Category Archives: Security

Online VMware Forum 2013: Get Real Benefits From Virtualization

Online VMware Forum 2013: Get Real Benefits from Virtualization

“Virtual” is usually a poor substitute for “real” – would you prefer playing Guitar Hero instead of rocking on stage? However, there’s one field where “virtual” can actually be better than “real” – Information Technology (IT). Applicable to hardware, software, memory, databases and networks, virtualization allows simplification of IT by making user experience independent of underlying infrastructure. However, the benefits of virtualization are not only limited to improved user experiences; they have multiple implications for the enterprise as well.

The benefits of virtualization include:

1. Cost savings
2. Mobility
3. Scalability
4. Disaster recovery
5. Resource optimization
6. Security
7. Environment-friendliness

However, one cannot just buy “virtualization” off the shelf; it takes specialized knowledge to truly leverage its power. As one of the pioneers in this field, VMware is well positioned to teach IT practitioners. Moreover, it’s offering to do so for free.

At the Online VMware Forum 2013, participants can immerse themselves into a virtual world where they learn how to deliver IT services efficiently and effectively, and from anywhere at a low cost.

So, what exactly can you do at VMware Forum 2013? You can:

  • chat and make connections with VMware experts and your IT peers
  • learn about the software-defined data center and NEW VMware offerings
  • attend live breakout sessions, technical deep dives and discussions
  • navigate in a 3D virtual environment with interactive booths staffed by VMware industry-leading partners

If you have been intrigued by all the news coverage “cloud computing” is getting lately, you must attend this event. After all, cloud computing and virtualization are closely related, and this forum can tell you how. Also, you can learn about what cloud strategy (public vs. private vs. hybrid) and service model (IaaS vs. PaaS. Vs SaaS) will work best for your organization.

So, what are you waiting for? Sign up today and be better-equipped to face tomorrow’s IT challenges.

By Sourya Biswas

Sponsored by VMWare and Online VMware Forum 2013

New Open Data Center Alliance Highlights Adoption of ODCA Cloud Usage Models

New Open Data Center Alliance White Paper Highlights Adoption of ODCA Cloud Usage Models

Organization Delivers New Requirements for Cloud Licensing and Data Security

PORTLAND, Ore. and PARIS, France – March 13, 2013 – The Open Data Center Alliance (ODCA), a global organization where hundreds of enterprise IT organizations are working together to drive broad scale requirements for the enterprise ready cloud, today announced the release of a new white paper focused on how one of its board members has adopted ODCA requirements as the foundation for its cloud implementation and the release of two new usage models focused on Software Entitlement and Data Security. With today’s news, ODCA has now released over 20 cloud requirements documents and publications and is demonstrating significant momentum in the adoption of its cloud usage models.

The Open Data Center Alliance: Private Cloud Strategy at BMW white paper details BMW’s multiple phases of cloud implementation from internal cloud delivery to full integration of public cloud services using ODCA requirements as core foundations for implementation plans. The paper released today is expected to serve as a model for helping other enterprise IT managers in their own path to the cloud and help providers identify requirements for enterprise ready cloud service delivery. A video featuring highlights of the BMW cloud implementation was also released today and is available on the ODCA website.

Cloud computing represents an unparalleled opportunity to deliver resiliency and scale to meet our business challenges,” said Mario Mueller, chair of the Open Data Center Alliance and Vice President of IT Infrastructure at BMW. “By publishing BMW’s strategy for cloud adoption, we hope to share our insights in how to integrate cloud principles into an existing enterprise IT environment leveraging our work in the Open Data Center Alliance.  By sharing our path we hope to make everyone’s path to the cloud smoother.”

The BMW cloud implementation is grounded in the principles of the ODCA Compute Infrastructure as a Service and Service Orchestration master usage models, which provide the company with the strategy and tactics for moving from requirements to real implementation starting this year.  Additional requirements integrated into BMW’s plans include the ODCA Service Catalog to measure what services are being delivered and what attributes exist for each service; the VM Interoperability usage model, providing a single view of all corporate VMs regardless of physical location,  and the Long-Distance Workload Migration usage model aimed to eliminate downtime and disruption from migration activities. The company’s approach to security and identity management is based on strategies and details described in the ODCA Identity Management Interoperability Guide.

