Welcome!


Security & Cloud Computing

Inside the world’s companies and government departments, IT organizations have traditionally focused on delivering to internal customers. This has created an environment where IT is expected to align the services it delivers with age-old business processes that have evolved over years ...
For enterprises moving more business and customer data to the cloud, investigating and selecting an online storage solution can be a challenging task. A primary concern is the level of data security offered by the sites being considered. While the theme holds true across all of the maj...
Fast-growing healthcare claims company Navicure is gaining better control and optimization across its IT infrastructure by deploying a comprehensive monitoring and operational management approach and taming IT complexity. The next VMworld innovator interview focuses on how a fast-grow...
Cloud computing is at the forefront for many organizations across the world. Experts believe it is the future of IT. Considering all the benefits offered by the cloud, making the transition may appear inevitable to enterprises. But just like any major technology, it also comes with cer...
Film and production companies are often located across the globe with several teams working collaboratively to create the next box office hit. Imagine you are an animator in Brazil and in charge of illustrating the characters for a future film. Similarly, the individual who is creating...
Increasing the I/O performance of next-generation data centers and cloud computing environments is essential for supporting enterprise e-commerce, database and email applications. To successfully deploy high-performance storage, it’s essential for storage appliance software to be flash...
In many contexts, Cloud isn’t the solution. It’s part of the answer, and whether the money should go to Cloud or to some alternative will depend on the nature of the problem. We know we want it, so Cloud must be a thing, right? If we’re carrying our enterprise IT shopping basket arou...
The increasing trend toward BYOD -- bring your own device -- is causing companies to explore new approaches for solving support, management, and security challenges. While so-called BYOD isn't necessarily new -- IT departments, after all, have been supporting mobile "road warriors" si...
Maintaining email servers is a full-time job including server maintenance, filtering spam, blocking viruses, and creating backups. A hosted Exchange service frees up IT time by putting all of these tasks in the hands of the email host. Even still, the myths surrounding hosted Exchange ...
To state the obvious, businesses of all sizes are moving their applications to the cloud or renting software as a service (SaaS) instead of licensing or buying the software outright. The number one reason people cite is cost. Businesses large and small are under the impression they ca...
Recently, one of our customers, let’s call him PointInFact, had a very typical problem. After deploying a new version of its software, some user requests degraded horribly. Requests that should have taken half a second took up to a minute. Interestingly, the PointInFact team runs a mul...
For many enterprises, moving business processes and data to the cloud has become a next step for improving both operational and technological capabilities. The cost savings and efficiencies created by utilizing cloud applications continue to increase, including opportunities for more b...
A recent article by Rob Livingstone on CFO.com [1] attracted my attention. In the article, Rob talks about the need for a tighter, ongoing working relationship between your company and its IT vendors for “as-a-service” technology-delivery models. We have in previous blogs also discusse...
Anytime we in IT encounter a new paradigm, our natural reaction is block, control, stop. In many shops, our first response is to prohibit users from accessing websites that the company has not approved, including cloud-based software, mobile applications, and other “bring your own apps...
Why should enterprises move data and applications into the cloud? The discussion on cloud strategy is still to this day focused on cost-reduction, primarily featuring economies achieved in infrastructure, platform and even applications. Certainly no one is going to argue that this is a...
The major retailer BCBG migrated to a cloud security platform and discovered the CloudAccess'SIEM and Log Management capabilities enhanced their abilities for enterprise security. There was a time the only security issues retailers needed to be concerned with was theft. Put a guard in...
Ohio-based LLT Barcode & Label, has found powerful new ways to develop sales and leads inexpensively using Ariba Discovery to better connect with qualified new customers. Social tools, big data and business networks are reshaping e-commerce in such a way that buyers and sellers are l...
Users need to focus upon cost, security, and availability to reap full cloud benefits. This article, part 3 in a series, present key aspects of availability monitoring. While cost brings people to the cloud, agility and availability keep them using. For sophisticated users, AWS (and...
August traditionally has the fewest number of readers onwww.MobileEnterpriseStrategies.com of any month. However, despite it being August, we hit a major milestone this year that I wanted to share. I have been writing and publishing content related to enterprise mobility since 2006, ...
New reports show that when the NSA was conducting its surveillance programs, perhaps including XKeyscore and PRISM, the agency was not following its own legal guidelines. These reports, based on internal NSA audit reports leaked via the “Snowden leak”, showing the NSA violated its own ...
