Welcome!


Latest Articles from Cloud Security
This Enterprise Strategy Group lab validation report of the NEC Express5800/R320 server with Intel® Xeon® processor presents the benefits of 99.999% uptime NEC fault-tolerant servers that lower overall virtualized server total cost of ownership. This report also includes survey data on...
Mobile testing is getting harder: more devices, multiple operating systems, higher quality expectations and shorter development cycles. In his session at DevOps Summit, Tom Chavez, Senior Evangelist at SOASTA, will discuss the seven steps to improving your mobile testing process. To...
SYS-CON Events announced today that DataClear Inc. will exhibit at the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. The DataClear ‘BlackBox’ is the only solution that moves your PC, browsing and d...
SYS-CON Events announced today that IceWarp will exhibit at the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. IceWarp, the leader of cloud and on-premise messaging, delivers secured email, chat, do...
One of the great challenges of cloud computing is the seemingly endless possibilities it provides. Yes, you read that right. The perceived infiniteness of the cloud is both an asset and a challenge, especially when it comes to the healthcare industry. With its strict regulations rega...
“Threats are always evolving and the days of ‘set it and forget it’ malware and virus scanners are over if you want to keep your business information secure,” explained Abel Sussman, Director of Federal Services at Coalfire, in this exclusive Q&A with Cloud Expo Conference Chair Roger ...
As a class of business, IT providers may be hip to risk as a matter of course, but they aren’t exempt from the rules of the game and, given their special position in the information security ecosystem, attacks directed their way can be enormously consequential. Hacking doesn't happe...
‘FDA tells hospitals to stop using a pump that is vulnerable to hackers.’.This headline was all over the internet and news this weekend, with the pump in question being a medical infusion pump that automatically administers dosages of medication to patients in a hospital. A vulnerabili...
As organizations shift towards IT-as-a-service models, the need for managing and protecting data residing across physical, virtual, and now cloud environments grows with it. CommVault can ensure protection and E-Discovery of your data – whether in a private cloud, a Service Provider de...
The majority of an organization’s revenues are dependent on suppliers, distributors and other third parties. But as Benjamin M. Lawsky, New York State’s Superintendent of Financial Services, points out: “Unfortunately, those third-party firms can provide a back-door entrance to hackers...
In their session at 17th Cloud Expo, Hal Schwartz, CEO of Secure Infrastructure & Services (SIAS), and Chuck Paolillo, CTO of Secure Infrastructure & Services (SIAS), provide a study of cloud adoption trends and the power and flexibility of IBM Power and Pureflex cloud solutions. In h...
The Software Defined Data Center (SDDC), which enables organizations to seamlessly run in a hybrid cloud model (public + private cloud), is here to stay. IDC estimates that the software-defined networking market will be valued at $3.7 billion by 2016. Security is a key component and b...
Chuck Piluso presented a study of cloud adoption trends and the power and flexibility of IBM Power and Pureflex cloud solutions. Prior to Secure Infrastructure and Services, Mr. Piluso founded North American Telecommunication Corporation, a facilities-based Competitive Local Exchange ...
With SaaS use rampant across organizations, how can IT departments track company data and maintain security? More and more departments are commissioning their own solutions and bypassing IT. A cloud environment is amorphous and powerful, allowing you to set up solutions for all of your...
One of the hottest areas in cloud right now is DRaaS and related offerings. In his session at 16th Cloud Expo, Dale Levesque, Disaster Recovery Product Manager with Windstream's Cloud and Data Center Marketing team, will discuss the benefits of the cloud model, which far outweigh the...
The Internet of Everything (IoE) brings together people, process, data and things to make networked connections more relevant and valuable than ever before – transforming information into knowledge and knowledge into wisdom. IoE creates new capabilities, richer experiences, and unprece...
"Alert Logic is a managed security service provider that basically deploys technologies, but we support those technologies with the people and process behind it," stated Stephen Coty, Chief Security Evangelist at Alert Logic, in this SYS-CON.tv interview at 16th Cloud Expo, held June 9...
"Our biggest growth area has been the security services, the managed services - the things that differentiate us in the market that there is no client that's too small and there's no client that's too big," explained Paul Mazzucco, Chief Security Officer at TierPoint, in this SYS-CON.t...
"We provide infrastructure primarily for the IBM i platform, IBM Power, AIX and Power Linux. We have a very broad-based solution that focuses on IBM Power," explained Hal Schwartz, CEO at Secure Infrastructure & Services, in this SYS-CON.tv interview at 16th Cloud Expo, held June 9-11,...
Software-Defined Networking (SDN) is one of the most interesting developments in networking to emerge in the last decade. The potential to establish a simplified infrastructure and leverage software to dynamically modify existing flow characteristics has the potential to address many c...