The announcement of BMW’s ODCA implementation plans come as the Alliance delivers a major advancement in cloud requirements with the release of two new usage models:

– Software Entitlement Management Framework: This usage model addresses the requirement for shifting away from outmoded annual software licensing schema based on system or CPU core count metrics towards models that match cloud based delivery of on-demand services and dynamic scaling of resources.

– Data Security Framework: This usage model builds upon the existing ODCA security assurance usage model and focuses on security of corporate data.  The requirement introduces attributes for data security including mechanisms for access control, data classification, data encryption, and data masking.

These usage models extend the Alliance’s requirements delivery and help pave the way to broad scale deployments in 2013. ODCA will release new usage models at the organization’s upcoming Forecast 2013 conference scheduled for June 17-18 in San Francisco aligned with Forecast’s premier media sponsor Giga-Om’s Structure conference.  Information about Alliance publications, Forecast conference details, and discounted registration can be found at the organization’s website: Latest developments from the Alliance can also be found on Facebook, LinkedIn, Slideshare, Twitter, and YouTube.

 About The Open Data Center Alliance

The Open Data Center Alliance℠ is an independent IT consortium comprised of global IT leaders who have come together to provide a unified customer vision for long-term data center requirements. The Alliance is led by a twelve member steering committee which includes IT leaders BMW, Capgemini, China Unicom, Deutsche Bank, JPMorgan Chase, Lockheed Martin, Marriott International, Inc., National Australia Bank, NTT Data, T-Systems, Terremark, Disney Technology Solutions and Services, and UBS. Intel serves as technical advisor to the Alliance.

In support of its mission, the Alliance has delivered the first customer requirements for cloud computing and big data documented in Open Data Center Usage Models which identify member prioritized requirements to resolve the most pressing challenges facing cloud adoption. Find out more at


Cloud Computing – What Is Ahead!

Cloud Computing – What is Ahead!

Top cloud computing trends of the current year

Experts have started to believe that 2013 is going to be the year when enterprises are likely to cease worrying about cloud related security issues, and the market will see increasing popularity of cloud services. These speculations are based on industry surveys conducted by many reputable market analysts and technology reviews.  It is predicted that year 2013 will witness growing popularity of hosted services and solutions, and more companies to migrate their prime IT assets to the cloud as they see more returns from cloud technologies.

The leading cloud computing trends for the current year are summarized below:

  • Cloud will remain popular platform for collaboration

Surveys suggest that enterprises will continue to use cloud for collaborative tasks such as application development, online communication, and software testing. Google and Amazon to remain leading collaboration service providers among public clouds.

  • Enterprises will see cloud as a solution to their disaster recovery needs

Enterprises will find cloud infrastructures as a most viable solution for their data storage, archiving, and disaster recovery needs. With enhanced security features, cloud providers will start emerging as trusted partners.

  • Cloud to keep enhancing cost savings and flexibility

Cloud computing will continue to remain popular for offering more cost saving options and enhanced flexibility of deployment and expansion. Enterprises are of the opinion that they have met their targets of cost cutting by adopting cloud services and will continue using cloud services for enhanced business value.

  • Public cloud offerings to remain popular

It is expected that public cloud offerings will continue to remain popular among developers than internal cloud infrastructure due to its speed and agility. Internal cloud offerings will face more requirements from developers that have already gotten use to the flexibility and speed offered by public cloud offerings.

  • Price competition between large cloud providers

Enterprises will see increased price competition between largest storage providers like Google and Amazon. It is expected that even the companies that stand firm on pricing will also consider offering value added services to beat the competitors.

  • General purpose cloud offerings to stay popular

Compared to industry specific cloud solutions, general purpose cloud offerings will remain popular among enterprises as indicated by majority responses in a survey conducted by Everest Group and Cloud Connect.

  • VMware as top cloud platform

This year marks VMware as preferred cloud platform as compared to other leading cloud platforms, including OpenStack, popularized by Rackspace, IBM SmartCloud and CloudStack, founded by Citrix Systems.

VMware also remains as top cloud virtualization vendor for the year. The others that follow are Microsoft Hyper-V and KVM.

