Category Archives: Uncategorized

Effective Security Management In A Software Defined World

Effective Security Management In A Software Defined World

Effective Security Management

Software defined infrastructure (SDx) along with use of private and public cloud technology is completely changing the way IT departments manage enterprise data centers and application workloads. Automation is a key component of software defined networking (SDN), bringing network, server, storage, security management and other IT functional teams together to transform the data center from a hardware-focused to an application-focused environment.

In the past when organizations deployed new applications, the application owner needed to collaborate with several disparate teams. For example: one team was responsible for installing the required server hardware and operating systems, another team was responsible for connecting the new servers to the network, and yet another team was responsible for provisioning the security and firewall rules.

the-moon

It was as if the stars, planets and moons (or in this case all the functional teams) had to align in order for all of the necessary components to be provisioned. Then, and only then, could the application owners’ start using the new infrastructure. The result of all these tasks was it would take weeks or even months before the infrastructure was ready and the new application could start to be rolled out.

Today, private and public cloud infrastructures allow IT to automate these manually intensive operations; virtual machines are dynamically created and deployed, operating systems are quickly and easily provisioned, and connecting new services to the network is streamlined and automatic. As a result, pre-configured templates of commonly used and well defined services are available to the application owner. With a single click on a self-service portal, applications can now be quickly provisioned across multiple data centers, within or among private and public clouds.

In this software defined world where new apps are instantly created or moved to a different location as the infrastructure gets provisioned, changed and elastically scaled based on demand, security officers are challenged to enforce security policies and retain full visibility of security incidents. In fact, security often lags far behind the application developer’s ability to provision new infrastructure since traditional security controls remain fixed at protecting the network perimeter and don’t easily extend into the highly dynamic and automated software defined infrastructure. As such, security remains a key challenge for organizations looking to get full visibility and control of their threat landscape and plug any vulnerabilities in their cloud-based environments.

It turns out the keys to getting control back are creating dynamic security policies, API scoping and security management consolidation.

Creating Dynamic Security Policies

Dynamic security policies in modern networks are achieved by close integration with network virtualization and public IaaS solutions like VMware NSX, Cisco ACI, OpenStack, AWS or Microsoft Azure. By tightly integrating with these solutions, objects defined by those systems such as groups and tags can be learned and utilized in network security policies. This allows for the creation of dynamic security policies where changes in the software-defined environment are immediately translated and instantly reflected into an effective and active security policy that is applied to all traffic automatically – without human intervention.

cloud_21

Exposed or published APIs in popular SDN or cloud services controllers provides the logical integration point for creating dynamic security policies. Data defined by the controller – such security groups, VM or host names, tags, and more – can be exchanged with network security tools to create meaningful context for both security personnel and network administrators. Now, instead of arbitrary or meaningless IP addresses, the security in a software-defined network can leverage meaningful information about the network to ensure the right policies always follow application data and workloads – wherever they go.

Additionally, leveraging and populating this contextual information in log files gives security admins the ability to better understand and investigate any security incident. Security solutions for cloud-based networks must be able to integrate with leading cloud and network virtualization tools to not only provide advanced threat protection for both east-west and north-south traffic but also make use of dynamic cloud and other SDN objects in the security policy and logs for effective security management.

API scoping

In order to completely automate the deployment of new applications, organizations need to grant developer’s access to APIs that in many cases involve modification of security policies. It is vital to ensure this access is scoped or limited appropriately; otherwise, a mistake by a developer could potentially alter the security policy of the entire organization making it vulnerable to threats.

Scoping access to APIs example:

The printer admin use an app to add printers to the network. In doing so, this involves modifying firewall rules using an API. The security policy must ensure that the printer application can only add new printers – nothing else – and is only permitted within relevant network segments.

Incorporating sub policies in the security management solution is the best way to allow scoping API access down to a rule level, thus eliminating the possibility of inadvertently modifying the security posture and exposing the entire organization to new threats. This also ensures delegation of administrative duties down to specific use cases to streamline security management while maintaining oversight of all activities.

Security Management Consolidation

Consolidation of management functions is necessary to gain complete and holistic visibility of security policies and incidents across the entire organization’s infrastructure. Without management consolidation incidents are difficult to identify, correlate and analyze across the various cloud networks, making it operationally impossible to secure these environments.

