, with guaranteed Service Level Agreements and 24/7 support.

With the Microsoft Private Cloud from iWeb, businesses can:

• Extend their in-house data center or move specific workloads to a hosted environment;
• Alleviate concerns about in-house data center space, power and cooling;
• Eliminate capital expenditure for storage infrastructure which potentially addresses in-house data center space;
• Take advantage of on-demand flexibility with virtualization and cloud technologies; and
• Address data sovereignty issues as iWeb provides hosting within Canadian data centers.

With businesses turning to the cloud more so than ever before, the Microsoft Private Cloud from iWeb provides the best of both worlds with cloud scalability on dedicated private infrastructure,” said Christian Primeau, President and COO of iWeb. “Our team provides rapid deployment, state-of-the-art data centers and network infrastructure, all supported by top-notch professional services, freeing up customers to focus on their core business.

The Microsoft Private Cloud from iWeb is available to organizations as an extension or backup for their in-house data center, or to leverage a hosted environment for specific workloads. iWeb is a leading Microsoft Canadian Cloud OS Network Partner. For more information about the Microsoft Private Cloud from iWeb, visit http://iweb.com/cloud/private/microsoft.

About iWeb

iWeb, an Internap company, provides the on-demand server and cloud infrastructure that allows over 10,000 customers in more than 150 countries worldwide to deliver today’s Internet-based technologies and to create tomorrow’s online innovations. Since 1996, Montreal-based iWeb has been rated among the world’s top web infrastructure providers based on performance and reliability and among Canada’s fastest growing companies. iWeb’s network continues to rank among the most reliable in the world, according to independent internet researcher Netcraft. For more information, visit http://iweb.com.

Online File Sharing And The Importance Of Security

Online File Sharing And The Importance Of Security

Online File Sharing

Do you have confidential business files stored on your work computer? Maybe it’s a spreadsheet for a report that must be delivered to management tomorrow. If you don’t work on it from home, you’ll be at the office all night. As a trusted member of your company, you are authorized to view this type of data. The question is once you put the data on your laptop and take it home, how secure is it?

Computer-Virus-Statistics

Lost and Stolen Equipment

The Ponemon Institute conducted a survey of 329 organizations that had 86,000 laptops lost or stolen over a one-year period. While physically replacing a laptop is certainly expensive, Ponemon explained that the value of the lost hardware represented only a small portion of the estimated cost. Much more expensive was the value of intellectual property on these laptops and the fees associated with data breaches and statutory notification requirements. The average cost to replace the data on the laptop was $49,246.

Spyware

After working in the IT industry for a number of years, I’ve heard many examples of spyware. Many times, this is a result of, “I let my child use my laptop for a little while, and now it’s infected.

This problem frequently occurs when someone borrows your laptop and accidentally goes to a compromised site that is infected with spyware or maybe a virus. As a result, the laptop can become unstable and has to be rebuilt. According to BrandonGaille.com, 53% of all computer users have had some kind of experience with malware infection. Important files should not become a victim of this catastrophe.

Is Encryption The Answer?

Some businesses see encryption as a way to store confidential business data and protect files. This secures data so that only individuals with the proper software and decryption key can access the information. While this may sound like a great solution, encryption can be difficult to work with in a collaborative professional environment.

Proper decryption tools must be installed on computers in order to decrypt and access the data. Additionally, it becomes very difficult to share files externally as even after the encrypted data has been transmitted; the remote company must have the appropriate decryption tools in order to access the file. This can take time and ultimately slow down your file sharing process.

Online File Sharing – Secure & Accessible Data

Online file sharing is a great option for protecting cloud-based files. Since files can only be accessed with a secure login, approved users are the only ones that can access them. Since the files are stored in the cloud, any viruses that affect your hard drive do not affect your securely stored files.

Online file sharing can provide secure data that is independent of hardware failures, loss, spyware, or other mishaps that can happen to business users on a daily basis. Online file sharing can allow your company to easily share your data between employees while providing the security you need to protect your company’s most important asset; it’s data.

By Charles Mount / CEO of Onehub.com

(Infographic Source: BrandonGaille.com)

Coke’s Internal Data Breach – Lessons Learned

Coke’s Internal Data Breach – Lessons Learned

Coke’s Internal Data Breach

Last Friday, Coke announced that sensitive information belonging to roughly 70,000 current and former North American employees was compromised because the data hadn’t been encrypted on company laptops (despite their company encryption policy.)1 The data breach occurred after a former worker stole several company laptops that locally stored employee information, such as social security and driver’s license numbers.

