Welcome!


Top Stories

SYS-CON Events announced today that Commvault, a global leader in enterprise data protection and information management, has been named "Bronze Sponsor" of SYS-CON's 18th International Cloud Expo, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY, and the 19th International Cloud Expo, which will take place on November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Commvault is a leading provider of data protection and information management solutions, helping companies worldwide activate their data to drive more value and business insight and to transform modern data environments. With solutions and services delivered directly and through a worldwide network of partners and service providers, Commvault solutions comprise one of the industry's leading portfolios in data protection and recovery, cloud, virtualiz... (more)

Cloud Expo Day Four: Still Very Cloudy in New York

The economics of the cloud, the rise of the mobile workforce and the consumerization of IT are making the transformation to the cloud a foregone conclusion within enterprise IT. But not every company, organization or government agency is necessarily keeping up. Is yours? Whether your company is seeking to play at the SaaS, PaaS, or IaaS level of the Cloud Computing ecosystem, the surest way to get yourself and your company fully "Cloud-ready" is by attending Cloud Expo New York – being held this week, June 6 - 9, 2011, at The Javits Center In New York City. A representative sampler (only) of this week''s technical program, which is now in its fourth day, is included below. The full schedule for the entire four days is here. Jacob Javits Convention Center in NYC Getting Ready for Cloud Expo 2011 New York Cloud Expo offers a non-stop 4-day technical program with 175+ ... (more)

'Intel Security is Broken & Can't Be Fixed': Green Hills

Dan O'Dowd, the founder and CEO of 22-year-old RTOS house Green Hills Software, who thinks Linux is the work of the devil, has released his third white paper on why Linux is a security threat to US defense systems like the Future Combat System and Global Information Grid. The latest white paper is called "Linux Security: Unfit for Retrofit" and claims Linux' security limitations are "innate" and can't be "practically remedied." O'Dowd says, "There is no way to fix Linux to bring it up to the level of security that is required for national defense systems, a level that is already available in proprietary operating systems." O'Dowd shares his position with SCO Group CEO Darl McBride, who wrote to Congress expressing similar sentiments. O'Dowd says, "There is a widespread misconception that open source software inherently provides better security than proprietary softwa... (more)

Viewpoint: Seven Technical Security Benefits of Cloud Computing

Craig Balding's Cloud Security Blog In my view, there are some strong technical security arguments in favour of Cloud Computing - assuming we can find ways to manage the risks. With this new paradigm come challenges and opportunities. The challenges are getting plenty of attention - I'm regularly afforded the opportunity to comment on them. However, let's not lose sight of the potential upside. In this post, I walk through seven technical security benefits. Some are immediate, others may arise over time and have conditions attached (some unstated for the sake of brevity). However, I’m including the longer-range benefits now to raise awareness. Some of the outcomes listed are available today without the Cloud, but they are either complex and slow to implement (and thus less likely to happen) or prohibitive for capital cost reasons. I don’t claim this is a definitive l... (more)

Getting at the Heart of Security in the Cloud

Security is a pretty big word. It’s used to represent everything from attack prevention to authentication and authorization to securing transport protocols. It’s used as an umbrella term for such a wide variety of concerns that it has become virtually meaningless when applied to technology. For some time, purveyors of security studies have asked the market, “What’s stopping you from adopting cloud?” Invariably one of the most often cited show-stoppers is “security.” Pundits raced to tell us this, but in no wise did they offer deeper insight into what, exactly, security meant. So it was nice to see CloudPassage dig deeper into “security in the cloud” with a recent survey it conducted. You may recall that CloudPassage has a more than passing interest in cloud-based security, as its focus is on cloud-based security with an emphasis on host-based firewalls. Published in... (more)

Governance Must Drive All Security Initiatives... Even Cloud

“The ‘how’ may change, but the ‘what’ is fundamental to risk management.” I heard these sage words at a recent ISSA (Information Systems Security Association) meeting from a CIO speaking about security from the cloud. He continued, “Risk is not unique to the cloud. It experiences the same issues that affect any outsourcing or third party deliverable. It is bounded by the same concerns regarding governance—does it meet the requirements of my industry? Is my data free from co-mingling? Are the proper notification protocols in place?” Do a Google search on “cloud security” and the first entry is “How secure is the cloud?” True professionals know the argument is not about technology or how security is delivered, but rather one of governance. You need to know exactly who HAS access to what resources and if these levels of access are appropriate. You need to know who IS ... (more)

Forecasting the Cloud Market: How the Sausage Is Made

Before I joined ZapThink in 2001, I was an analyst at IDC. I wasn’t there for long, but I did manage to attend their analyst training course. Perhaps the most intriguing lesson I learned from this boot camp was how IDC goes about building their market models, which are the central tool they use to predict the growth of markets. Essentially, the market model is an immense Excel spreadsheet, with a separate row for the revenues for each vendor in the entire IT universe. Group vendors into separate, distinct markets (or do so for individual products, when vendors compete in multiple markets). Assign each of your analysts to interview each vendor once a year in the analyst’s assigned market, in the hopes that the vendor will reveal their true revenues for the year in question. Put the resulting numbers in the spreadsheet, add them all up, and you are able to calculate ... (more)

