Tag Archives: security compliance

Outsourcing Agile Cloud Development: A New Frontier

Outsourcing Agile Cloud Development: A New Frontier

Outsourcing Agile Cloud Development: A New Frontier The rise in cloud popularity has brought a corresponding increase in the number of companies outsourcing their cloud software development. Yet things can get a bit complicated when a business sets out to find a compatible partner. While companies know they need to find a supplier that can deliver…

Cloud Whitepaper: Choosing A Cloud Hosting Provider With Confidence

Cloud Whitepaper: Choosing A Cloud Hosting Provider With Confidence

Choosing A Cloud Hosting Provider with Confidence Introduction Cloud computing is rapidly transforming the IT landscape, and the conversation around adopting cloud technology has progressed from “if” to “when .” Enterprises are showing strong interest in outsourced (“public”) cloud offerings that can help them reduce costs and increase business agility.  These cloud services offer enormous economic benefits…

Is My Public Cloud Too Public? Part 4

Is My Public Cloud Too Public? Part 4

Taking the bull by the horns—Secure Identity, Information, and Infrastructure Continued From Part 3 Public cloud computing requires a security model that reconciles scalability and multi-tenancy with the need for trust. As enterprises move their computing environments along with their identities, information and infrastructure to the cloud, they must be willing to give up some level…

Research: New Requirements For Security And Compliance Auditing In The Cloud

Research: New Requirements For Security And Compliance Auditing In The Cloud

Whitepaper Research: New Requirements for Security and Compliance Auditing in the Cloud   “New Requirements for Security and Compliance Auditing in the Cloud“ Learn how to prepare for cloud computing and how to manage IT security and compliance within the cloud. With the proliferation of cloud computing, how does an organization manage IT security, compliance,…

Cloud Computing Startups Raise Big Money: UPDATE 10

Cloud Computing Startups Raise Big Money: UPDATE 10

Cloud Computing Startups Raise Big Money: UPDATE 10 Today, there are two startups in focus – Vaultive and Eccentex. Vaultive Cloud data encryption services provider Vaultive recently completed a $10-million funding round led by .406 Ventures, New Science Ventures and Harmony Partners. Headquartered in New York with its R&D center in Tel Aviv, Israel, Vaultive…

Calculating the ROI on Cloud: The Cost of Cloud – Part 3

Continued from Part 2 The Cost of Cloud Clearly, there is great return potential associated with Cloud-based model. However, transition to Cloud-based model from an on-premise model is not without cost. Direct Ongoing Cloud Costs While the cost savings associated with a cloud-based model over an on-premises model are clearly substantial, there are two areas…

Webinar: New Demands for Security and Compliance in Online Collaboration

Trends in Online Collaboration: When Security, Compliance and Productivity Collide Featured Analyst Firm: Gartner Speakers: Jeffrey Man Paul Hands Type: Audio (53 minutes) External collaboration is a major source of information risk. New tools make document collaboration much easier, but may have serious security issues. Learn more about industry trends and demands for security and…

Featured Writers

Top Viral Impact

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM From software deployment, to mobility, to wearable technology, cloud computing has transformed seemingly every aspect of modern business. Research indicates cloud applications and platforms will be at the forefront of IT spending by 2016, with half of all enterprises implementing cloud solutions by 2017. One of the quickest markets…

The iCloud Scandal – Who Is To Blame? –  ‘Cloud’ Security vs. ‘Internet’ Security

The iCloud Scandal – Who Is To Blame? – ‘Cloud’ Security vs. ‘Internet’ Security

How the iCloud Scandal Has Helped to Define the Difference Between ‘Cloud’ Security and ‘Internet’ Security Busting the myth that bad cloud security was to blame for Apple’s recent celebrity data disaster Overview: We discuss the ‘celebrity hacking’ iCloud saga and debate whether or not the breach was likely down to Cloud encryption issues or…

Cloud Security In The Workplace

Cloud Security In The Workplace

Workplace Cloud Security Our workplaces are changing and much of it for the better. Increased flexibility – pushed by cloud services – is behind many of the changes. Home working, increased collaboration – it’s all good, and it’s all delivering significant business benefits. We know that. That’s so 2013. But fewer than 10% of businesses…

Are Made For Mobile Apps Really Different?

Are Made For Mobile Apps Really Different?

Mobile Apps Environment Mobile employees need mobile apps. Mobile apps help field personnel to be more productive and often enable them to generate new revenue streams and improve customer service (and the corporate brand!). However, as companies seek to integrate mobile technologies into their application infrastructures, they are faced with an important choice. Is it more…

Whitepapers

Top Research Assets

HP OpenStack® Technology Breaking the Enterprise Barrier

HP OpenStack® Technology Breaking the Enterprise Barrier

Explore how cloud computing is a solution to the problems facing data centers today and highlights the cutting-edge technology (including OpenStack cloud computing) that HP is bringing to the current stage. If you are a CTO, data center administrator, systems architect, or an IT professional looking for an enterprise-grade, hybrid delivery cloud computing solution that’s open,…

Advertising Programs

Click To Find Out More!!

Sponsored Posts

Sponsored Posts

Sponsored Posts We have a dedicated readership, through our online, social media and email presence. Our goal is to continue to build our growing community, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more. In order to do so, we require the support from businesses looking to generate more exposure for…