The new software-defined infrastructure is complex, constantly changing and being driven by functional teams who don’t always understand the security implications that come from defining new infrastructure. In addition, organizations still have physical or legacy networks to maintain. It is now more difficult than ever to get a handle on not only where data center traffic goes – north-south, east-west, virtual and physical, private and public cloud – but how exposed an organization’s infrastructure is to vulnerabilities and threats.

Cloud-based security solutions must be able to provide customers with a unified solution that consolidates policy management, visibility and reporting across private and public clouds – all from a single pane of glass. It should be intuitive and scalable enough to handle security deployments wherever customer data goes while providing detailed analysis and correlation of security events across the entire enterprise network.

By Yoav Shay Daniely

Security: Avoiding A Hatton Garden-Style Data Center Heist

Security: Avoiding A Hatton Garden-Style Data Center Heist

Data Center Protection

In April 2015, one of the world’s biggest jewelry heists occurred at the Hatton Garden Safe Deposit Company in London. Posing as workmen, the criminals entered the building through a lift shaft and cut through a 50cm-thick concrete wall with an industrial power drill. Once inside, the criminals had free and unlimited access to the company’s secure vault for over 48 hours during the Easter weekend, breaking into one safety deposit box after another to steal an estimated $100m worth of jewelry.

So why weren’t the criminals caught? How did they have free reign into all of the safety deposit boxes? It turns out that the security systems only monitored the perimeter, not inside the vault. Despite the burglars initially triggering an alarm to which the police responded, no physical signs of burglary were found outside the company’s vault. So the perpetrators were able to continue their robbery uninterrupted. In other words, the theft was made possible by simply breaching the vault’s perimeter – once the gang was inside, they could move around undetected and undisturbed.

952px-hatton_garden_safe_deposit_ltd

(Image Source: Wikipedia)

Most businesses do not have store gold, diamonds or jewelry. Instead, their most precious assets are data. And they’re not stored in reinforced vaults, but in data centers. Yet in many cases, both vaults and data centers are secured against breaches in similar ways. Organizations often focus on reinforcing the perimeter and less on internal security.

If attackers are able to breach the external protection, they can often move inside the data center from one application to the next, stealing data and disrupting business processes for some time before they are detected – just like the criminal gang inside the Hatton Garden vault were able to move freely and undetected. In some recent data center breaches, the hackers had access to applications and data for months, due to lack of visibility and internal security measures.

Security Challenges in Virtualized Environments

This situation is made worse as enterprises move from physical data center networks to virtualized networks – to accelerate configuring and deploying applications, reduce hardware costs and reduce management time. In this new data center environment, all of the infrastructure elements – networking, storage, compute and security – are virtualized and delivered as a service. This fundamental change means that the traditional security approaches of securing the network’s perimeter is no longer suitable to address the dynamic virtualized environment.

Main security challenges are:

Traffic behavior shifts – Historically, the majority of traffic was ‘north-south’ traffic, which crosses the data center perimeter and is managed by traditional perimeter security controls. Now, intra-data center ‘east-west’ traffic has drastically increased, as the number of applications has multiplied and those applications need to interconnect and share data in order to function. With the number of applications growing, hackers have a wider choice of targets: they can focus on a single low-priority application and then use it to start moving laterally inside the data center, undetected. Perimeter security is no longer enough.

Manual configuration and policy changes – In these newly dynamic data centers, traditional, manual processes for managing security are too slow, taking too much of the IT team’s time – which means security can be a bottleneck, slowing the delivery of new applications. Manual processes are also prone to human errors which can introduce vulnerabilities. Therefore, automating security management is essential to enable automated application provisioning and to fully support data center agility.

Until recently, delivering advanced threat prevention and security technologies within the data center would involve managing a large number of separate VLANs and keeping complicated network diagrams and configuration constantly up-to-date using manual processes. In short, an unrealistically difficult and expensive management task for most organizations.

Micro-segmentation: armed guards inside the vault

But what if we could place the equivalent of a security guard on every safety deposit box in the vault so that even if an attacker breaches the perimeter, there is protection for every valuable asset inside? As data centers become increasingly software-defined with all functions managed virtually, this can be accomplished by using micro-segmentation in the software-defined data center (SDDC).

