Month: August 2012

The Holistic Application of Cloud Security (a white paper excerpt)

The following is an excerpt from the  executive summary of CloudAccess’ latest white paper titled “Applying Security Holistically from the Cloud: A Paradigm Shift of Applying Situational Awareness in SIEM deployments. To view the entire white paper (for free) simply visit: http://www.cloudaccess.com/contact fill out the form and  put “white paper” in the message box. The landscape of a typical business no longer reflects ones that were operating 10 years ago. The advancements in communication, collaboration, information and/or currency exchange/processing and the speed in which they

CloudAccess Releases White Paper on Holistic Situational Awareness for SIEM/Log Management

CloudAccess Releases White Paper on Holistic Situational Awareness for SIEM/Log Management  Los Angeles, August 29, 2012 – Security-as-a-service leader CloudAccess released a comprehensive white paper detailing the best practice of holistic situational awareness from the cloud. The paper titled “Applying Security Holistically from the Cloud: A Paradigm Shift of Applying Situational Awareness in SIEM deployments“ is now available in PDF format on the CloudAccess website (http://www.cloudaccess.com/documentation) or clicking HERE The 16-page paper outlines the strategic benefits and tactical administration of applying situational awareness (sometimes called

CloudAccess Showcased At Innovation Summit, Earns AlwaysOn Global 250 Award

  Security-as-a-service leader CloudAccess was selected as an AlwaysOn Global 250 winner by the technology media watchdog AlwaysOn for its unique technology and entrepreneurial approach to the cloud-based security market. CloudAccess was specially selected by the AlwaysOn editorial team and industry experts spanning the globe based on a set of five criteria: innovation, market potential, commercialization, stakeholder value, and media buzz.

FFIEC’s recognition of cloud security advantages is good for modest financial orgs

Last month the Federal Financial Institutions Examination Council (FFIEC) shared an opinion on the viability and security of cloud computing. In the four-page statement, the interagency body empowered to prescribe uniform principles, standards, stated that cloud computing is “another form of outsourcing with the same basic risk characteristics and risk management requirements as traditional forms of outsourcing.” What they are offering is a back-handed endorsement of cloud computing with the caveat that if you perform your due diligence and the solution passes the security smell

Do you leave your keys in the car too?

I heard the sky was falling. Well, at least the cloud was plummeting groundward. And all it took was one tech journalist to get his iCLoud account (and essentially his entire digital footprint) hacked. “The cloud is just like the Wild Wild West. No rules, no laws, no protection” “Just can’t trust the cloud.” I’ve seen those forum posts lately. Even the reigning high priest of computing Steve Wozniak (co-founder of Apple) voiced concern “I really worry about everything going to the cloud. I think

The DNA of Cloud Security

Just like the Boston Red Sox and lo-cal deserts and hybrid cars, everybody loves a bandwagon. We get caught up in the hype. Business concepts are not immune. Cloud and cloud-centric computing have been getting a great deal of play in business media and the blogosphere, and most companies are quickly moving to adopt various cloud platforms. So much so that that many solutions that claim to be cloud, really are nothing but server-based enterprise applications wrapped in a browser experience. Just because you access