  • Software-as-service (SaaS) to remain dominant trend in cloud development

Though companies are developing Infrastructure-as-service (IaaS) models for their private clouds, SaaS to remain still a dominant trend in cloud business model. The majority responded preferring SaaS model in a survey published by

According to Henrik Rosendahl, senior vice president of cloud solutions at Quantum, public cloud will be looked upon by IT managers as one of the best backup options as an extension of their virtual infrastructures. He is of the opinion that enterprises have long remained reluctant to use public cloud for backup and looked upon private cloud solutions in conjunction with VMware environments; however, emerging solutions making public cloud safer than before pose a challenge to existing thought.

Since the current cloud model is based on payment of subscription fees in accordance with the usage of resources by the enterprises, the subscription model will remain most popular business model for the cloud services.

Rosendahl predicts a new service and terms it as cloud-based disaster-recovery-as-service. “This area is gaining traction as enterprises and SMBs look for cost-effective ways to implement a DR strategy,” he says. Companies find it more attractive, and viable solution to use public cloud for backup and disaster recovery.

Popularity of cloud computing is also putting more demand on platform developers as enterprises have started realizing the need of a management framework that can work with all cloud environments used in the enterprises. Monitoring, identity management, and billing are the tasks that enterprise managers expect from the management framework without having to worry about which cloud environments to use. Platform developers have to face challenges of integrating different cloud environments and develop an application that can transparently monitor and report.

Resource allocation and exact accounting of utilization of resources by client enterprises are going to be the biggest concern of cloud service providers as they need to bill exactly what they are providing in the wake of fierce competition.

Like other technology fields, cloud technologies are also moving towards more innovation in terms of services and management; challenges are expected due to a massive increase in scale, complexity, and disruption in business models brought about by innovation.

It is expected that cloud platform vendors and cloud service providers will go with hand in hand to meet the challenges as well as harvest the opportunities that year 2013 is going to bring for them.

By Krishan Lal Khatri

Security Software Consumption In Cloud Business

Patterns Of Security Software Consumption In Cloud Business

With an increasing number of people getting involved in the world of technology, there are significant security issues that need to be considered as well. The involvement of different departments in this is thought to change the overall trend of the entire marketplace. The way these virtual techniques are replacing the traditional hardware is something that might grow of concern to the governments of countries as they strive to maintain high levels of security.

What Are Some Of The Issues To consider In 2013 Regarding Cloud Computing?

There are a number of predictions that have been made about cloud computing for the year 2013, which include:

Cloud computing structures would become something of national importance in the years to come. This would mean that the governments would have to include considerations for these structures in their level of operations because of the negative impacts that cloud computing might have. There can be numerous disruptions within the cloud computing initiatives such as attacks on the service providers of the cloud computing managers. This is an important consideration because with the growth of technology and heavy reliance on technology for almost all matters of the economy, the government cannot afford to expose itself to the risks associated with cloud computing as more and more people rely on public computing activities which are open to the majority.

A 10% reliance on cloud computing: It is expected that about 10% of the IT security services would be seen to be overtaken by the cloud computing. Because of a reduction in operational costs, the ease of deploying various IT methods and highlighting salient factors that kick off demand, cloud computing seems to be integral in the near future.

20% of the firewall market in the virtual segment rather than the physical segment: It is expected that the overall growth in the firewall market would largely be triggered from the virtual players of the industry. At present, the only importance that the firewall market has is through the data-center-class firewalls; this is a very minor segment of the firewall market. It has become exceedingly important to differentiate the firewall market now through improved security systems- customers need to transfer data and information over secure means and this can only be achieved by having high levels of security within the firewall market in place.

Therefore, as much as it is appealing to probe into the tech savvy world, there is a dire need to protect information and to channel it over secure methods. Cloud computing is the next in thing, and it certainly has to be made easy and secure to work with.

By Walter Bailey

Mobile Devices Reach For The Company Cloud

Mobile Devices Reach For The Company Cloud

When corporate professionals are asked how they conduct business/technology communication—connected by wire or connected by the cloud—most professionals indicate the company cloud and mobile devices are centric to their work efforts. This trend will grow geometrically in the coming years:

A new report from Juniper Research indicates the number of employee-owned smartphones and tablets used for business work will more than double in 2014 (reaching 350 million devices, compared to approximately 150 million this year).

