Cloudera Not Cutting It With Big Data Security Cloudera is, for the moment, a dominating presence in the open source Hadoop landscape; but does it have staying power? While Cloudera’s Big Data platform is the darling of the Hadoop space, they and their open source distribution competitors have so far failed to adequately address the elephant in the room: enterprise data security. Cloudera’s Chief Architect and creator of Hadoop, Doug Cutting, recently discussed the growing value of Big Data in a CNBC Squawk Box segment, but nervously glossed over the subject of data security when it was raised. Benzinga reported Cutting as
HR Security Risk Prevention… With the rapid adoption of the Cloud by SMEs as well as large enterprises, it has become vital to review and update HR policies to mitigate information security threats that come with this paradigm shift. Cloud systems differ from traditional, in-house IT infrastructure in a way that businesses now have less control over their software while handing over most of the control to third party Cloud service providers. For example, it is hard to keep track of your employee’s browser history if he or she is connected to a virtualized environment inside the Cloud. Your business
5 Cloud Computing Trends For 2013 In 2012, cloud computing became a much bigger trend in the business and networking world. IDC have predicted a 130% increase in cloud computing by 2016, meaning an increase to $43 billion. Here are some of the five trends to look out for that are coming in 2013 which are going to help boost cloud computing in the long term; Subscription With more and more companies beginning to look into cloud computing, the hype is growing every day and more businesses are using it. Colleges are using it more and more to help store lecture data for easy access to
IT Disaster Recovery For SMEs According to credible estimates, an hour of outage may cost a medium sized company $70,000. Yes, that is accumulated losses when IT systems go offline. What’s interesting to note here is that in contrast to the popular belief that natural disasters constitute the primary reason for IT system failure, a recent study finds hardware failure to be the leading cause, by a big margin, of IT disasters and the losses, both financial and loss in credibility, which small and medium sized businesses have to incur. However, if SMEs take the right precautions, much of the
Interested in ERP? Here are Five Free Information Assets for You “He who fails to plan is planning to fail.” – Winston Churchill (1874-1965), iconic statesman and world leader. For any organization desirous of success, planning is crucial. Whether it’s planning for customer demand or regulatory compliance, ERP or Enterprise Resource Planning can help organizations navigate the intricacies of hierarchies and complexities of data. An ERP system collects and collates information from all corners of an organization to improve efficiencies and effectiveness through optimal usage of resources, better planning, faster decision-making and eliminating redundancies. For example, an ERP system may
Data Encryption For Education Schools, colleges and universities are facing data security issues on a regular basis and the nature of their IT systems present unique challenges. Balancing diverse information with required security control is complicated when the IT infrastructure is decentralized and difficult to manage. Adding to these challenges is a diverse user population and the increased use of multiple devices and platforms. In this eBook, you’ll discover the basics of data encryption; how it addresses the unique data security challenges facing educational institutions, and key points to consider when building the business case for data encryption. You’ll also learn
Cloud Infographic: BYOD Security and Policies AccelOps Cloud Security Survey Report surveyed some 176 IT security personnel and they ranked BYOD as the top source for fear of incurring data loss and having the need for heightened data control. This is the traditional topic or cloud worriers and opponents of cloud computing which only helps in propagating the myth that cloud computing in not secure. ISC2’s January research shows that explicitly linked cloud computing to the creation of personal device policies. But the take away from the research is that companies who support BYOD have happier employees while also needing to increase their cloud security knowledge and skills.