Items Tagged with "Managed Services"
May 16, 2011 Added by:Headlines
"Dropbox does not employ industry best practices regarding the use of encryption technology. Specifically, Dropbox’s employees have the ability to access its customers’ unencrypted files. Dropbox has and continues to make deceptive statements to consumers..."
May 09, 2011 Added by:Bill Gerneglia
Think about the business terminology that preceded the notion of cloud computing and networking - token ring networks, Ethernet, distributed applications, Arpanet, SaaS - SOA, virtualization, horizontal scaling and the internet itself. The cloud is not a revolution, but an evolution...
May 04, 2011 Added by:Headlines
Qualys can deliver security and compliance in an integrated solution that easily interfaces with existing security solutions without the significant cost and complexity associated with deploying and maintaining traditional enterprise software...
May 02, 2011 Added by:Ben Kepes
Cloud vendors are quick to point out how reliable their data centers are with redundant communication channels, power supply structures and the like. Any application running on the clouds needs to consider the same issues – it is unrealistic to rely completely on one single data center...
April 27, 2011 Added by:John Nicholson
There are risks associated with allowing your data and applications to sit somewhere else, and some of these risks become more pronounced when you are operating in a cloud-based environment with little assurance about the physical location of your data. However, these risks can be managed...
April 26, 2011 Added by:Eli Talmor
While the benefits of using a public cloud infrastructure are clear, it introduces significant security and privacy risks. In fact, it seems that the biggest hurdle to the adoption of cloud storage (and cloud computing in general) is concern over the confidentiality and integrity of data...
April 26, 2011 Added by:Headlines
Security risks in the cloud have not prevented the federal government and the private sector from moving to cloud-based strategies which are able to provide a wider range of services at a lower price point than developing systems to accomplish the same tasks individually...
April 17, 2011 Added by:Ben Kepes
Aspects of this discussion are little more than cloud elites arguing finer points. There are some issues in the message used to justify the cloud to enterprises. We need to have a consistent story about what the cloud really means for an enterprise – something that is sadly lacking today...
April 14, 2011 Added by:Lindsay Walker
Every workplace has "super-users," people who can hack into systems and extract sensitive information. Having information stored offsite makes it challenging for anyone inside your organization to get their eyes on information they aren't permitted to see...
April 10, 2011 Added by:Allan Pratt, MBA
What were the service level agreements, and did they outline precautions that Epsilon would take to prevent such incursions? If none of this information was included in the SLAs, perhaps, it’s time for data-driven companies to include their information security strategies in SLAs...
April 08, 2011 Added by:Headlines
“Any company that is privileged to manage the information that a company maintains about its customers should be paying attention... Customers will surely start to wonder if they can’t trust these firms with their email addresses..."
April 05, 2011 Added by:Ben Kepes
Unfortunately, in the light of what can only be called FUD on the part of more traditional vendors, it is natural that those building clouds in the most efficient (read cheapest) of ways, fight back against some of that spin...
March 23, 2011 Added by:Headlines
Forty-five percent of K-12 schools suffered network downtime from malware outbreaks between two and five times per year, while another thirteen percent are impacted between six and ten times per year, and six percent experience more than ten incidents in the same period...
March 11, 2011 Added by:Rahul Neel Mani
Carlos Solari Vice President Cyber Technology and Services, CSC in an exclusive conversation with Rahul Neel Mani speaks on how organizations should deal with their security framework at the design stage...
January 12, 2011 Added by:Danny Lieberman
In the Cloud of rich Web 2.0 application services, we are not in Kansas anymore. There is a very very good reason to be worried. With all the expertise of cloud security providers – the Web 2.0 service they provide is only as secure as the application software itself...
November 25, 2010 Added by:Rahul Neel Mani
Dr. Werner Vogels, Chief Technology Officer at Amazon.com, in an interview with Ashwani Mishra, shares his views on the architecture behind Amazon Web Services, the adoption of cloud computing and key issues and trends around it...