Micro-segmentation works by coloring and grouping resources within the data center with communication between those groups applied with specific dynamic security policies. Traffic within the data center is then directed to virtual security gateways. The traffic is deeply inspected at the content level using advanced threat prevention techniques to stop attackers attempting to move laterally from one application to another using exploits and reconnaissance techniques.

Whenever a virtual machine or server is detected executing an attack using the above techniques, it can be tagged as infected and immediately quarantined automatically by the ‘security guard’ in the data center: the security gateway. This way, a system breach does not compromise the entire infrastructure.

Once an application is added and evolves over time, it is imperative for the security policy to instantly apply and automatically adapt to the dynamic changes. Using integration to cloud management and orchestration tools, the security in the software defined data center learns about the role of the application, how it scales and its location. As a result, the right policy is enforced enabling applications inside the data center to securely communicate with each other. For example, when servers are added or an IP address changes, the object is already provisioned and inherits the relevant security policies removing the need for a manual process.

Just as virtualization has driven the development of scalable, flexible, easily-managed data centers, it’s also driving the next generation of data center security. Using SDDC micro-segmentation delivered via an integrated, virtualized security platform, advanced security and threat prevention services can be dynamically deployed wherever they are needed in the software-defined data center environment. This puts armed security guards around inside the organization’s vault, protecting each safety deposit box and the valuable assets they hold – helping to stop data centers falling victim of a Hatton Garden-style breach.

By Yoav Shay Daniely

HP and Paramount Pictures Partner in Star Trek Beyond

HP and Paramount Pictures Partner in Star Trek Beyond

Hewlett Packard Enterprise and Paramount Pictures 

HPE Film Integrations and New Ad Campaign Feature Futuristic Concept Technologies Inspired by The Machine

PALO ALTO, CA–(Marketwired – Jun 6, 2016) – Hewlett Packard Enterprise (NYSE: HPE) has teamed with Paramount Pictures to imagine technology 250 years into the future for the upcoming Star Trek Beyond feature film from Paramount Pictures and Skydance set for worldwide release beginning July 20. The upcoming film will include several futuristic concept technologies created exclusively for the movie based on HPE’s The Machine, a groundbreaking research project being developed by the company. Also in connection with the film, HPE will debut a new advertising campaign featuring The Machine, the first prototype of which is slated to launch later this year.

As the official enterprise technology partner for Star Trek Beyond, HPE designers and researchers worked closely alongside the filmmaking team to design futuristic technologies that could one day be powered by The Machine and that would contribute to bringing the world of Star Trek Beyond to life.

This collaboration presented a unique backdrop against which we could highlight the vast potential of The Machine,” said Henry Gomez, Chief Marketing and Communications Officer, Hewlett Packard Enterprise. “Star Trek has a long tradition of boldly enabling us to imagine mankind’s future. The Machine will reinvent computing architecture from the ground up, so the connection to the film’s exciting technologies is easy to envision.

Planets definitely aligned for this HPE partnership with Star Trek Beyond given the timing of the launch of The Machine technology and the film’s release,” said LeeAnne Stables, President of Worldwide Marketing Partnerships and Licensing for Paramount Pictures. “It was exciting to see the HPE designers working in a room with our creative teams to infuse actual future world technology into this action-packed film. We know movie audiences around the world love seeing what’s ahead.”

HPE’s The Machine project is focused on reinventing the computing architecture on which all computing is currently based — from smart phones to data centers to super computers. It aims to break through the limitations of today’s computing, enabling a massive and essential leap forward in computing performance and efficiency.

The Machine plans to use light, called photonics, for communications rather than copper wires; it aims to make the “save” button a concept of the past, instead capturing, and remembering, everything in memory as it is created and even after it’s turned off; and it plans to revolutionize how security is embedded throughout a computer.

The Machine technologies are currently being designed to address technological challenges in the not-so-distant future — from dealing with the massive quantities of data generated through connected devices to being able to translate health data from millions of people into solutions for the healthcare industry.

