Click here to close now.




















Welcome!

@CloudExpo Authors: Liz McMillan, Elizabeth White, Pat Romanski, Don MacVittie, Lori MacVittie

Related Topics: Cloud Security, Java IoT, Microservices Expo, Containers Expo Blog, Agile Computing, @CloudExpo

Cloud Security: Article

Is Your Security Initiative “One Inch into a Mile”?

How can you find ROI if 73% of major software implementations don’t get past phase one

In the software universe we’ve all heard the saying “We are One Inch into a Mile of Functionality but we are paying for the entire mile.”

That pretty much sums up every technology initiative ever embarked upon. Whether we are talking, ERP, CRM, SIEM or a variety of other alphabet soup programs, it always looks so simple in the demo, but when rubber meets the road, there’s always some gremlin preventing or delaying full realization of the benefits or expected ROI.

Now I am not looking down my nose at any particular implementation of any particular product, but I read a Forrester statistic that stated 73% of major software implementations don’t get past phase one. Whether a result of scope creep, budget busting or flagging executive buy-in, the promise of ROI is underwhelming; not to mention the drag on IT productivity and lack of measurable results. And it’s those results we depend on to drive ROI and solve the business need.

And, of course that’s where the cloud can be a savior to an SMB or Fortune 500 global enterprise. The immediate benefit of cloud applications is the zero-day factor. One the first day of your subscription, the functionality is 100% there and ready to be applied. The endless hours upon hours of scoping, development, implementation, testing, tweaking, retesting, reinstalling, configuring, hair pulling, reconfiguring, reprioritizing, rescoping, testing again more deploying, redeploying are gone.  And with it, the delta of time between capital investment and ROI realization has stretched considerably. Sometimes in excess of 3-4 years.

This is especially true when applying enterprise security solutions.

We all realize that IT security can be a cost center. We also know that return on investment on a security initiative can take time to calculate. However, if applying security-as-a-service solutions such as SIEM, Log Management, IDM, Access Management and SSO an enterprise receives maximum benefit right out of the gate and you remove all the crushing weight of capital costs.

Here’s an example. Company X must comply with a federal regulation (PCI, HIPPA, CIP, GLBA, etc.). IT and the C-Level executives realize that a solution to capture log events and store the requisite information is needed. While doing their due diligence, they discovered that having a solution that also monitors the logs for suspicious activity is also worth the investment. In the end they create a budget and decide on an appropriate course of action. Now comes the expensive part. They lay out the cash for the server, for the software package, for the additional hardware. Conservatively (for a small enterprise) we are talking $150,000. And that’s before the first line of custom code is written or a PC is plugged in. Additionally the support and maintenance clock has started ticking—another 30 grand.

It’s three months later, and you finally deployed the first small portion. You’ve invested two full-time implementers, a consultant, etc., another $25,000. And in that time there has been a software update and seven patches.  Without putting too fine of a point on it, before you’ve seen one inch of functionality, you’re already in the hole well over a quarter million dollars. Now how many anomalies prevented will it take to realize any return? Besides in the three months, you’ve simply scratched the surface in terms of functionality. It will be another year before the system is fully functional.

Let’s compare that nightmare scenario with the deploying and managing from the cloud. Once the sensors are calibrated (each sensor is less than 1GB of space on a server or monitored device) and configured, your enterprise is fully covered. You are receiving a fully-formed, fully functional enterprise-class deployment. In this case there is no server purchase, no software purchase…in fact no capital expenditure of any kind. For what Company X is paying in support and maintenance (it’s OpEx commitment), the company could trade in the entire Year 1-3 initiative costs. The instant scalability of the cloud-based SIEM/Log Management gives Company X the flexibility to right size as it goes and therefore, only pay for what is needed. There is never a mile minus one inch of function going unused.

Many organizations are in the same boat as Company X. By considering security-as-a-service they could instantly reduce capital budget (trade CapEx for OpEx) and immediately begin accruing the necessary capabilities to meet the business need while enjoying the direct benefits that translate into return on investment. In this scenario, there’s no waiting three years for ROI, but more important for compliance and security, there’s no waiting to deploy important functionality.

Kevin Nikkhoo

www.CloudAccess.com

More Stories By Kevin Nikkhoo

With more than 32 years of experience in information technology, and an extensive and successful entrepreneurial background, Kevin Nikkhoo is the CEO of the dynamic security-as-a-service startup Cloud Access. CloudAccess is at the forefront of the latest evolution of IT asset protection--the cloud.

Kevin holds a Bachelor of Science in Computer Engineering from McGill University, Master of Computer Engineering at California State University, Los Angeles, and an MBA from the University of Southern California with emphasis in entrepreneurial studies.