Security can create serious friction for DevOps processes. We've come up with an approach to alleviate the friction and provide security value to DevOps teams. In her session at DevOps Summit, Shannon Lietz, Senior Manager of DevSecOps at Intuit, discussed how DevSecOps got started an...
Cloud data governance was previously an avoided function when cloud deployments were relatively small. With the rapid adoption in public cloud – both rogue and sanctioned, it’s not uncommon to find regulated data dumped into public cloud and unprotected. This is why enterprises and clo...
"The federal government is the nation's largest consumer of information technology and this year alone the government is spending $2.1 billion on cloud technology. We help do the compliance assessments for companies to meet the federal security requirements," explained Abel Sussman, Di...
Carl Bradley, U.S. Navy (Ret.), is a Cyber Security Consultant, Information Assurance & IT Security Consulting & Intelligence Strategy, HP Enterprise Services, U.S. Public Sector. SecuritySolutionsWatch.com: Thank you for joining us today, Carl. Before discussing HP Enterprise Securit...
When business disruption, occurs, it is more likely to sneak in through your defenses than it is to overwhelm you by fire, flood, earthquake or hurricane. Instead of breaking in through your walls and ceilings, it sneaks in through your defenses to steal data, install malware or freeze...
As more and more businesses choose to depend on the cloud, it is not unreasonable to be cynical and doubt the evolution. Are businesses risking it all by moving their data to the cloud? Or is this a totally thought-out move? The days of hosting websites and applications on your own in...
The growing cloud computing industry brings many new opportunities, but with success comes litigation, both from competitors seeking to gain an edge in a crowded market and opportunists seeking to make a quick buck. Valid patents and good innovations deserve due respect and considerati...
"At our booth we are showing how to provide trust in the Internet of Things. Trust is where everything starts to become secure and trustworthy. Now with the scaling of the Internet of Things it becomes an interesting question – I've heard numbers from 200 billion devices next year up t...
"For the past 4 years we have been working mainly to export. For the last 3 or 4 years the main market was Russia. In the past year we have been working to expand our footprint in Europe and the United States," explained Andris Gailitis, CEO of DEAC, in this SYS-CON.tv interview at Clo...
"SOASTA built the concept of cloud testing in 2008. It's grown from rather meager beginnings to where now we are provisioning hundreds of thousands of servers on a daily basis on behalf of customers around the world to test their applications," explained Tom Lounibos, CEO of SOASTA, in...
"Vormetric is a data security company. We secure information at rest and our customers are some of the largest organizations in the world. The threats that are coming around today are either from state-sponsored activities and organized crime, and the intent is to steal information," e...
“Will Jaya is a direct source for server integration and storage solutions. If you are looking for any specific configurations for a project we can help you configure based on your needs and requirements," explained Netty Goya, CEO of Will Jaya, in this SYS-CON.tv interview at 15th Clo...
"We help companies that are using a lot of Software as a Service. We help companies manage and gain visibility into what people are using inside the company and decide to secure them or use standards to lock down or to embrace the adoption of SaaS inside the company," explained Scott K...
"At Harbinger we do products as well as services. Our services are with helping companies move their products to the cloud operating systems. Some of the challenges we have seen as far as cloud adoption goes are in the cloud security space," noted Shrikant Pattathil, Executive Vice Pre...
"Verizon offers public cloud, virtual private cloud as well as private cloud on-premises - many different alternatives. Verizon's deep knowledge in applications and the fact that we are responsible for applications that make call outs to other systems. Those systems and those resources...
“We are strong believers in the DevOps movement and our staff has been doing DevOps for large enterprise environments for a number of years. The solution that we build is intended to allow DevOps teams to do security at the speed of DevOps," explained Justin Lundy, Founder & CTO of Evi...
While there are hundreds of public and private cloud hosting providers to choose from, not all clouds are created equal. If you’re seeking to host enterprise-level mission-critical applications, where Cloud Security is a primary concern, WHOA.com is setting new standards for cloud host...
DevOps is the hottest moving target when it comes to software development methodologies. Many people fear that this fast-paced, barrier-breaking movement will leave information security best practices in the dust. Analysts provide recommendations to security professionals using bingo-l...
What do a firewall and a fortress have in common? They are no longer strong enough to protect the valuables housed inside. Like the walls of an old fortress, the cracks in the firewall are allowing the bad guys to slip in - unannounced and unnoticed. By the time these thieves get in, t...
It's time to face reality: "Americans are from Mars, Europeans are from Venus," and in today's increasingly connected world, understanding "inter-planetary" alignments and deviations is mission-critical for cloud. In her session at 15th Cloud Expo, Evelyn de Souza, Data Privacy and Co...