Welcome!


Security & Cloud Computing

August traditionally has the fewest number of readers onwww.MobileEnterpriseStrategies.com of any month. However, despite it being August, we hit a major milestone this year that I wanted to share. I have been writing and publishing content related to enterprise mobility since 2006, ...
New reports show that when the NSA was conducting its surveillance programs, perhaps including XKeyscore and PRISM, the agency was not following its own legal guidelines. These reports, based on internal NSA audit reports leaked via the “Snowden leak”, showing the NSA violated its own ...
When Melrose transitioned from nearly 100 percent server virtualization to a novel cloud capability built on VMware vCloud Hybrid Service, they discovered that they could not only host their own applications, but also those of nearby communities for an ongoing fee.
Restaurants, food service orgs feel the sting of security breaches via POS integration..ask Raleys, Schnucks, Subway, Zaxbys aned many others. Affordable real time monitoring must become a key priority. I love sushi. I love big fat burritos. I love tikka masala. So now that my taste b...
Incident management (IM) is a necessary part of a security program. When effective, it mitigates business impact, identifies weaknesses in controls, and helps fine-tune response processes. Traditional IM approaches, however, are not always effective in a partially or completely virtual...
Part 2 of Cloud Monitoring Essentials presents 3 key actions to ensure that cloud users maintain a strong security posture. The cloud offers users agility and flexibility at, potentially, a far lower cost than a traditional data center model. However, with these benefits come risks f...
Part of 1 of a 3 part series outlining the essential components for effective cloud monitoring. This portion covers cost monitoring and presents 3 key issues that users need to address to maximize their ROI. Cloud elasticity delivers significant increases in availability and scalabil...
In our increasingly connected world, the number of mobile phones will exceed the world’s population by 2014. Users expect to be able to run diverse applications on these devices at work, home, and practically anywhere else. We assume secure access to any information we need, with an ex...
Some businesses today are nervous about moving to cloud-delivered technology because it means allowing their system data to reside somewhere other than their own data center. For some, this can be a tough concept to grasp, especially for those who have spent 25 years or more hosting th...
Having made it past the 2013 midpoint, it’s time for technology-driven and/or technology-enabled organizations to evaluate plans and review outcomes so far, look at what has changed in the industry or business landscape; and realign for what the rest of the year has to offer. Here are...
With recent revelations about NSA surveillance programs including PRISM and now XKeyscore, many organizations are concerned about the privacy of customer data and other sensitive business information being put on the cloud. Some are predicting that the public uncovering of these progra...
In my previous post (Cloud Data, Security, Privacy & Confidentiality/ The ISV Perspective) I talked about the increasing exposure of data, the changing landscape of data confidentiality and the need to shield data rather than retreat into – largely mythical -“safe heavens” of on prem...
More than fines and reparations, intrusion Security significantly impacts customer retention. Damage done to brands because users don't trust doing business with that company is staggering. In terms of dollars and cents on a risk analysis spreadsheet, it is easier to put a value on a ...
With customer expecting information technology to be delivered with new models, systems integrators have to quickly transform themselves to meet these needs. Over the past few months, I have interacted with several organizations that are evaluating changes to their business model to a...
My name is Jason Simpson, and I’m a silo-buster. No, I am not talking about a precision-guided munition designed to take out nuclear missiles (though they are kind of cool). I oversee Netuitive’s Professional Services organization and we work with some of the world’s largest software...
CIOs are expected to be heroes. They are responsible for innovating and transforming IT using new technologies that will drive business initiatives forward, but that is far from an easy task given the ongoing evolution of the IT world. This article will discuss the case for hybrid clou...
Cloud computing, developed more than eight years ago, has become a multi-billion dollar segment of the IT services market. However, the original server-centric model, used to provide low cost computing, is giving way to a new network-centric model that will deliver better performance a...
All too often organizations start with an answer while being unclear on what the question is. Case in point: the US government’s Cloud First initiative. Originally part of former Federal CIO Vivek Kundra’s 25-Point Plan to Reform Federal IT Management, Cloud First called for government...
Mobile cloud computing refers to the combination of mobile networks and cloud computing with an aim of benefiting the network operators, mobile users, and cloud providers. Usually it’s a technology that leverages the elastic resources of network technologies and varied clouds toward un...
In the last MetraTech blog, we explored the topic of how you price for cloud and other services. In this blog, we focus on the everything-as-a-service (XaaS) movement and the impact on current pricing and business models. While the cloud industry is heavily impacted by this trend, it i...
