Welcome!


Latest Articles from Web Security Journal
SOASTA’s five-year journey began at the very first Cloud Expo back in 2008 when they launched an enterprise cloud service called CloudTest. CloudTest quickly became one of Cloud Computing's "Killer Apps" by helping the world’s largest consumer brands to test and deliver quality online ...
In the past, innovation in the IT industry consisted of a few large vendors developing hardware and software products in virtual isolation. This behavior stemmed from the desire to hide trade secrets from competition and maintain a lead in the market. Few solutions dominated the IT lan...
Enterprise data is proliferating at such a ridiculous pace that the folks in your organization simply can't make sense of it all. But it's not just the volume of data that cripples decision-makers – it's the ability (or lack thereof) to access information how, where and when they need....
Massive in scale, hyperscale cloud infrastructures are defining new storage efficiencies as there are intense economical and operational pressures to do more with less, while building and maintaining expansive and complex multi-tiered storage data centers in order to scale, reduce TCO ...
In the recent survey I conducted titled "State of Enterprise Mobility 2013" I asked the question, "Does your company view mobile solutions as tactical (LOB or process specific) or strategic (critical to the success of the company)?" Over 220 participants answered the question with 71....
Healthcare provider Sentara Healthcare has improved its IT operations and services delivery at higher quality and higher speed, making IT an internal business-service provider, and deploying better monitoring of app services. To learn more about how Sentara Healthcare excelled at appl...
There has been a ton of buzz in the industry lately around hybrid cloud. From enterprises developing multi-vendor cloud strategies to hosting providers offering products that take advantage of different infrastructure types, there has been a definite shift toward hybrid clouds as the p...
Cybercriminals are employing more sophisticated techniques all the time and far too many companies and organizations still don’t have the protection they really need to safeguard their systems. The prevalence of targeted attacks and advanced persistent threats (APTs) is disturbing. ...
In the recent survey "State of Enterprise Mobility 2013" I asked the question, "How many wireless devices do you use daily?" An incredible 69 percent use three or more wireless devices daily. I myself use three - my MacBook Pro, iPad mini and iPhone. I use my iPad mostly for reading ...
A myriad of new methodologies and technologies from Cloud Computing to BYOD have changed the IT landscape demonstrably. In parallel, higher-value functions around data, customer engagement and revenue growth are pushing CIOs to consider alternative approaches. The nexus is moving IT to...
The cloud can be used for many purposes. Securing a second copy of your backups offsite is a wise cloud use scenario and one that may save your or your clients’ businesses one day. In his session at the 13th International Cloud Expo®, Chris Francesconi, Sales Engineer for StorageCraft...
SYS-CON Events announced today that Stratogent, a custom managed services organization, will exhibit at SYS-CON's 13th International Cloud Expo®, which will take place on November 4–7, 2013, at the Santa Clara Convention Center in Santa Clara, CA. Stratogent is a custom managed servic...
Enterprise Cloud adoption revolves around pushing the BYOD movement and focusing on data security. In his session at the 13th International Cloud Expo®, Ross Brouse, COO and President of Solar VPS, will cover how cloud adoption is driven by consumerism and how humanity needs to socia...
IBM Smart Cloud Enterprise is offered as a service called IaaS to deliver the best infrastructure for any business. The user then gets access to IBM’s virtual server and all the resources that go with it. The services are flexible and the security is unmatched. It also provides a clou...
This article takes a look at the administrative overhead for implementing VDI in either a VMware or Microsoft environment. Number of admin touch points, upgrade considerations, complexity, and more. A little bit of history first. Virtual Desktop computing has been slowly etching its...
Is Service Virtualization is worth it? Consider the ROI opportunities: OpEx/CapEx reduction, risk reduction & incremental top-line revenue. Last week, we explored the business value of service virtualization: how service virtualization's simulated test environments speed innovation, a...
As web applications continue to proliferate, identity theft and fraud expand to chronic levels in the US. Back in 2006, the FTC reported over 8M victims of identity theft with cases costing $5000 and 1200 hours to repair the damage, and it’s only gotten worse since then. MasterCard and...
The way organizations are consuming IT services is evolving, driven by the cloud and mobile era. Cloud enables new IT service delivery models. This represents a disruptive change for both business and IT, but with this comes increased complexities and expanded management and integratio...
In a move that disrupts the rapidly growing worldwide IT management market for emerging enterprises and departmental/line-of-business customers, CA Technologies on Tuesday announced the availability of CA Nimsoft Monitor Snap – a free, feature-rich version of its acclaimed CA Nimsoft M...