We’ve heard a lot about security breaches lately (Target and Neiman Marcus come to mind), but cases like Coke’s – a major breach of workers’ personal information – happen more than we realize. How can large and small companies alike learn from Coke’s recent internal breach? And what steps can we take to avoid ever experiencing an internal security breach ourselves?

The answer lies in the cloud. Simply put, cloud-stored data offers a highly secure alternative to locally-stored data. When sensitive information is no longer stored on devices that are regularly available to employees and the occasional passersby, the chances of that data being compromised drastically decreases. Cloud-stored data, generally speaking, can be accessed via remote devices over encrypted connections and do not require downloading to a local device. Local devices can enable data encryption, of course, and that certainly lowers theft and data breach risks, but by avoiding housing data locally altogether, consistent and thorough security can truly be maintained.

Another example of the perils of locally-stored data comes to mind right about now. One of the largest settlements for violating the Health Insurance Portability and Accountability Act (HIPAA) occurred when an Alaska Department of Health and Social Services employee left a portable hard drive containing the personal health information of thousands of patients in their car. It wasn’t long before the employee realized that the hard drive had been stolen. This security breach cost DHSS $1.7 million, and could have been entirely avoided if DHSS had stored its sensitive data off-premise and in the cloud.

Internal Security Measures

It may feel counterintuitive to move sensitive data farther away from you, in an effort to increase your internal security measures. But the fact is cloud hosting providers have extensive experience developing powerful safeguards and monitoring systems such as firewalls, intrusion protection systems, file integrity monitoring systems, encryption algorithms and virtual private networks. Given their decades of experience in managing large datacenters, cloud providers are well accustomed to properly disposing hard drives and backup devices. (In fact, secure data deconstruction has long been a crucial and appealing feature of cloud service providers.) Vulnerability scans serve as another crucial security asset offered by cloud providers, and allow organizations to detect disabled firewalls or any other potential security holes.

From vulnerability scans, to proper data destruction, to a central and secure ‘home’ for sensitive, internal data, cloud providers truly offer the utmost in security and can serve as trusted advisors for mitigating internal data breaches. Rather than joining the growing list of organizations, like Coke, who’ve had to overcome internal security breaches, lets all look to the cloud to maintain consistent and thorough security, both inside and out.

By Scott Walters, Director of Security at INetU

ScottWalters

Scott is the Director of Security for hybrid-cloud hosting provider INetU and has been instrumental in shaping the Company’s client services department, which provides customer onboarding and lifecycle support. Under his tenure as director of client services, Walters expanded the department to meet customer needs as the company introduced new cloud products, enhanced service levels for enterprise customers and most recently released the robust INetU Security Suite.

IO To Get Into The Cloud Computing Business

IO To Get Into The Cloud Computing Business

Cloud news round up for the week.

IO-Cloud

IO To Get Into the Cloud Computing Business – Usually putting all of their manpower into modular data by running modular data centers, IO are reportedly set to get into the cloud computing business. Launching a new service that is aptly titled ‘IO. Cloud’, their brand new cloud powered servers will be built using Open Compute server designs and will run on the OpenStack cloud computing operating system, ensuring that things run smoothly even with shedloads of data. The IO. Cloud website describes the decision to use Cloud Computing with the following, “IO. Cloud is built on Open Compute because it provides [their] engineers with the flexibility to configure and optimize the hardware specifically for cloud scale deployments”.

Is Angry Birds Being Mined for Data by the NSA? – According to recent reports, the answer to that question is ‘yes’. It has come to light that many social networking, mapping and gaming apps are being used to collect data from users, due to the fact that many people are willing to share their data with them. Many people sign up to accounts within these apps using their email addresses and phone numbers and even their credit card details, making it a good place to start for a government organization that collects these things. It is also said that GCHQ, the UK intelligence agency, has been working with the NSA on this data mining project.

Lenovo To Focus On Cloud Tech After Buying IBM ServersIt has been a week since the Chinese hardware maker, Lenovo Group, announced that they are planning to buy IBM’s x86 server business for the pricey cost of $2.3 billion USD, a move that comes almost a decade after Lenovo bought IBM’s PC group. Not only is this a big business move for Lenovo, who are the world’s largest PC maker, it also signals a reshuffling within the company’s organization. From April 1st, it is being reported, Lenovo will restructure to their business to operate four business units, including mobile, enterprise, PC and cloud, a decision that is said to reflect Lenovo’s strategy to grow beyond their PC business.