The new HPE advertising campaign, Accelerating Beyond, will feature Star Trek Starfleet Academy recruits in a world powered by The Machine 250 years in the future. It is designed to illustrate the progress that could one day be achieved through the lens of The Machine technology. The campaign, which will include :60 and :30 second television ads, shot in a futuristic landscape in Iceland along with digital treatments, will debut at HPE’s Discover Las Vegas conference, June 7-9. It will begin rotation widely on July 1.

Star Trek Beyond will be in theaters beginning July 22.

About Hewlett Packard Enterprise
Hewlett Packard Enterprise is an industry-leading technology company that enables customers to go further, faster. With the industry’s most comprehensive portfolio, spanning the cloud to the data center to workplace applications, our technology and services help customers around the world make IT more efficient, more productive and more secure.

About Star Trek Beyond

“STAR TREK BEYOND,” the highly anticipated next installment in the globally popular Star Trek franchise, created by Gene Roddenberry and reintroduced by J.J. Abrams in 2009, returns with director Justin Lin (“The Fast and the Furious” franchise) at the helm of this epic voyage of the U.S.S. Enterprise and her intrepid crew. In “Beyond,” the Enterprise crew explores the furthest reaches of uncharted space, where they encounter a mysterious new enemy who puts them and everything the Federation stands for to the test.

From Paramount Pictures and Skydance, “STAR TREK BEYOND” is a Bad Robot, Sneaky Shark, Perfect Storm Entertainment production. The film stars John Cho, Simon Pegg, Chris Pine, Zachary Quinto, Zoë Saldana, Karl Urban, Anton Yelchin and Idris Elba. Directed by Justin Lin, the third film in the franchise series is produced by J.J. Abrams, Roberto Orci, Lindsey Weber, and Justin Lin; and executive produced by Jeffrey Chernov, David Ellison, Dana Goldberg, and Tommy Harper. Based upon “Star Trek” created by Gene Roddenberry, the screenplay is written by Simon Pegg & Doug Jung.

STAR TREK BEYOND” opens in U.S. theaters July 22, 2016.

The Week In Tech: Twitter, Apple and Microsoft Make Waves

The Week In Tech: Twitter, Apple and Microsoft Make Waves

Week In Tech

In a sign that multi-national corporations are assuming more of the roles once associated with government, Facebook and Microsoft teamed up this week to announce plans to lay 4 000 miles of cable under the Ocean from Virginia Beach, USA to Bilbao, Spain. “The companies said the system — designed to support the fast-growing demand for cloud and online services — will be the highest-capacity subsea cable ever across that span. Composed of eight fiber pairs, the cable will have an initial estimated data-carrying capacity of 160 terabytes per second.

This development confirms how Facebook sees its future growth as being dependent on bandwidth heavy multi-media content and is likely to perpetuate its market dominance in the near future with access to its very own ‘data superhighway’.

For over 12 months now, there have been rumors and speculation that Apple is working towards building an electric car, but there have been no official reports from the Cupertino giant confirming the story. But this week, another source came forward to tell the world that the makers of the iPhone have been “investigating how to charge electric cars, talking to charging station companies, and hiring engineers with expertise in the area.” So while there is still no official confirmation, it seems that the tech media are slowly putting all the pieces together to document what is likely to be a seismic shift in the development of the electric car.

apple-tech

Last week, we reported that Twitter was in the process of easing restrictions on its famous 140 character limit. This week, the micro-blogger confirmed that was indeed the case, amidst much positive reaction from users. The company wants to make the service easier to use, and as a result “User handles and visual media like photos, videos and GIFs will no longer count toward the character count. People will now be able to retweet themselves, in case they want a message to get more visibility down the line.” Historically, tweets that started with a user handle did not get seen by everyone, but only by people who followed both users, but that is also set to change in the coming months.

Google’s woes with the taxman deepened this week, following the news that its Paris HQ was raided by a French police team that included 25 data experts, and “was part of a preliminary investigation into aggravated tax fraud opened in June last year”, according to the Financial Times. European authorities have had American multi-nationals in their sights for some time now, as they seek to crack down on companies moving their profits into places where they pay lower taxes. According to some reports, the French authorities believe they are owed over $1.6 billion by Google.

By Jeremy Daniel

The Microsoft And Facebook Cross Atlantic Internet Connection

The Microsoft And Facebook Cross Atlantic Internet Connection

Facebook and Microsoft are laying a massive cable across the middle of the Atlantic.