Enterprise Architecture: The Key to Cybersecurity

When I first discuss security in our Licensed ZapThink Architect (LZA) SOA course, I ask the class the following question: if a building had 20 exterior doors, and you locked 19 of them, would you be 95% secure? The answer to this 20-doors problem, of course, is absolutely not – you’d be 0% secure, since the bad guys are generally smart enough to find the unlocked door. While the 20-doors problem serves to illustrate how important it is to secure your Services as part of a comprehensive enterprise IT strategy, the same lesson applies to enterprise Cybersecurity in general: applying inconsistent security policies across an organization leads to weaknesses hackers are only too happy to exploit. However, when we’re talking about the entire enterprise, the Cybersecurity challenge is vastly more complex than simply securing all your software interfaces. Adequate security ... (more)

Travelers Advantage(R) Travel Tips: Online Check-In Emerges as Convenient Time Saver in Security Age

NORWALK, Conn., April 22 /PRNewswire/ -- Online airline check-in is the hot new trend among on-the-go travelers who seek to save time, avoid lines, efficiently navigate airport security and take-off on their adventure. Most major airlines now offer online service that allows you to check-in, print your boarding pass or even change your seat assignments -- all with the click of a mouse, according to Travelers Advantage. You can get it all from the convenience of your home PC, hotel room or even aboard your cruise. And some airlines are even offering bonus frequent flier miles and other incentives for online check-in customers. A recent J.D. Power and Associates study found that more than half of airline passengers are taking advantage of time-saving check-in options, with 38 percent currently using self-check-in kiosks and 17 percent checking in online through airlin... (more)

Smart Card Alliance Supports Higher Security Levels for Electronic Passport

VANCOUVER, British Columbia, May 3 /PRNewswire/ -- Association of Corporate Travel Executives Global Conference -- Smart Card Alliance Executive Director Randy Vanderhoof, speaking to a gathering of corporate travel executives, voiced the smart card industry's support of the U.S. State Department's recent statements to begin strongly considering additional security measures including Basic Access Control (BAC) and shielding to protect personal data in passports equipped with contactless smart card technology. This approach will address concerns raised about the potential for skimming of personal data and remote eavesdropping on passport communications during usage. "Officials from the State Department have indicated that they are now strongly considering the use of BAC in the U.S. electronic passport, a security feature supported by contactless chip technology. We th... (more)

Adesta Selected by Maryland Port Administration to Secure Port of Baltimore

OMAHA, Neb., Nov. 8 /PRNewswire/ -- Adesta, LLC, an Omaha, NE based systems integrator, today announced that it has executed a $5.5 million contract with the Maryland Port Administration to design and install a sophisticated security system at the Port of Baltimore. The wide-ranging project will include the installation of a remote video surveillance system as well as enhancements to terminal perimeter security. The expected completion date for the project is fall 2006. The system will provide the Port with total perimeter security and includes a fully scalable communications and electronic security network. The perimeter security measures include closed circuit television, video analytics by VistaScape Security Systems, and force protection for all terminals located at the Port. Real time intrusion detection technology and thermal and low light cameras will allow ... (more)

CloudEXPO Stories
The platform combines the strengths of Singtel's extensive, intelligent network capabilities with Microsoft's cloud expertise to create a unique solution that sets new standards for IoT applications," said Mr Diomedes Kastanis, Head of IoT at Singtel. "Our solution provides speed, transparency and flexibility, paving the way for a more pervasive use of IoT to accelerate enterprises' digitalisation efforts. AI-powered intelligent connectivity over Microsoft Azure will be the fastest connected path for IoT innovators to scale globally, and the smartest path to cross-device synergy in an instrumented, connected world.
There are many examples of disruption in consumer space – Uber disrupting the cab industry, Airbnb disrupting the hospitality industry and so on; but have you wondered who is disrupting support and operations? AISERA helps make businesses and customers successful by offering consumer-like user experience for support and operations. We have built the world’s first AI-driven IT / HR / Cloud / Customer Support and Operations solution.
ScaleMP is presenting at CloudEXPO 2019, held June 24-26 in Santa Clara, and we’d love to see you there. At the conference, we’ll demonstrate how ScaleMP is solving one of the most vexing challenges for cloud — memory cost and limit of scale — and how our innovative vSMP MemoryONE solution provides affordable larger server memory for the private and public cloud. Please visit us at Booth No. 519 to connect with our experts and learn more about vSMP MemoryONE and how it is already serving some of the world’s largest data centers. Click here to schedule a meeting with our experts and executives.
Darktrace is the world's leading AI company for cyber security. Created by mathematicians from the University of Cambridge, Darktrace's Enterprise Immune System is the first non-consumer application of machine learning to work at scale, across all network types, from physical, virtualized, and cloud, through to IoT and industrial control systems. Installed as a self-configuring cyber defense platform, Darktrace continuously learns what is ‘normal' for all devices and users, updating its understanding as the environment changes.
Codete accelerates their clients growth through technological expertise and experience. Codite team works with organizations to meet the challenges that digitalization presents. Their clients include digital start-ups as well as established enterprises in the IT industry. To stay competitive in a highly innovative IT industry, strong R&D departments and bold spin-off initiatives is a must. Codete Data Science and Software Architects teams help corporate clients to stay up to date with the modern business digitalization solutions. Achieve up to 50% early-stage technological process development cost cutdown with science and R&D-driven investment strategy with Codete's support.