By Jennifer Livingstone

CenturyLink Technology Solutions Uses IO Technology To Open Multi-Megawatt Data Centers

CenturyLink Technology Solutions Uses IO Technology To Open Multi-Megawatt Data Centers

MONROE, La., and PHOENIX – January 29, 2014 – CenturyLink (NYSE: CTL) and IO today announced a strategic agreement to expand the CenturyLink Technology Solutions colocation footprint using IO’s Intelligent Control technology platform, with initial deployments at IO Phoenix and nearby IO Scottsdale.
century link

CenturyLink Technology Solutions, which formerly operated under the name Savvis, will enter the Phoenix market as a hosting and colocation provider, making up to 9 megawatts of additional capacity available to its clients through rapidly deployable IO technology. CenturyLink has a deep understanding of the Phoenix market, where it maintains a substantial network services business and employs more than 1,700 employees.

The IO Intelligent Control technology platform consists of IO.Anywhere® data center modules and the integrated IO.OS® data center operating system, which provides integrated control, data collection and business intelligence across data center infrastructure, IT equipment, applications and users of the data center. In the CenturyLink data center space, IO’s technology will be complemented by CenturyLink’s broad set of colocation, managed services, cloud and network offerings. Clients will also gain access to CenturyLink’s ClientConnect, an online gateway for businesses to expand their capabilities by locating, connecting and sharing services with other businesses residing across CenturyLink’s global data center footprint.

CenturyLink continues to invest in expanding our global data center footprint into key markets like Phoenix and extending our hosting capabilities through new technologies like IO’s Intelligent Control platform,” said Jeff Von Deylen, president of CenturyLink Technology Solutions. “The pioneering IO technology enhances our product mix with the latest options for delivering flexible hybrid IT solutions. IO’s energy-efficient data center technology platform can be deployed just-in-time, helping us to preserve capital and enabling our clients to reduce costs and operate more efficiently.

With its immense global footprint, world-class data center capabilities and Savvis legacy, CenturyLink Technology Solutions is a major force in the industry,” said George D. Slessman, IO chief executive officer and product architect. “We believe CenturyLink’s substantial commitment to IO technology further validates that our Intelligent Control platform can meet the demands of large-scale, global service providers.”

Armed with IO’s prefabricated modular technology and proprietary data center operating system, CenturyLink is rounding out its digital infrastructure offering by combining a sophisticated, agile and intuitive data center platform with its deep stack of IT services, optimizing customer scalability and management capabilities,” said Michael Levy, data centers senior analyst at 451 Research.

This strategic agreement with IO follows recent CenturyLink announcements regarding investments in its hosting capabilities, including the acquisitions of Tier 3 and AppFog and data center construction projects in Toronto and Minneapolis. CenturyLink operates more than 50 data centers worldwide, with more than 2.5 million square feet of gross raised floor space throughout North America, Europe and Asia.

About CenturyLink Technology Solutions

CenturyLink Technology Solutions delivers innovative managed services for global businesses on virtual, dedicated and colocation platforms. For more information, visit www.centurylink.com/technology.

About CenturyLink

CenturyLink is the third largest telecommunications company in the United States and is recognized as a leader in the network services market by technology industry analyst firms. The company is a global leader in cloud infrastructure and hosted IT solutions for enterprise customers. CenturyLink provides data, voice and managed services in local, national and select international markets through its high-quality advanced fiber optic network and multiple data centers for businesses and consumers. The company also offers advanced entertainment services under the CenturyLink® Prism™ TV and DIRECTV brands. Headquartered in Monroe, La., CenturyLink is an S&P 500 company and is included among the Fortune 500 list of America’s largest corporations. For more information, visit www.centurylink.com.

About IO

IO is a global leader in software-defined data centers and has pioneered the next generation of data center infrastructure technology. IO’s integrated hardware and software data center technology platform offers enterprises, governments, and service providers an innovative way to deploy, provision, and optimize data center capacity anywhere in the world. IO technology lowers the total cost of data center ownership compared to traditional data centers, enabling dynamic deployment and intelligent control based on the needs of IT equipment and applications in the data center.

Cloud Infographic: Most Used Cloud Apps

Cloud Infographic: Most Used Cloud Apps

Most Used Cloud Apps 

Cloud app and analytics company, Netskope released its quarterly Cloud Report. The new report reveals that enterprise employees are using an average of 397 different cloud apps (most of which are unsanctioned), when IT estimated they have 40-50 — that’s a tenfold underestimation.

Below is an infographic provided courtesy of the group at Netskope which goes into further detail.