Dubbed MAREA—Spanish for “tide”—this giant underwater cable will stretch from Virginia to Bilbao, Spain, shuttling digital data across 6,600 kilometers of ocean. Providing up to 160 terabits per second of bandwidth—about 16 million times the bandwidth of your home Internet connection—it will allow the two tech titans to more efficiently move enormous amounts of information between the many computer data centers and network hubs that underpin their popular online services.

If you look at the cable systems across the Atlantic, a majority land in the Northeast somewhere,” says Najam Ahmad, Facebook’s vice president of network engineering. “This gives us so many more options.”

Read Full Article Source: Wired

Google Enters The Personal Assistant Fray

Google Enters The Personal Assistant Fray

The Week In Tech

Let’s take a look back at some of the biggest stories in tech this week.

The Google Assistant

Siri, Alexa and M have got company. But the new guest at the party has no name, choosing instead to go by the moniker “Google Assistant”. On Wednesday this week, Google parent company Alphabet unveiled its entry into the personal assistant arsenal being assembled by Apple, Amazon and Facebook. The small connected box will live in your home and attempt to make your life easier in a myriad of ways. New Google CEO Sundar Pachai is known to have a soft spot for artificial intelligence and the company plans to build on its 17 year history of searching the world, both online and offline. The Guardian reports that Google claims “its assistant is smarter and better able to work with its email, messaging, mapping and photo apps. And since Google makes software for smartphones, smartwatches and old-fashioned computers, Google says people will be able to have one conversation with multiple machines.” It’s still unclear which company is getting ahead in terms of this new tech playground but it seems our homes are about to be imminently disrupted.

google-alphabet

Facebook Founder Mark Zuckerberg Meets Disgruntled Conservatives

Meanwhile, Facebook founder Mark Zuckerberg met with a group of conservative commentators who claimed during the week that the social network and its selection of “Trending Topics” displays an editorial bias against conservatives, and even went so far as to call for a senate enquiry. CNN Money reports that “Zuckerberg did a lot of listening” during the meeting and let it run nearly fifteen minutes longer than its allotted hour.

Shortly thereafter Zuckerberg posted a comment on his own Facebook page, acknowledging that he ‘wanted to hear their concerns personally and have an open conversation about how we can build trust. I want to do everything I can to make sure our teams uphold the integrity of our products.’

The furore was an acknowledgement of the power that Facebook commands over news at the moment, but commentators have generally been impressed by how transparent and accommodating Facebook has been around the issue, while disputing that there is any deliberate bias in their trending story selections.

LinkedIn Password Breach

We should probably all be resetting our LinkedIn passwords this week, following the blog posting from that social network where it concludes that the data breach it suffered during 2012 was a lot worse than it imagined. At the time, LinkedIn responded by making password reset’s mandatory for the 6 million members affected, but this week the company discovered that number was well over 100 million. “Yesterday, we became aware of an additional set of data that had just been released that claims to be email and hashed password combinations of more than 100 million LinkedIn members from that same theft in 2012”, it wrote in a blog post.

The company has chosen a softer route of engagement this time around, suggesting to members that it’s a good idea to change passwords anyway after a certain amount of time, and that they will be monitoring and blocking “any suspicious activity that might occur on affected accounts.”

The Twitter Character Limit Increase 

And finally, Twitter made a couple of moves which are likely to please their notoriously opinionated users. Within the next two weeks, according to a Twitter insider, the popular micro-blogging platform will no longer count URL’s or images as being part of the 140 characters that define a tweet. Although some worry that it might lead to an increase of spam, most users seem broadly welcome of a move that will give them more breathing room while tweeting, while maintaining their rich media content.

By Jeremy Daniel

New Google ‘Waze’ Enters Ridesharing Market

New Google ‘Waze’ Enters Ridesharing Market

Google Waze

There’s a new heavy hitter in ride-hailing. Google-owned Waze on Monday unveiled a carpooling service for commuters in California’s Bay Area. The pilot program is limited to about 25,000 employees of companies including Walmart and Adobe Systems, the Wall Street Journal reported. Waze will match riders with drivers already heading along similar routes during the morning and evening rush hours.