From there, a core challenge in the cloud computing environment emerges: how can the IT department safely offer employees access to the enterprise-wide cloud by way of mobile devices? Smart phones, tablets, netbooks, and laptops enable convenient access cloud platforms—but unguarded connection to the enterprise cloud is a request for security issues in triplicate.


The IT department must address several Mobile Device Management (MDM) issues to securely offer company cloud access to end users. Examples of these issues include:

  • Users want the option of choosing and owning their own mobile devices.
  • They want to access apps for both personal and company-work use.
  • They want open access to company email, data systems, and collaborative portals.
  • All of this must be accomplished within the safe and guarded confines of firm security.

Best practices for secure, enterprise-wide cloud access have been identified:

  • DEVICES: Before enabling cloud access: both company-supplied and employee-owned devices should be vetted and registered with the IT department. Device serial numbers, service provider names, and connection identifiers must be recorded and kept up-to-date. (An alternative approach is to define a group of devices approved for enterprise-wide cloud access.)
  • SECURITY PROTOCOLS: Users should utilize mobile device security procedures. Approaches include password management, theft deterrence, lost device responses, and implementation app-management policies. As a specific example of security best practices: employees should be trained to consistently lock their devices with passwords. (This security practice is particularly important if devices are frequently left unused.)
  • APP MANAGEMENT: Apps should be whitelisted or blacklisted, and jail-broken devices (where the operating system has been modified) should not be authorized for company cloud access.
  • CORPORATE CONTROL OF DATA AND DEVICES: Processes and procedures to enable remote wiping of data and applications from cloud-enabled devices must be available. (These capabilities are vital to implement in cases such as employee termination or transfer to a competing organization.) To support end user convenience, procedures for app updates and security modifications should be enabled for automatic implementation.


Successful implementation of mobile device cloud computing requires a solution that addresses two axis of concern: the individual’s ease-of-use and the need for corporate-wide mobile device security. The reality is: employees will demand the capability to use their personal devices for access to enterprise-wide data and systems. The CIO has a crucial decision to make—how can the organization effectively address these mobile device security challenges?

Each of these issues will be best handled through implementation of an integrated system of mobile computing management utilities that include options for customization and scalability.

Citrix is a leading source for these technology solutions. Xenmobile and CloudGateway offer a single-source solution that enables end users and IT department leadership to address the challenges of cloud-based security in balanced and effective ways.

This post is brought to you by the Mobile Enterprise 360 Community and Citrix

By John Benson

Cloud infographic: Cloud Security Adoption

Cloud infographic: Cloud Security Adoption

Cloud infographic: Cloud Security Adoption

Security is a real issue even though it is true that cloud computing is just as safe as traditional systems when it comes to apparent vulnerabilities and security holes. This is because of the nature of cloud computing, the public cloud, there are a lot more people with proximity access to the data… Continue reading

Included is a useful infographic made available by CA Technologies.


Infographic Source:  CA Technologies


Cloud Computing Proving To Be Major Resource For Hedge Funds

Cloud Computing Proving to be Major Resource for Hedge Funds

As we near the end of Q1 2013, hedge fund managers continue to generate higher returns. Following several years of sub-par performances from global hedge funds, investment managers have turned to cloud computing and infrastructure-as-a-service providers to not only cut costs, but also boost productivity. Many of the concerns that managers once had about migrating to cloud-based IT solutions, such as security, privacy and application performance, have been alleviated, and the benefits, such as cost predictability, business continuity and scalability, are tangible.

Cost Predictability

As small- to medium-sized hedge funds look to do more with less in the face of today’s regulatory and investor pressures, they need to be able to anticipate and account for their expenses. These firms don’t typically have the budget to absorb surprises related to building and maintaining on-site data centers, which can bring major distraction, a budgeting nightmare and significant risk. A cloud services model offers an out-of-the-box functional infrastructure, deployment in days and drastically reduced start-up risk. Cloud providers own all the equipment and are already used by other funds, so the manager doesn’t need to write the big check up front or worry about any potential missed details.