Cloud-Report-2014

Infographic Source: Netskope

Zenoss Cloud Monitoring Wins Virtualization Review Reader’s Choice Award

Zenoss Cloud Monitoring Wins Virtualization Review Reader’s Choice Award

Zenoss

AUSTIN, TX–(Marketwired – Jan 28, 2014) – Zenoss Inc., the leading provider of unified IT monitoring and management solutions for physical, virtual, and cloud-based IT, today announced that Zenoss’ comprehensive cloud monitoring solution, Zenoss Service Dynamics, is an Editor’s Choice recipient in the 2014 Virtualization Review Reader’s Choice Awards.Virtualization Review is the first and only print publication solely devoted to IT virtualization and cloud technologies. The 2014 awards are chosen by the readers of Virtualization Reviewand presented to vendors in 16 categories ranging from Mobile Virtualization and Cloud Storage to Business Continuity and Virtualization Automation.

There was a lot of consolidation this year, but there were quite a few new companies who emerged from stealth mode and debuted new products and services, showing that there is still room for innovation in this technology segment,” said Virtualization Review Editor in Chief Michael Domingo. “VMware might have looked like the readers’ champion, but it has a lot to do with the solid work they’ve done with every product line. Still, some of the categories came close and we expect them to give VMware some true competition next year.”

E-mail invitations were sent to Virtualization Review readers in October 2013 to vote on more than 400 products. Responses were collected during a two-week period. A team of editors reviewed the results to ensure that they legitimately came from our readers. Vendors were excluded from the voting process nor were they, in anyway, allowed to solicit votes.

“We are delighted to be recognized by the editors of Virtualization Review for our Cloud Monitoring capabilities,” said Bill Karpovich, CEO & Co-Founder of Zenoss. “Virtualization Review has selected a group of high-caliber companies within the virtualization and cloud computing technology space. We are honored to be included among these innovative companies.”

Virtualization Review is the leading vendor ecosystem advocate, and the Reader’s Choice Awards and associated Buyer’s Guide provide a great resource for IT organizations working to optimize their virtual environments with advanced, innovative solutions.

The winners are highlighted in the December 2013/January 2014 issue. A downloadable PDF of the article is also available at: http://virtualizationreview.com

About Virtualization Review
1105 Enterprise Computing Group’s Virtualization Review is the independent guide to the products, vendors, issues and technologies transforming IT through virtualization and cloud computing. Virtualization Review is the only print publication specifically targeting those IT executives, directors and administrators on the leading edge of this revolution. Visit the Web site for news, analysis, trends, product reviews, roadmaps and best practices on all aspects of IT virtualization including servers, storage, PCs, desktops, applications, management and more.

About Zenoss
Zenoss is a leading provider of unified IT monitoring and management software for physical, virtual, and cloud-based IT infrastructures. Over 35,000 organizations worldwide have deployed Zenoss to manage their networks, servers, virtual devices, storage, and cloud infrastructure, gaining visibility and control of their IT operations.

CloudTweaks Comics
Internet Of Things – Industrial Robots And Virtual Monitoring

Internet Of Things – Industrial Robots And Virtual Monitoring

Internet Of Things – Industrial Robots And Virtual Monitoring One of the hottest topics in Information and Communication Technology (ICT) is the Internet of Things (IOT). According to the report of International Telecommunication Union (2012), “the Internet of things can be perceived as a vision with technological and societal implications. It is considered as a…

SaaS And The Cloud Are Still Going Strong

SaaS And The Cloud Are Still Going Strong

SaaS And The Cloud With the results of Cisco Global Could Index: 2013-2018 and Hosting and Cloud Study 2014, predictions for the future of cloud computing are notable. Forbes reported that spending on infrastructure-related services has increased as public cloud computing uptake spreads, and reflected on Gartner’s Public Cloud Services Forecast. The public cloud service…

The Future of M2M Technology & Opportunities

The Future of M2M Technology & Opportunities

The Future Of The Emerging M2M Here at CloudTweaks, most of our coverage is centered around the growing number of exciting and interconnected emerging markets. Wearable, IoT, M2M, Mobile and Cloud computing to name a few. Over the past couple of weeks we’ve talked about Machine to Machine (M2M) such as the differences between IoT and…

The Questions of Privacy In The Internet of Things Revolution

The Questions of Privacy In The Internet of Things Revolution

Privacy in the Internet of Things Revolution The Internet of Things (IoT) has been promising a lot to consumers for a few years and now we’re really starting to see some of the big ideas come to fruition, which means an ever-growing conversation around data security and privacy. Big data comes with big responsibilities and…

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud Cloud computing is more than just another storage tier. Imagine if you’re able to scale up 10x just to handle seasonal volumes or rely on a true disaster-recovery solution without upfront capital. Although the pay-as-you-go pricing model of cloud computing makes it a noticeable expense, it’s the only solution for many…

