Tag: cloud computing

In Cloud We Trust

It wasn’t too long ago the very thought of security in the cloud was a challenging barrier to adoption. How can you secure a thing so vaporous and intangible? It scared off a lot of companies (especially SMBs and midsized) that would have felt the immediate financial savings and productivity gains from the various applications and solutions that were deployed from this nebulous place called the cloud. That barrier is cracking. Earlier this week Microsoft released a study of SMBs that found the move to

The Challenge of Herding Cats: Your SaaS Portfolio and Security

It’s obvious the rise of SaaS (software-as-a-service) has changed the game. The benefits of subscribing to a cloud-based application service are already well-known and documented: cost-efficiencies, speed, hands-off maintenance, etc… It’s no longer an emerging practice and, for most IT managers, has become an inextricable component of any go-forward IT network strategy. What this means is now there are dozens of new sign-ons per user from a variety of endpoints (including mobile and tablet). And if we are talking enterprise-wide deployments, this is can be

Identity Management in the Cloud: A Matter of Function, Control, Cost

I was flipping around the 320 channels on TV yesterday and came across an old episode of Seinfeld. It’s the one where Jerry is asked to fill in as a doorman for a high rise. While standing sentry, he lets various people through and finally leaves his post only to find the lobby couch was stolen. It got me thinking about how many companies simply leave the proverbial front door open and practically let anyone access data on their network without secure authentication. User identities

If a tree falls in your network, does anybody hear?

When I started scribbling notes as to what to write about this week, my first thought was to address some of the claims that cloud wasn’t “ready for prime time,” by a some survey done by Wisegate. Everyone is entitled to an opinion, and those who wish to turn a blind eye to the maturation of the cloud do so at their own risk. Before I move on to the subject at hand, I will simply remind doubters that these same voices were shouting the

The Challenge of BYOD

“Don’t care how…I want it now!” -Veruca Salt (Willy Wonka and the Chocolate Factory) We live and work in a world of immediate gratification. In the name of greater productivity if you need to check inventory from a supplier’s warehouse…click there it is. Share a file on Dropbox, no problem. Add detail about a meeting in the sales database… click! Update your Facebook or LinkedIn status. Email a white paper to a potential client…click, click. Want to see that flying pig meme…well, you get the

Shooting from the HIPAA… compliance in the cloud

As an IT professional, what visuals are conjured when you hear the phrase “HIPAA compliance;” Is it Sisyphus having to push a heavy boulder up a mountain only to have it roll back down? Is it some hapless character from a Kafka novel caught in some endless bureaucratic labyrinth of requirements? Or is it just a giant hippopotamus sitting on your lap? Compliance is the necessary evil of any IT strategy. It has the best of intentions, and in many cases, it ensures the right

A Job for Man or Machine?

A Chief Technology Officer for a Midwest banking holding company made a very interesting observation earlier this week. In commenting about the needed increase in fraud fighting resources, he warned about the perils of overemphasizing technology while ignoring training staff in using manual fraud-detection processes. Most of what he says is spot on in terms of ensuring the proper prioritization, risk analysis and the blind reliance on technology to identify and neutralize threats and breaches. In fact, as an officer in a technology company, I