Unpredictable expenses don’t stop once the data center is built. Equipment can break or simply need to be replaced, and firms face mandatory system upgrades, data corruption and hard drive failure, among other challenges. Adding or removing capacity can also result in hard-to-predict costs, and staff levels must be adjusted at certain thresholds — preferably before workloads reach critical levels. Cloud service providers hedge this risk in exchange for a predictable monthly subscription fee, where even the added or lowered costs of scaling the needed capacity is predictable, since the cost and required lead time for making that change are known ahead of time.

Business Continuity

Hedge funds are held to high standards when it comes to their business continuity plans. A technology failure can be disastrous for money managers, yet more firms than ever are entrusting cloud service providers to “disaster proof” their business. This is because dedicated cloud service providers benefit from economies of scale and can offer a product that is constantly validated by others using the same service. Relocating and replicating IT resources to off-site locations also protects businesses from disasters in primary offices. Funds can tailor solutions to their specific business needs, or outsource “a-la-carte,” moving all their IT resources off site, or outsourcing only key components.

Key man risk is also common in hedge funds with only one or two IT people that are qualified to trouble-shoot technology issues. If those individuals are unavailable at a time of emergency, the result can be disastrous for the business. Consultants can help in an emergency, but they still require time and money to gain familiarity with the IT environment. Having just a few key IT individuals also poses the risk of their own limited capacity; it’s not feasible for one person to monitor the health of an on-site data center 24/7 with very short response times. Conversely, cloud service providers employ teams of dedicated staff that monitor the network 24/7.


Cloud providers offer the unique ability to quickly and cost-effectively meet changing business needs. Hedge funds no longer need to worry about how to expand their IT capacity, technical staff levels or server space, or fund new hardware and software resources to grow or enter new markets. Instead, managers can embrace an outsourced model that lets them focus on their core business rather than invest time and effort into solving IT problems. “Scaling down” can be as simple as a phone call, meaning fund managers no longer need to focus on staff layoffs, reselling hardware, or low data center use.

By using these services, hedge funds no longer have to spend the time and money required to build an in-house platform. Cloud service providers can offer an established infrastructure to get managers up and running within days instead of weeks or months. While some managers still perceive cloud computing as an emerging trend in the financial space, it has undoubtedly become an integral part of many hedge funds’ business strategies. It has become evident that IT outsourcing services run day-to-day operations more efficiently and offer managers the chance to scale more effectively, enabling firms to turn over the hassle of managing IT to a trusted partner and focus instead on their core business.

By Chris Grandi, CEO, Abacus Group

Cloud Infographic: Companies Fighting For Data

Cloud Infographic: Companies Fighting For Data

Cloud Infographic: Companies Fighting For Data

The amount of data in our world increases massively day-by-day. Big data is about capturing, storing and analyzing large pools of data from customers/consumers, suppliers, partners, operations, employees etc. According to a McKinsey  report, US companies from almost all industry sectors have, on average, hundreds of terabytes of data stored per company. The amount of data is growing as companies gather more and more information with each transaction and interaction with their customers.

Read More: Big Data & The Cloud



Infographic Source: Evault

CloudTweaks Comics
Cloud Infographic – DDoS attacks, unauthorized access and false alarms

Cloud Infographic – DDoS attacks, unauthorized access and false alarms

DDoS attacks, unauthorized access and false alarms Above DDoS attacks, unauthorized access and false alarms, malware is the most common incident that security teams reported responding to in 2014, according to a recent survey from SANS Institute and late-stage security startup AlienVault. The average cost of a data breach? $3.5 million, or $145 per sensitive…

The Conflict Of Net Neutrality And DDoS-Attacks!

The Conflict Of Net Neutrality And DDoS-Attacks!