For years, Waze has established a trusted community of drivers, with millions of Wazers helping each other beat traffic on the fastest routes,” the company wrote on its website. “Since so many people are already using Waze to get to work, why not help a fellow commuter heading in the same direction?

 In its current form, Waze Carpool is less a land grab for Uber and Lyft’s business than that of smaller, explicitly commuting-focused ride startups such as Via…
Full Article Source: QZ.com
RightScale Releases Trends in Follow-Up to State of the Cloud Report

RightScale Releases Trends in Follow-Up to State of the Cloud Report

Docker Spreads All the Way to Production and Is Used Alongside Chef, Puppet, and Ansible

SANTA BARBARA, CA–(Marketwired – May 11, 2016) – RightScale® Inc., a demonstrated leader in enterprise universal cloud management, today announced the results of the RightScale 2016 State of the Cloud Survey: DevOps Trends. The fifth annual RightScale State of the Cloud Survey was announced in February. This follow-up report provides new data and analysis in a deep dive on DevOps, Docker, and container trends. The RightScale 2016 State of the Cloud Report series is the result of a survey to 1,060 technology professionals at large and small enterprises across a broad cross-section of industries.

The survey results are available in the RightScale 2016 State of the Cloud Report: DevOps Trends, which can be downloaded at www.rightscale.com/2016-devops-trends-report.

The survey shows that the vast majority of enterprises are adopting DevOps and this usage is being driven from the bottom up by projects, teams, business units, and divisions,” said Kim Weins, vice president of marketing at RightScale. “Companies are using a portfolio of DevOps technologies that include configuration management tools as well as containers. While Chef and Puppet are still the most widely used DevOps tools, Docker has seen extraordinary growth, more than doubling in the past year. Companies report a lack of experience with containers and have made educating themselves a top priority in the coming year.”

Highlights of the RightScale 2016 State of the Cloud Report: DevOps Trends include:

  • DevOps is growing, especially in the enterprise: DevOps adoption increased from 66 percent in 2015 to 74 percent in 2016. DevOps adoption is strongest in the enterprise (81 percent of enterprises adopting DevOps compared to 70 percent in SMBs). Enterprises are adopting DevOps from the bottom up: Adoption of DevOps by projects or teams (29 percent) and business units or divisions (31 percent) is more common than company-wide adoption (21 percent).
  • Docker usage doubles while Chef and Puppet are neck and neck: Overall, Chef, Puppet, and Docker are the top three DevOps tools used by respondents (32 percent, 32 percent, and 27 percent, respectively). Among enterprises, more use Puppet (42 percent) vs. Chef (37 percent) and Docker (29 percent). Docker is the fastest growing DevOps tool, with adoption more than doubling year-over-year from 13 percent in 2015 to 27 percent in 2016. In the enterprise, Docker also saw more than 2x growth (from 14 percent to 29 percent) while Ansible nearly tripled (from 8 percent to 23 percent). Docker could soon be the most used DevOps tool in the enterprise as 38 percent of enterprises have plans to use it. This compares to 20 percent who plan to use Chef and 19 percent who plan to use Puppet.
  • DevOps users use multiple tools: Less than half (43 percent) of companies are using a configuration tool such as Chef, Puppet, Ansible, or Salt. Use of multiple configuration tools is more common (25 percent) than a single configuration tool (18 percent) and 67 percent of companies using Chef or Puppet also use the other tool. Configuration tools are also often used with Docker; 80 percent of Docker users also leverage at least one configuration tool.
  • Container adoption is maturing, especially in enterprises: Overall, 26 percent of respondents have workloads already running in containers (8 percent in development, 18 percent in production). 36 percent of respondents are experimenting with containers, while 25 percent are learning about containers. Enterprises are using containers more than SMBs. 29 percent of enterprises have workloads running in containers versus 24 percent of SMBs, and 41 percent of enterprises are experimenting as compared to 33 percent of SMBs.
  • Docker seeing greatest adoption in Europe, with tech companies, and with enterprises: Evaluating Docker adoption across different geographies, industries, and roles, RightScale found that current use of Docker is heaviest among tech organizations (32 percent), enterprises (29 percent), and developers (28 percent). Use of Docker in Europe (34 percent) is also well above average.
  • Significant interest in containers on bare metal. Containers are currently being deployed primarily on virtual machines (29 percent) versus bare metal (12 percent). There is significant interest in deploying containers on bare metal with 24 percent of respondents having plans to do so in the future. Most containers are built using traditional Linux distributions such as Ubuntu (43 percent), CentOS (39 percent), and Red Hat (37 percent). CoreOS (12 percent) is the most widely adopted of the minimalist operating systems, which are designed specifically for containers.
  • Biggest challenge with containers is lack of experience for newbies: For respondents who are not currently using containers, lack of experience was by far the top challenge (39 percent). The top challenges cited by respondents who are already using containers were security (29 percent) and immature technology (29 percent).
  • Container focus in 2016 is education and experience: The top container initiative in 2016 will be getting more educated (62 percent), followed by conducting more experiments with containers in dev/test (44 percent) and production (28 percent), as well as expanding container use in dev/test (28 percent).

