Welcome!


Security & Cloud Computing

In light of the recent NSA snooping scandal via their PRISM program regarding private cloud computing security, many people are left wondering if their sensitive data is actually secure. In fact, the statistics points to this startling fact: businesses and individuals alike have been s...
When we set out to build the PerspecSys Cloud Data Control Gateway, we faced an important design decision: would the market prefer an “All-in-One” or a “Best-of-Breed” Cloud Security Broker? In the “All-in-One” camp, IT professionals have come to learn that the bundled modules from a ...
Now that Big Data has become a household name, 2014 will be the year companies demand solid proof that data can help their decision-making and their bottom line. As the entire web becomes a seamlessly connected data warehouse, I predict that organizations will have the power at their f...
In my last post, we learned that services are only like products if you are willing to oversimplify them. And if you oversimplify them, you can miss out on business opportunities. Services (actions supported by things) differ in several important ways from products (things supported b...
In a recent IDG News survey, high-ranking IT executives in North America and Europe were asked about the effect the NSA snooping practices have had on their cloud computing strategy. Despite the furor over the NSA, these leaders are still committed to the cloud. The Cliff's notes: In...
SecuritySolutionsWatch.com: Thank you for joining us today, Bryan. If you wouldn’t mind, please tell us a little bit about your background and your role at HP. Bryan Coapstick: As the Director of Mobile Innovation, I am responsible for ensuring that HP’s mobility initiatives successfu...
Explores three ways to help development teams bear the burden of security: use pen test results to harden the application, leverage service virtualization for security scenarios, & adopt policy-driven development to help engineers understand and satisfy management’s security expectatio...
We discussed my belief that the nines (99.99…%) are more marketing than the real deal today - What do you think? The market and tools used to measure your uptime immature or do not really exist. The concept of availability in the cloud is determined by the level of responsibility and l...
Disaster Recovery (DR) has typically only been used by organizations for applications deemed to be mission critical. This was because organizations didn’t want to incur the expense associated with DR for less important applications. Today, because of cloud computing, many organizations...
For some organizations, cloud computing can be a hard sell, even before you come to the question of how to handle cloud-computing security. Public cloud, private cloud, hybrid cloud, encryption, tokenization, data residency, privacy regulations – all are factors involved and the percei...
The move to the cloud brings a number of new security challenges, but the application remains your last line of defense. Engineers are extremely well poised to perform tasks critical for securing the application—provided that certain key obstacles are overcome. Before the move to the ...
Growing trends such as BYOD will fuel the move to more pervasive use of identity and access management as a service, driven by the need for pervasive access and management and broader security concerns. Business trends like bring your own device (BYOD) are forcing organizations to saf...
Identity Management (IDaaS) & Access Mgmt (SSO) solve similar but separate issues, but both serve as a cornerstone of an integrated security initiative. One of the biggest misconceptions in cloud security is the perception that identity management (IDaaS) and access management (SSO) a...
Many technologies have made their presence felt this year and continue to excite us with the promises they hold for the future. Cloud computing has now reached a stage where businesses are seriously experimenting and are starting to reap the transformational benefits it can deliver. If...
As we move closer toward everything-as- a-service (XaaS), the title “Internet of Agents” seems to fit what is really happening. Agents are systems and devices that sense what is going on, and they exchange information with and act on behalf of other agents and people in ways that ultim...
There is a lot of confusion and hype about the cloud and SaaS (Software as a Service), and at Corent we experience it on a regular basis. One of the things I’ve been seeing and hearing about is the concept of a marketplace of cloud applications. I’ve observed that applications sold thi...
Cloud this and cloud that are on the lips of every IT professional. Beyond being an overhyped buzzword, cloud computing is a technology that’s innovating the way that many businesses, from startups to enterprises, handle their IT needs. Whether it’s specific applications or a complete ...
The digital age has forced a kind of dependency never before seen, a dependency on our inbox. The mere thought of losing these emails is inconceivable where the thought of it leaves us with a sense of panic, one similar to losing our credit cards or house key. Unfortunately, the potent...
Security-as-a-service provides the necessary ingredient to transform continuous monitoring from compliance mandate to best practice: real time monitoring. Every 4,000 miles or so I bring my car into have the oil changed, the brakes checked and tires rotated. Why? Because I know if I l...
The adoption of cloud storage technology for a broad range of consumer and business applications is transforming the storage landscape by transitioning away from traditional disk arrays to object-based storage systems that have the scalability, availability, resiliency and accessibilit...