The Conflict Of Net Neutrality And DDoS-Attacks! So we are all cheering as the FCC last week made the right choice in upholding the principle of net neutrality! For the general public it is a given that an ISP should be allowed to charge for bandwidth and Internet access but never to block or somehow…

Timeline of the Massive DDoS DYN Attacks

Timeline of the Massive DDoS DYN Attacks

DYN DDOS Timeline This morning at 7am ET a DDoS attack was launched at Dyn (the site is still down at the minute), an Internet infrastructure company whose headquarters are in New Hampshire. So far the attack has come in 2 waves, the first at 11.10 UTC and the second at around 16.00 UTC. So…

The DDoS That Came Through IoT: A New Era For Cyber Crime

The DDoS That Came Through IoT: A New Era For Cyber Crime

A New Era for Cyber Crime Last September, the website of a well-known security journalist was hit by a massive DDoS attack. The site’s host stated it was the largest attack of that type they had ever seen. Rather than originating at an identifiable location, the attack seemed to come from everywhere, and it seemed…

Cloud Infographic: Security And DDoS

Cloud Infographic: Security And DDoS

Security, Security, Security!! Get use to it as we’ll be hearing more and more of this in the coming years. Collaborative security efforts from around the world must start as sometimes it feels there is a sense of Fait Accompli, that it’s simply too late to feel safe in this digital age. We may not…

A New CCTV Nightmare: Botnets And DDoS attacks

A New CCTV Nightmare: Botnets And DDoS attacks

Botnets and DDoS Attacks There’s just so much that seems as though it could go wrong with closed-circuit television cameras, a.k.a. video surveillance. With an ever-increasing number of digital eyes on the average person at all times, people can hardly be blamed for feeling like they’re one misfortune away from joining the ranks of Don’t…

Reuters News: Powerfull DDoS Knocks Out Several Large Scale Websites

Reuters News: Powerfull DDoS Knocks Out Several Large Scale Websites

DDoS Knocks Out Several Websites Cyber attacks targeting the internet infrastructure provider Dyn disrupted service on major sites such as Twitter and Spotify on Friday, mainly affecting users on the U.S. East Coast. It was not immediately clear who was responsible. Officials told Reuters that the U.S. Department of Homeland Security and the Federal Bureau…

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

Embracing The Cloud We love the stories of big complacent industry leaders having their positions sledge hammered by nimble cloud-based competitors. chews up Oracle’s CRM business. Airbnb has a bigger market cap than Marriott. Amazon crushes Walmart (and pretty much every other retailer). We say: “How could they have not seen this coming?” But, more…

Cloud Services Providers – Learning To Keep The Lights On

Cloud Services Providers – Learning To Keep The Lights On

The True Meaning of Availability What is real availability? In our line of work, cloud service providers approach availability from the inside out. And in many cases, some never make it past their own front door given how challenging it is to keep the lights on at home let alone factors that are out of…

Multi-Cloud Integration Has Arrived

Multi-Cloud Integration Has Arrived

Multi-Cloud Integration Speed, flexibility, and innovation require multiple cloud services As businesses seek new paths to innovation, racing to market with new features and products, cloud services continue to grow in popularity. According to Gartner, 88% of total compute will be cloud-based by 2020, leaving just 12% on premise. Flexibility remains a key consideration, and…

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Cloud Email Migration In today’s litigious society, preserving your company’s data is a must if you (and your legal team) want to avoid hefty fines for data spoliation. But what about when you move to the cloud? Of course, you’ve probably thought of this already. You’ll have a migration strategy in place and you’ll carefully…



Big Data and DNS Analytics Big Data is revolutionizing the way admins manage their DNS traffic. New management platforms are combining historical data with advanced analytics to inform admins about possible performance degradation in their networks. Not only that, but they also have the ability to suggest ways to optimize network configurations for faster routing.…

Digital Twin And The End Of The Dreaded Product Recall

Digital Twin And The End Of The Dreaded Product Recall

The Digital Twin  How smart factories and connected assets in the emerging Industrial IoT era along with the automation of machine learning and advancement of artificial intelligence can dramatically change the manufacturing process and put an end to the dreaded product recalls in the future. In recent news, Samsung Electronics Co. has initiated a global…

How To Humanize Your Data (And Why You Need To)

How To Humanize Your Data (And Why You Need To)

How To Humanize Your Data The modern enterprise is digital. It relies on accurate and timely data to support the information and process needs of its workforce and its customers. However, data suffers from a likability crisis. It’s as essential to us as oxygen, but because we don’t see it, we take it for granted.…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…


Sponsored Partners