Survey Methodology

RightScale conducted its annual State of the Cloud Survey and RightScale State of the Cloud Report: DevOps Trends in January 2016. The survey questioned technical professionals across a broad cross-section of organizations about their adoption of cloud computing. The 1,060 respondents range from technical executives to managers and practitioners and represent organizations of varying sizes across many industries. Their answers provide a comprehensive perspective on the state of the cloud today. The margin of error is 3.07 percent.

About RightScale

RightScale Universal Cloud Management enables leading enterprises to accelerate delivery of cloud-based applications that engage customers and drive top-line revenue while optimizing cloud usage to reduce risk and costs. With RightScale, IT organizations can deliver instant access to a portfolio of public, private, and hybrid cloud services across business units and development teams while maintaining enterprise control. RightScale Consulting Services help companies develop cloud strategies, deliver cloud projects, and optimize cloud usage. RightScale was named a “100 Best Places to Work in 2015″ by Outside Magazine and was listed in “The Best Enterprise Cloud Computing Startups to Work For in 2015” by Forbes. Since 2007, leading enterprises including Audi, Pinterest, and Yellow Pages Group have launched millions of servers through RightScale.

CloudTweaks Comics
The Business of Security: Avoiding Risks

The Business of Security: Avoiding Risks

The Business of Security Security is one of those IT concerns that aren’t problematic until disaster strikes. It might be tomorrow, it could be next week or next year. The fact is that poor security leaves businesses wide open for data loss and theft. News outlets just skim the surface, but hackers cost business up…

Four Reasons Why CIOs Must Transform IT Into ITaaS To Survive

Four Reasons Why CIOs Must Transform IT Into ITaaS To Survive

CIOs Must Transform IT The emergence of the Cloud and its three delivery models of Infrastructure as a Service (IaaS), Software as a Service (SaaS) and Platform as a Service (PaaS) has dramatically impacted and forever changed the delivery of IT services. Cloud services have pierced the veil of IT by challenging traditional method’s dominance…

4 Industries Being Transformed By The Internet of Things

4 Industries Being Transformed By The Internet of Things

Compelling IoT Industries Every year, more and more media organizations race to predict the trends that will come to shape the online landscape over the next twelve months. Many of these are wild and outlandish and should be consumed with a pinch of salt, yet others stand out for their sober and well-researched judgements. Online…

Cloud Infographic – Big Data Analytics Trends

Cloud Infographic – Big Data Analytics Trends

Big Data Analytics Trends As data information and cloud computing continues to work together, the need for data analytics continues to grow. Many tech firms predict that big data volume will grow steadily 40% per year and in 2020, will grow up to 50 times that. This growth will also bring a number of cost…

12 Promising Business Intelligence (BI) Services For Your Company

12 Promising Business Intelligence (BI) Services For Your Company

12 Promising Business Intelligence (BI) Services Business Intelligence (BI) services have recently seen an explosion of innovation and choices for business owners and entrepreneurs. So many choices, in fact, that many companies aren’t sure which business intelligence company to use. To help offer you a solution, we’ve compiled a list of 12 Business Intelligence companies…

