Welcome!


Cloud Standards

The cloud has hit the mainstream. Businesses in the United States currently spend more than $13 billion on cloud computing and managed hosting services, and Gartner projects that by 2015, end-user spending on cloud services could be more than $180 billion worldwide. It is estimated tha...
If your organization’s got a lot riding on the continued security of its confidential or proprietary data, then you need to stay informed on the threats and how to address them. One of the most worrying threats of late, especially when it comes to cloud data security, is government spy...
Heartland, based in Princeton, New Jersey, has improved governance results in innovative ways across the organization, thanks to both security best practices and HP Fortify tools. Heartland Payment Systems has successfully leveraged software-assurance tools and best practices to driv...
Enterprise organizations are looking for service providers to be a trusted partner with them throughout the entire transition through steady state process. The key for cloud providers is to develop ongoing relationships with their customers using hands-on engagement processes from begi...
Have you ever considered how the traditional author, teacher, textbook and student relationship will change when digitally transformed and mobile device enabled? What if writing a textbook is no longer enough for an author? What if all textbooks in order to be widely sold and used al...
Over the last three years, the number of IT decision makers who believe their business has more applications than it needs has increased from just over a third (34 percent) to nearly half (48 percent). Apps bloat is a huge problem. Especially when the apps are non-mission critical, or...
In my last blog, I discussed the debate surrounding the true definition of open and unfettered Internet, and the different interpretations various groups and individuals have on the matter. In this posting, we continue the discussion. The U.S. government has not enacted legislation to...
People care a lot about technology augmentation, refinement and fine-tuning. We talk about performance acceleration, pushing processing power and the required levels of storage we need to underpin modern IT needs. It’s a never-ending cycle of regenerating work all focused on producing ...
It has been some year in the world of Cloud and Cloud Storage in particular. We witnessed the demise of Nirvanix, as well as the revelations of Edward Snowdon outlining the surveillance of the PRISM surveillance program and the alleged collusion with major US Service providers. Amidst...
When you think of logs, what do you think of? It’s most likely troubleshooting software applications and the infrastructure that underlies them, keeping an eye on your production apps…perhaps even database logs and some other things like that. Traditional log management stuff…I’m guess...
Agility means being able to change direction rapidly in response to a change in market conditions. As business increasingly moves to online and mobile interfaces, the agility of enterprise applications becomes a critical success factor. With the advent of the cloud, making applications...
SecuritySolutionsWatch.com: Thank you for joining us today, Bryan. If you wouldn’t mind, please tell us a little bit about your background and your role at HP. Bryan Coapstick: As the Director of Mobile Innovation, I am responsible for ensuring that HP’s mobility initiatives successfu...
Explores three ways to help development teams bear the burden of security: use pen test results to harden the application, leverage service virtualization for security scenarios, & adopt policy-driven development to help engineers understand and satisfy management’s security expectatio...
For some organizations, cloud computing can be a hard sell, even before you come to the question of how to handle cloud-computing security. Public cloud, private cloud, hybrid cloud, encryption, tokenization, data residency, privacy regulations – all are factors involved and the percei...
Many technologies have made their presence felt this year and continue to excite us with the promises they hold for the future. Cloud computing has now reached a stage where businesses are seriously experimenting and are starting to reap the transformational benefits it can deliver. If...
In September, Google experienced a services disruption that affected nearly a third of Gmail users. As you’d expect, it generated quite a bit of news. Such outages are fairly infrequent, but even Google struggled to resolve it. The Google status dashboard during that outage simply said...
After years of talking to people inside and outside of my company about the benefits of cloud computing, I'm truly convinced that the most important benefit is not cost reduction or the ability to have new servers up and running in a few minutes. Of course those are great capabilities ...
Exposing an API to your application is as risky as installing a doggie door into your house—as a recent incident with a bear aptly illustrates. Exposing an API to your application is as risky as installing a doggie door into your house: you expect your dog to have the convenience of o...
For enterprises moving more business and customer data to the cloud, investigating and selecting an online storage solution can be a challenging task. A primary concern is the level of data security offered by the sites being considered. While the theme holds true across all of the maj...
Increasing the I/O performance of next-generation data centers and cloud computing environments is essential for supporting enterprise e-commerce, database and email applications. To successfully deploy high-performance storage, it’s essential for storage appliance software to be flash...