Tests are an investment in the quality of any given system. There’s always a cost to build, run, and maintain each test in terms of time and resources. There’s also a great deal of value to be extracted from running the right test at the right time. It’s important to remember that for ...
In a previous blog we introduced the topic of cloud-as-it-is versus cloud as-we’d like-it-to-be. The cloud services broker (CSB) business model is gaining momentum as one way to turn the cloud into as-we’d-like-it-to-be. CSB is a term used for the activity of brokerage and also for the...
After years of talking to people inside and outside of my company about the benefits of cloud computing, I'm truly convinced that the most important benefit is not cost reduction or the ability to have new servers up and running in a few minutes. Of course those are great capabilities ...
It is hard to believe that there was a time when “the cloud” didn’t exist. Then, maybe 50 years ago, a lot of cloud-like things started to happen, such as remote computing, networked computing, resource sharing, virtual networks, and then, eventually, the Internet. But it still wasn’t ...
The latest headlines in the ongoing surveillance soap opera focus on the revelation that the U.S. has been eavesdropping directly on German Prime Minister Angela Merkel. The reaction in Germany has been strong with many officials publically condemning the surveillance. After the NSA’s...
Who doesn't love a good zombie flick, right? Hordes of undead ambling around in tattered clothing looking for something to eat. The low, drawn-out moans of a once-productive member of society, who now possesses the brainpower of a teenager on an 8-hour Call of Duty bender. While I don...
With a wealth of technology and online resources, many people are ditching the traditional 9-to-5 lifestyle and opting to become entrepreneurs. Unlike businesses of the past, where a large financial investment was required to get off the ground, today's startups can get the ball rollin...
With the launch of Cisco’s software-defined networking startup Insieme expected tomorrow, our industry is about to hear a lot about “application-centric” everything. So what does “application-centric infrastructure” mean? First, some basics: Networking is about connecting computing de...
Given the differences in market maturity, cultural acceptance and local IT infrastructures, considerable regional differences exist in the deployment rates of cloud-based security systems. They all play a part in the level of spending dedicated to this delivery model -- when compared w...
I am fascinated by the notion of the physical world converging with the digital world and the benefits that become possible as a result. Not in the context of a humanoid weeding my garden, although that would be nice, but in the context of making better business decisions based on mor...
As infrastructure has grown and mainstream database vendors have tweaked the cloud service model to apply to their own niche, cloud database technology has become an increasingly possible alternative to on-premises databases. Cloud database services offer many of the same benefits of o...
Fundamentally, Agile requires a rethink of the organizational aspects of planning, delivering, testing, and managing any IT project. The entire effort must be tackled iteratively. Stakeholders should be involved at every step. Testing must take place in every iteration, in order to les...
A few weeks ago, Gartner shared its list of top 10 technology trends for 2014, including among its expectations one entitled: “Hybrid cloud and IT as Service Broker.” This prediction speaks to what Gartner views as the necessity of the hybrid cloud – a mix of private cloud combined wit...
I recently came across Gartner research authored by analyst Colin Fletcher about the emergence of Business Value Dashboards (BVDs) that are replacing today’s conventional executive dashboards. When analyst research mentions a developing IT trend, I take note. But I pay special attentio...
These testing demons lurk around complex interconnected systems, just waiting to wreak havoc by forcing you to delay testing, work at dreadful hours, or make distressing trade-offs on the completeness of your testing… You're ready to test the part of the system that you're responsible...
The last few years have seen an explosion in the demand for enterprise mobile solutions. This movement has been clearly reflected in the rapid evolution of the enterprise mobile platform ecosystems. From mobile device management (MDM) to enterprise mobile middleware technologies, the i...
With a slight chill in the air, we know Halloween is just around the corner. But what could be spookier than ghosts, goblins or a haunted house? For many IT managers it’s the fear of Big Data, which can be understandably overwhelming at first. We’ve compiled five of the spookiest misco...
Performance is one of the key non-functional needs for any application and performance requirements needs to to be captured as part of requirements & analysis phase in a way that is understandable by all application stakeholders. In this article, we will see the key aspects of performa...
The worldwide market for cloud computing is rapidly growing across all segments – 36% CAGR through 2016, reaching a market size of $19.5B by 2016, according to the InfoPro Wave 5 Cloud Computing Study from 451 Research. The result has been a substantial increase in the operational comp...
We're in the middle of another major shift in computing and IT: the decline of the hard disk and the rise of solid-state memory. Solid-state has been around for a while, but it's always been expensive, volatile and low capacity. That's changing, and it's changing IT as well. Computing...