Protecting Your Web Applications In A Hybrid Cloud Environment

Protecting Your Web Applications In A Hybrid Cloud Environment

Protecting Your Web Applications It’s no secret that organizations are embracing the cloud and all the benefits that it entails. Whether its cost savings, increased flexibility or enhanced productivity – businesses around the world are leveraging the cloud to scale their business and better serve their customers. They are using a variety of cloud solutions…

5 Reasons Why Your Startup Will Grow Faster In The Cloud

5 Reasons Why Your Startup Will Grow Faster In The Cloud

Cloud Startup Fast-tracking Start-ups face many challenges, the biggest of which is usually managing growth. A start-up that does not grow is at constant risk of failure, whereas a new business that grows faster than expected may be hindered by operational constraints, such as a lack of staff, workspace and networks. It is an unfortunate…

Cloud Computing Price War Rages On

Cloud Computing Price War Rages On

Cloud Computing Price War There’s little question that the business world is a competitive place, but probably no area in business truly defines cutthroat quite like cloud computing. At the moment, we are witnessing a heated price war pitting some of the top cloud providers against each other, all in a big way to attract…

The CloudTweaks Archive - Posted by
Surprising Facts and Stats About The Big Data Industry

Surprising Facts and Stats About The Big Data Industry

Facts and Stats About The Big Data Industry If you start talking about big data to someone who is not in the industry, they immediately conjure up images of giant warehouses full of servers, staff poring over page after page of numbers and statistics, and some big brother-esque official sat in a huge government building…

What You Need To Know About Choosing A Cloud Service Provider

What You Need To Know About Choosing A Cloud Service Provider

Selecting The Right Cloud Services Provider How to find the right partner for cloud adoption on an enterprise scale The cloud is capable of delivering many benefits, enabling greater collaboration, business agility, and speed to market. Cloud adoption in the enterprise has been growing fast. Worldwide spending on public cloud services will grow at a…

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Cloud Email Migration In today’s litigious society, preserving your company’s data is a must if you (and your legal team) want to avoid hefty fines for data spoliation. But what about when you move to the cloud? Of course, you’ve probably thought of this already. You’ll have a migration strategy in place and you’ll carefully…

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

Embracing The Cloud We love the stories of big complacent industry leaders having their positions sledge hammered by nimble cloud-based competitors. Saleforce.com chews up Oracle’s CRM business. Airbnb has a bigger market cap than Marriott. Amazon crushes Walmart (and pretty much every other retailer). We say: “How could they have not seen this coming?” But, more…

Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and orchestration. Although it has been mature for decades, the network security market had to transform rapidly with the advent of the BYOD trend and emergence of the cloud, which swept enterprises a few years ago.…

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks Does cloud security risks ever bother you? It would be weird if it didn’t. Cloud computing has a lot of benefits, but also a lot of risks if done in the wrong way. So what are the most important risks? The European Network Information Security Agency did extensive research on that, and…

Three Reasons Cloud Adoption Can Close The Federal Government’s Tech Gap

Three Reasons Cloud Adoption Can Close The Federal Government’s Tech Gap

Federal Government Cloud Adoption No one has ever accused the U.S. government of being technologically savvy. Aging software, systems and processes, internal politics, restricted budgets and a cultural resistance to change have set the federal sector years behind its private sector counterparts. Data and information security concerns have also been a major contributing factor inhibiting the…

Disaster Recovery – A Thing Of The Past!

Disaster Recovery – A Thing Of The Past!

Disaster Recovery  Ok, ok – I understand most of you are saying disaster recovery (DR) is still a critical aspect of running any type of operations. After all – we need to secure our future operations in case of disaster. Sure – that is still the case but things are changing – fast. There are…

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Infrastructure-as-a-Service Security It’s no secret many organizations rely on popular cloud providers like Amazon and Microsoft for access to computing infrastructure. The many perks of cloud services, such as the ability to quickly scale resources without the upfront cost of buying physical servers, have helped build a multibillion-dollar cloud industry that continues to grow each…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

Having Your Cybersecurity And Eating It Too

Having Your Cybersecurity And Eating It Too

The Catch 22 The very same year Marc Andreessen famously said that software was eating the world, the Chief Information Officer of the United States was announcing a major Cloud First goal. That was 2011. Five years later, as both the private and public sectors continue to adopt cloud-based software services, we’re interested in this…