Every business acknowledges that network security is critical. But how do you quantify the business value that a secure network provides? And how does an enterprise evaluate and justify investing in network security products like next-generation firewalls, intrusion prevention systems ...
Enterprise organizations are bombarded daily with the myriad reasons to deploy their line of business applications in the cloud. Efficiency, flexibility, cost savings, agility – and the list goes on and on – are just some of the benefits exhorted by cloud computing supporters. And indu...
In the last five years, organizations have increasingly embraced cloud applications to help them innovate and transform their business. Applications that automate sales processes, HR management, collaboration, email and file sharing are growing fast and enabling organizations to meet t...
Victor Cruz has actually touched on a few interesting points in his article “Safe Driving in the Cloud: A Black Box for Cars”. The fact is that car companies have lately shifted their focus towards increasing security for passengers and drivers altogether and that is why they came up ...
Want the secret to user provisioning/de-provisioning in an enterprise setting, The one word answer,…Integration.The question is why, how & with what? The need to credential authorized users to your network and other proprietary assets is clear. You only want those with the proper righ...
When I was asked about innovation, the first thing I did was review my research to get an idea of what my peers in the industry were predicting for our parallel IT futures. Not surprisingly, they all reflected the same sentiment: the cloud is growing, and employees will continue to bri...
For most enterprises, cost savings and increased efficiencies are the primary motivations for making the move to cloud computing. But recent studies from Gartner and other firms have identified concerns over cloud security and data privacy as being the leading barriers to cloud adoptio...
Mobile Backend as a Service (MBaaS) has emerged as one of the hottest trends in today’s technology market. While most of the adoptions of MBaaS technologies have taken place in the consumer or B2C space, these platforms are starting to make serious inroads in the enterprise. In order t...
Cloud computing’s promise is becoming reality, but cloud integration is an ongoing challenge. As the use of cloud applications spreads throughout the enterprise, there’s just no way to escape data exchange, change management, and related user issues. Why? The fact is, most top cloud an...
Every cloud infrastructure can be home to potentially hundreds of thousands of vulnerable privileged accounts. The presence of automated hacking tools means improperly secured privileged logins are almost certain to give hackers free reign on the network and access to customers’ privat...
The very name is kind of ridiculous, don’t you think? The word “ephemeral” means it can go away. It’s temporary. Fleeting, even. So why would I want to depend on storing something in a medium that can disappear without warning? And why am I forced to buy more of it when all I want is m...
Cyber – that is, anything having to do with the Internet – has evolved significantly since the Internet became a part of our daily lives. It is having significant impact of the development of nations, the democratizations of nations, on the defense of nations. In this ZapFlash, we’re p...
Just a few months ago I wrote a blog post about healthcare data on the cloud (HIPPA Cloud Storage) and the security concerns surrounding this very sensitive and valuable data. I mentioned that as with many industries, more healthcare data is being moved to the cloud, but the healthcare...
Everyone has an opinion about the ‘Cloud’ and its effect on business – some believe it is dark and scary and fraught with unnecessary risk, while others would argue it’s silver lined and the path to greater business performance and cost savings. The truth is that the Cloud undeniably h...
McKesson Corp. accomplished a multi-year, pan-IT management transformation that has enabled it to better leverage an agile, hybrid cloud model. Gardner: It's hard to believe it's been a full year since we last spoke. What's changed in the last year in how McKesson had been progressing...
More and more, small and medium-sized enterprises have become the victim of cybercrime. However, there is no reason that they should endure it sorrowfully. An authentication platform, for example, can be a solution for password hacking. There was a time when mostly banks and large com...
Australian Government agencies have some new regulations to consider when they are contemplating moves to the cloud, particularly clouds hosted outside of Australian borders. These guidelines, known as “The Australian Government policy and risk management guidelines for the processing ...
Following several discussions with fellow bloggers and industry executives, I found it quite fitting that the natural cloud leaders are the top software and web giants: Google, Microsoft and Amazon. While Amazon’s AWS is The public cloud today Google recently reported that it is doubli...
With the C-suite, innovators, developers and IT all pushing for the cloud, albeit for different reasons, there is no doubt that cloud computing is the next or fifth wave. As the cloud computing market continues to mature, explaining the platform shift gets easier and more succinct. Th...
In an era where reliable and scalable computer resources are like air and water to data-centric businesses and the time and cost of building in-house data centers are prohibitive for most businesses, Salt Lake City-based Voonami has developed a strong market position for outsourced dat...