When Melrose transitioned from nearly 100 percent server virtualization to a novel cloud capability built on VMware vCloud Hybrid Service, they discovered that they could not only host their own applications, but also those of nearby communities for an ongoing fee.
Restaurants, food service orgs feel the sting of security breaches via POS integration..ask Raleys, Schnucks, Subway, Zaxbys aned many others. Affordable real time monitoring must become a key priority. I love sushi. I love big fat burritos. I love tikka masala. So now that my taste b...
Incident management (IM) is a necessary part of a security program. When effective, it mitigates business impact, identifies weaknesses in controls, and helps fine-tune response processes. Traditional IM approaches, however, are not always effective in a partially or completely virtual...
Part 2 of Cloud Monitoring Essentials presents 3 key actions to ensure that cloud users maintain a strong security posture. The cloud offers users agility and flexibility at, potentially, a far lower cost than a traditional data center model. However, with these benefits come risks f...
Part of 1 of a 3 part series outlining the essential components for effective cloud monitoring. This portion covers cost monitoring and presents 3 key issues that users need to address to maximize their ROI. Cloud elasticity delivers significant increases in availability and scalabil...
In our increasingly connected world, the number of mobile phones will exceed the world’s population by 2014. Users expect to be able to run diverse applications on these devices at work, home, and practically anywhere else. We assume secure access to any information we need, with an ex...
Some businesses today are nervous about moving to cloud-delivered technology because it means allowing their system data to reside somewhere other than their own data center. For some, this can be a tough concept to grasp, especially for those who have spent 25 years or more hosting th...
Having made it past the 2013 midpoint, it’s time for technology-driven and/or technology-enabled organizations to evaluate plans and review outcomes so far, look at what has changed in the industry or business landscape; and realign for what the rest of the year has to offer. Here are...
With recent revelations about NSA surveillance programs including PRISM and now XKeyscore, many organizations are concerned about the privacy of customer data and other sensitive business information being put on the cloud. Some are predicting that the public uncovering of these progra...
In my previous post (Cloud Data, Security, Privacy & Confidentiality/ The ISV Perspective) I talked about the increasing exposure of data, the changing landscape of data confidentiality and the need to shield data rather than retreat into – largely mythical -“safe heavens” of on prem...
More than fines and reparations, intrusion Security significantly impacts customer retention. Damage done to brands because users don't trust doing business with that company is staggering. In terms of dollars and cents on a risk analysis spreadsheet, it is easier to put a value on a ...
With customer expecting information technology to be delivered with new models, systems integrators have to quickly transform themselves to meet these needs. Over the past few months, I have interacted with several organizations that are evaluating changes to their business model to a...
My name is Jason Simpson, and I’m a silo-buster. No, I am not talking about a precision-guided munition designed to take out nuclear missiles (though they are kind of cool). I oversee Netuitive’s Professional Services organization and we work with some of the world’s largest software...
CIOs are expected to be heroes. They are responsible for innovating and transforming IT using new technologies that will drive business initiatives forward, but that is far from an easy task given the ongoing evolution of the IT world. This article will discuss the case for hybrid clou...
Cloud computing, developed more than eight years ago, has become a multi-billion dollar segment of the IT services market. However, the original server-centric model, used to provide low cost computing, is giving way to a new network-centric model that will deliver better performance a...
All too often organizations start with an answer while being unclear on what the question is. Case in point: the US government’s Cloud First initiative. Originally part of former Federal CIO Vivek Kundra’s 25-Point Plan to Reform Federal IT Management, Cloud First called for government...
Mobile cloud computing refers to the combination of mobile networks and cloud computing with an aim of benefiting the network operators, mobile users, and cloud providers. Usually it’s a technology that leverages the elastic resources of network technologies and varied clouds toward un...
In the last MetraTech blog, we explored the topic of how you price for cloud and other services. In this blog, we focus on the everything-as-a-service (XaaS) movement and the impact on current pricing and business models. While the cloud industry is heavily impacted by this trend, it i...
Every business acknowledges that network security is critical. But how do you quantify the business value that a secure network provides? And how does an enterprise evaluate and justify investing in network security products like next-generation firewalls, intrusion prevention systems ...
Enterprise organizations are bombarded daily with the myriad reasons to deploy their line of business applications in the cloud. Efficiency, flexibility, cost savings, agility – and the list goes on and on – are just some of the benefits exhorted by cloud computing supporters. And indu...