Stats show risk grows in disproportion to IT security readiness. Security deployed, managed from the cloud provides strong results. How cloud security overcomes the obstacle. It’s simple, really. More bang for the buck. Using the ability to apply operation expenses over capital ones ...
The conversation of “Why Cloud?” has long since passed for many businesses and the question has transitioned into “How Cloud?”, or more importantly, “Is it safe?” Much is at stake protecting your business and your customers, and naturally, you should be cautious. Managing security in t...
In just a few short recent years the idea of software-defined networks (SDN) has moved from a theoretical academic concept to a real-life practical proposition for making the world’s telecommunications networks more efficient, cost-effective, easier to manage and resilient. The SDN con...
Now make the right tactical decisions to navigate FedRAMP successfully. FedRAMP – or the Federal Risk and Authorization Management Program – is a Cloud Service Provider’s gateway to the lucrative world of federal contracting. However there are tactical engineering decisions that must ...
More and more people are getting credit cards with a built-in RFID chip in them. That little RFID chip (Radio Frequency ID) can transmit your credit card info out several feet when it is scanned by any reader. Most people don’t know this. You can tell if your credit card has an RFID i...
Hillsong United, is a global musical powerhouse headquartered in Sydney, Australia. While I was in Sydney recently I was able to attend a musical program led by Hillsong's Taya Smith. Taya Smith is the singer of the popular christian worship song Oceans. Last week, our daughter sang...
What's the value of Service Virtualization? Learn how it speeds innovation, accelerates time to market, and reduces application development risks. With today's interconnected applications, a complete and realistic test environment is nearly impossible to stage. However, without reliab...
The focus shouldn’t be on threats, but rather on how those threats might change. At the technology level, this focus on change shifts the focus from a static “locked door” approach to security to the immune system metaphor I discussed last year. But there’s more to architecting for sec...
Concern over big government surveillance and security vulnerabilities has reached global proportions. Big data/analytics, government surveillance, online tracking, behavior profiling for advertising and other major tracking activity trends have elevated privacy risks and identity based...
Inside the world’s companies and government departments, IT organizations have traditionally focused on delivering to internal customers. This has created an environment where IT is expected to align the services it delivers with age-old business processes that have evolved over years ...
One of the first initiatives for secure booting has been the Unified Extensible Firmware Interface (UEFI) Initiative. This is a superior replacement of the Basic Input Output System (BIOS) and a secure interface between the operating system and the hardware firmware. The UEFI Initiat...
Verizon on Thursday announced Verizon Cloud – its new cloud Infrastructure as a Service (IaaS) platform and cloud-based object storage service. With this service, Verizon is fundamentally changing how public clouds are built. Large enterprises, mid-size companies and small development ...
Net Optics on Wednesday announced a spectrum of advanced new features and capabilities in its popular Flex TapTM product line. The Flex Tap resolves system-wide signal loss issues for Service Providers and other organizations as network volumes increase and optical networks migrate to...
TwinStrata, Inc., has announced the results of its 2013 Cloud Storage and Disaster Recovery survey. Conducted between May to August 2013, the report analyzes responses from 288 IT personnel. The results indicate widespread acceptance of cloud storage and demonstrate the tangible impact...
It’s the dream of every Internet entrepreneur to build a business that goes viral. Yet the sad truth is that most do not. It’s hard to think of any other industry with such a winner-take-all mentality as Internet software. The volatile combination of small market entry costs and big ne...
Hostway has announced the Application Packaging Standard (APS) integration of its FlexCloud Servers (Infrastructure-as-a-Service, or IaaS), public-cloud hosting suite, in partnership with Parallels, a global leader in hosting and cloud services enablement and cross-platform solutions. ...
You may not realize it, but your house is getting smarter. Devices that were once entirely manually controlled, whether it’s your thermostat, the locks on your doors, or your porch lights, are now entering an era of autonomy, and the list of devices in the home automation spectrum is c...
Once upon a time, there was a movement in IT called "agile". Developers adopted it in response to complaints from the business that they needed applications, that applications were everything, that without new applications the business would surely dry up. Dev then began tossing code o...
“The Data Center operators do understand that quality does matter,” noted Barbara P. Aichinger, co-founder of FuturePlus Systems and VP of New Business Development, in this exclusive interview with Cloud Expo Conference Chair Jeremy Geelan. “When they experience failures they call the ...
Imagine you work at a company preparing to issue its quarterly earnings report. The phone rings. It’s bad news. A coworker has discovered that a former employee has been logging into the company’s network for months. It’s unclear whether the former employee has used this illicit access...
For enterprises moving more business and customer data to the cloud, investigating and selecting an online storage solution can be a challenging task. A primary concern is the level of data security offered by the sites being considered. While the theme holds true across all of the maj...