Last month while in Sydney, Australia I participated in an interesting session taught by my colleague Ajoy Mallik on how to organize a continuous innovation program internally. Our client had asked us to help them develop this program. I learned a lot from Ajoy! Fast forward to toda...
With customer expecting information technology to be delivered with new models, systems integrators have to quickly transform themselves to meet these needs. Over the past few months, I have interacted with several organizations that are evaluating changes to their business model to a...
Want the secret to user provisioning/de-provisioning in an enterprise setting, The one word answer,…Integration.The question is why, how & with what? The need to credential authorized users to your network and other proprietary assets is clear. You only want those with the proper righ...
The convergence of market transitions, ranging from collaboration and video to virtualization and cloud-based services, is fundamentally changing the way customers acquire and use technology. As new advanced services and products are introduced, organizations that strengthen their com...
Just a few months ago I wrote a blog post about healthcare data on the cloud (HIPPA Cloud Storage) and the security concerns surrounding this very sensitive and valuable data. I mentioned that as with many industries, more healthcare data is being moved to the cloud, but the healthcare...
In an era where reliable and scalable computer resources are like air and water to data-centric businesses and the time and cost of building in-house data centers are prohibitive for most businesses, Salt Lake City-based Voonami has developed a strong market position for outsourced dat...
The convergence of increased data stored on company networks and stricter compliance regulations dictating the length of time the information needs to be stored for have helped cloud storage explode in popularity. The cloud offers an easy-to-use, scalable and cost-effective solution fo...
Floods, fires, tornados, earthquakes, pandemics, riots, and hurricanes are just a small sample of the potential disasters that threaten businesses almost daily. Throughout my career, I have been responsible for preparing, managing, and rebuilding major communications infrastructure and...
As with other industries, the daily operations of law enforcement and criminal justice organizations rely heavily on obtaining, holding and sharing sensitive data. The FBI’s Criminal Justice Information System (CJIS) is responsible for providing many critical pieces of data that crimin...
Millennium Pharmacy Systems, Inc., has successfully deployed mission critical SaaS applications, and implemented advanced IT management and operational efficiency processes and systems to keep all the applications up to date, compliant, performant, and protected. Managing application...
In an article I published earlier this week, Digital Transformation, Code Halos, Analytics and Mobility, I provided an overview of the concept of Code Halo™. The idea is that nearly all organizations, brands, products and people are surrounded by a halo of data. Companies that recogn...
A retailers' mantra throughout history has been location, location location. This is always important, but perhaps of less value than other innovations caused by digital transformations today. The ongoing digital transformation of many industries has created new competitive playing fi...
At pennies per virtual machine-hour, the economics of cloud computing are both compelling and daunting to replicate. Whether you are building your own cloud infrastructure, building a public cloud or choosing a cloud service, there are key strategy and technology decisions that make th...
A PMTUD black hole can cause a particularly subtle set of issues in hybrid cloud-based environments where the cloud resources are connected to a corporate office or other datacenter via IPSec tunnels. PMTUD black holes basically cause certain (but not all) traffic to not make it throug...
Legos have been a part of my life for as long as I can remember. Some of my earliest, fondest memories involve Legos - starting from a small car made from a couple of simple bricks to very complex spaceships and wild creatures. I’m always amazed at how nicely and cleanly they snap toge...
In a recent blog post, we discussed the emergence of Cloud Protection Gateways as a solution for enterprises looking to protect sensitive cloud data by keeping that data under their complete control. We started looking at the vetting process enterprises undertake when they are selectin...
Through a great deal of research on enterprise cloud adoption and security, I’ve learned something telling. As you would expect, CISOs’ opinions about cloud strategy are quite varied. While many folks recognize their company’s use of SaaS for HR, sales, communication, and other applica...
The "Force Majeure" provision, a Latin term roughly meaning an "Act of God" is commonly found in most services agreements. But should it be included in your cloud services contract? This nugget is a common clause in contracts that essentially frees both parties from liability or obli...
Associated Surgeons and Physicians, LLC in Indiana went from zero to 100 percent virtualized infrastructure and as a result, met many compliance and efficiency goals. In part one of a two-part interview series, we discuss how a mid-market health services provider rapidly adopted serve...
We have just published a post at the OpenNebula blog with our view about the different measures that should be considered to evaluate the openness of the main open-source Cloud Management Platforms (CMPs). Which is the m...