5 Ways CIOs Can Tackle Cloud Fears CIOs are tired of hearing about cloud computing concerns. They’ve spent years reading about how cloud resources are subject to risks, and wonder – what can they do to help people trust the cloud? The truth is that despite being a hot issue for years, the topic of cloud security is more important than ever before as growing corporate dependency on web and mobile services coincide with national privacy concerns – most recently with the NSA scandal. The good news is that the hybrid cloud environment, which integrates on-premise and cloud-based solutions, allows
How To Tackle Security Vulnerabilities In Hypervisor Based Cloud Servers Virtualization brings numerous security issues apart from the enormous benefits and productivity. Most of the organizations are reluctant to migrate to the cloud just because of the massive security vulnerabilities of cloud computing. Hypervisor, which is used in any virtualization environment to elevate the virtual machine collaboration, can be easily breached if not secured optimally. Hypervisor based cloud servers are always exposed to the Distributed denial-of-service (DDoS) attacks and the “single point of failure” weakness of the hypervisor based cloud servers can easy be exploited to take down the whole
Some Reasons Behind Cloud Security Vulnerabilities We have debated back and forth that the Cloud is just as safe as the traditional enterprise option, and even more so. Combined with all the advantages, it is a better option for today’s business world. But the security fears are always just around the corner and pops up again every time there is a discussion about Cloud migration. These fears are not unfounded however; they are very real but quite containable unless they were not considered during migration to the Cloud. Organizations looking into Cloud security like HP have found very simple and
Where Hardware Meets the Cloud: Arraying High-end Server Platforms The web has brought out hardware machinery spot-on to cloud-based applications. Some of these servers are so scalable in magnitude, mindboggling in performance and high-end in gigabytes capacity, that they even sound a little alien. Suddenly they are here and those who only thought of them as data processors without a name can now identify with them, courtesy of cloud computing platforms. Intel, through its Tyan partners, is an example of companies that have enabled this to happen through its cutting-edge processing units. These can be discussed under the following headings.
Is My Public Cloud Too Public? Part 5 (Conclusion) Continued From Part 4 The ideal cloud equation Control + Visibility = Trust A cloud deployment that overcomes these myths is built on trust. Trust cannot be achieved without control and visibility across the cloud infrastructure, identities, and information. Control Availability: Ensure access to resources and recovery following disruption or failure. Integrity: Guarantee that only authorized personnel can access specific information and applications. Confidentiality/privacy: Protect how information and personal data is obtained and used Visibility Compliance: Comply with specific legal requirements, and industry standards and rules. Governance: Establish usage rights and enforce
Having an agile, mobile workforce is becoming commonplace for a lot of small and medium-sized enterprises. Remote working has been happening in corporate environment for decades, but they have whole teams dedicated to deploying infrastructures and locking them down securely. Some organizations already have solutions in place, but are they secure? How do organizations who have no remote working capability get started? Authentication For years, you’ve heard the security community harping on about having secure passwords. It’s likely you are more than familiar with advice such as, no using the names of your children/pets, no birthdays/anniversaries, use a mixture of
OpenGamma Combines Open Source and Cloud Computing in Innovative Platform OpenGamma is a good example how Cloud Computing changed the way entrepreneurs and software vendors are looking for new software and technology solutions. Kirk Wylie, Elaine McLeod and Jim Moores founded OpenGamma in 2009 and rumors were a new London-based technology start-up is entering financial services market. Traditionally, London hosts many financial companies and it was not quite unexpected that a newcompany introduced its services in a lucrative market such as financial industry. The company, however, offered a different approach in a historically conservative industry field whose members acknowledged that