Utilizing Digital Marketing Techniques Via The Cloud

Utilizing Digital Marketing Techniques Via The Cloud

Digital Marketing Trends In the past, trends in the exceptionally fast-paced digital marketing arena have been quickly adopted or abandoned, keeping marketers and consumers on their toes. 2016 promises a similarly expeditious temperament, with a few new digital marketing offerings taking center stage. According to Gartner’s recent research into Digital Marketing Hubs, brands plan to…

Disaster Recovery And The Cloud

Disaster Recovery And The Cloud

Disaster Recovery And The Cloud One of the least considered benefits of cloud computing in the average small or mid-sized business manager’s mind is the aspect of disaster recovery. Part of the reason for this is that so few small and mid-size businesses have ever contemplated the impact of a major disaster on their IT…

Using Big Data To Analyze Venture Capitalists’ Ability To Recognize Potential

Using Big Data To Analyze Venture Capitalists’ Ability To Recognize Potential

Big Data To Analyze Using Big Data to Analyze Venture Capitalists’ Ability To Recognize Potential For those who are regularly involved with SMEs, venture capital, and company valuations, it is common knowledge that start-ups that exit for more than $1 billion dollars are extremely rare – often termed ‘unicorn’ companies. Despite their rarity, it should…

Infographic: The Evolving Internet of Things

Infographic: The Evolving Internet of Things

Evolving Internet of Things  The Internet of Things, or IoT, a term devised in 1999 by British entrepreneur Kevin Ashton, represents the connection of physical devices, systems and services via the internet, and Gartner and Lucas Blake’s new infographic (below) explores the evolution of the IoT industry, investigating its potential impact across just about every…

Infographic Introduction – Benefits of Cloud Computing

Infographic Introduction – Benefits of Cloud Computing

Benefits of Cloud Computing Based on Aberdeen Group’s Computer Intelligence Dataset, there are more than 1.6 billion permutations to choose from when it comes to cloud computing solutions. So what, on the face of it, appears to be pretty simple is actually both complex and dynamic regardless of whether you’re in the market for networking,…

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups Cloud platforms have become a necessary part of modern business with the benefits far outweighing the risks. However, the risks are real and account for billions of dollars in losses across the globe per year. If you’ve been hacked, you’re not alone. Here are some other companies in the past…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Hyperconverged Infrastructure In this article, we’ll explore three challenges that are associated with network deployment in a hyperconverged private cloud environment, and then we’ll consider several methods to overcome those challenges. The Main Challenge: Bring Your Own (Physical) Network Some of the main challenges of deploying a hyperconverged infrastructure software solution in a data center are the diverse physical…

Don’t Be Intimidated By Data Governance

Don’t Be Intimidated By Data Governance

Data Governance Data governance, the understanding of the raw data of an organization is an area IT departments have historically viewed as a lose-lose proposition. Not doing anything means organizations run the risk of data loss, data breaches and data anarchy – no control, no oversight – the Wild West with IT is just hoping…

Having Your Cybersecurity And Eating It Too

Having Your Cybersecurity And Eating It Too

The Catch 22 The very same year Marc Andreessen famously said that software was eating the world, the Chief Information Officer of the United States was announcing a major Cloud First goal. That was 2011. Five years later, as both the private and public sectors continue to adopt cloud-based software services, we’re interested in this…

Cloud-Based or On-Premise ERP Deployment? Find Out

Cloud-Based or On-Premise ERP Deployment? Find Out

ERP Deployment You know how ERP deployment can improve processes within your supply chain, and the things to keep in mind when implementing an ERP system. But do you know if cloud-based or on-premise ERP deployment is better for your company or industry? While cloud computing is becoming more and more popular, it is worth…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

Beacons Flopped, But They’re About to Flourish in the Future

Beacons Flopped, But They’re About to Flourish in the Future

Cloud Beacons Flying High When Apple debuted cloud beacons in 2013, analysts predicted 250 million devices capable of serving as iBeacons would be found in the wild within weeks. A few months later, estimates put the figure at just 64,000, with 15 percent confined to Apple stores. Beacons didn’t proliferate as expected, but a few…

Using Private Cloud Architecture For Multi-Tier Applications

Using Private Cloud Architecture For Multi-Tier Applications

Cloud Architecture These days, Multi-Tier Applications are the norm. From SharePoint’s front-end/back-end configuration, to LAMP-based websites using multiple servers to handle different functions, a multitude of apps require public and private-facing components to work in tandem. Placing these apps in entirely public-facing platforms and networks simplifies the process, but at the cost of security vulnerabilities. Locating everything…