@CloudExpo Stories
As Marc Andreessen says software is eating the world. Everything is rapidly moving toward being software-defined – from our phones and cars through our washing machines to the datacenter. However, there are larger challenges when implementing software defined on a larger scale - when building software defined infrastructure. In his session at 16th Cloud Expo, Boyan Ivanov, CEO of StorPool, provided some practical insights on what, how and why when implementing "software-defined" in the datacent...
Between the compelling mockups and specs produced by your analysts and designers, and the resulting application built by your developers, there is a gulf where projects fail, costs spiral out of control, and applications fall short of requirements. In his session at @DevOpsSummit, Charles Kendrick, CTO and Chief Architect at Isomorphic Software, presented a new approach where business and development users collaborate – each using tools appropriate to their goals and expertise – to build mocku...
Learn how you can use the CoSN SEND II Decision Tree for Education Technology to make sure that your K–12 technology initiatives create a more engaging learning experience that empowers students, teachers, and administrators alike.
Mobile, social, Big Data, and cloud have fundamentally changed the way we live. “Anytime, anywhere” access to data and information is no longer a luxury; it’s a requirement, in both our personal and professional lives. For IT organizations, this means pressure has never been greater to deliver meaningful services to the business and customers.
"We've just seen a huge influx of new partners coming into our ecosystem, and partners building unique offerings on top of our API set," explained Seth Bostock, Chief Executive Officer at IndependenceIT, in this SYS-CON.tv interview at 16th Cloud Expo, held June 9-11, 2015, at the Javits Center in New York City.
SYS-CON Events announced today that HPM Networks will exhibit at the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. For 20 years, HPM Networks has been integrating technology solutions that solve complex business challenges. HPM Networks has designed solutions for both SMB and enterprise customers throughout the San Francisco Bay Area.
Container technology is sending shock waves through the world of cloud computing. Heralded as the 'next big thing,' containers provide software owners a consistent way to package their software and dependencies while infrastructure operators benefit from a standard way to deploy and run them. Containers present new challenges for tracking usage due to their dynamic nature. They can also be deployed to bare metal, virtual machines and various cloud platforms. How do software owners track the usag...
As organizations shift towards IT-as-a-service models, the need for managing and protecting data residing across physical, virtual, and now cloud environments grows with it. CommVault can ensure protection and E-Discovery of your data – whether in a private cloud, a Service Provider delivered public cloud, or a hybrid cloud environment – across the heterogeneous enterprise. In his session at 17th Cloud Expo, Randy De Meno, Chief Technologist - Windows Products and Microsoft Partnerships at Com...
SYS-CON Events announced today that VividCortex, the monitoring solution for the modern data system, will exhibit at the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. The database is the heart of most applications, but it’s also the part that’s hardest to scale, monitor, and optimize even as it’s growing 50% year over year. VividCortex is the first unified suite of database monitoring tools specifically desi...
The Software Defined Data Center (SDDC), which enables organizations to seamlessly run in a hybrid cloud model (public + private cloud), is here to stay. IDC estimates that the software-defined networking market will be valued at $3.7 billion by 2016. Security is a key component and benefit of the SDDC, and offers an opportunity to build security 'from the ground up' and weave it into the environment from day one. In his session at 16th Cloud Expo, Reuven Harrison, CTO and Co-Founder of Tufin,...
In their session at 17th Cloud Expo, Hal Schwartz, CEO of Secure Infrastructure & Services (SIAS), and Chuck Paolillo, CTO of Secure Infrastructure & Services (SIAS), provide a study of cloud adoption trends and the power and flexibility of IBM Power and Pureflex cloud solutions. In his role as CEO of Secure Infrastructure & Services (SIAS), Hal Schwartz provides leadership and direction for the company.
SYS-CON Events announced today that MobiDev, a software development company, will exhibit at the 17th International Cloud Expo®, which will take place November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. MobiDev is a software development company with representative offices in Atlanta (US), Sheffield (UK) and Würzburg (Germany); and development centers in Ukraine. Since 2009 it has grown from a small group of passionate engineers and business managers to a full-scale mobi...
There are many considerations when moving applications from on-premise to cloud. It is critical to understand the benefits and also challenges of this migration. A successful migration will result in lower Total Cost of Ownership, yet offer the same or higher level of robustness. In his session at 15th Cloud Expo, Michael Meiner, an Engineering Director at Oracle, Corporation, analyzed a range of cloud offerings (IaaS, PaaS, SaaS) and discussed the benefits/challenges of migrating to each offe...
Digital Transformation is the ultimate goal of cloud computing and related initiatives. The phrase is certainly not a precise one, and as subject to hand-waving and distortion as any high-falutin' terminology in the world of information technology. Yet it is an excellent choice of words to describe what enterprise IT—and by extension, organizations in general—should be working to achieve. Digital Transformation means: handling all the data types being found and created in the organizat...
Chuck Piluso presented a study of cloud adoption trends and the power and flexibility of IBM Power and Pureflex cloud solutions. Prior to Secure Infrastructure and Services, Mr. Piluso founded North American Telecommunication Corporation, a facilities-based Competitive Local Exchange Carrier licensed by the Public Service Commission in 10 states, serving as the company's chairman and president from 1997 to 2000. Between 1990 and 1997, Mr. Piluso served as chairman & founder of International Te...
With SaaS use rampant across organizations, how can IT departments track company data and maintain security? More and more departments are commissioning their own solutions and bypassing IT. A cloud environment is amorphous and powerful, allowing you to set up solutions for all of your user needs: document sharing and collaboration, mobile access, e-mail, even industry-specific applications. In his session at 16th Cloud Expo, Shawn Mills, President and a founder of Green House Data, discussed h...
One of the hottest areas in cloud right now is DRaaS and related offerings. In his session at 16th Cloud Expo, Dale Levesque, Disaster Recovery Product Manager with Windstream's Cloud and Data Center Marketing team, will discuss the benefits of the cloud model, which far outweigh the traditional approach, and how enterprises need to ensure that their needs are properly being met.
The Internet of Everything (IoE) brings together people, process, data and things to make networked connections more relevant and valuable than ever before – transforming information into knowledge and knowledge into wisdom. IoE creates new capabilities, richer experiences, and unprecedented opportunities to improve business and government operations, decision making and mission support capabilities.
Explosive growth in connected devices. Enormous amounts of data for collection and analysis. Critical use of data for split-second decision making and actionable information. All three are factors in making the Internet of Things a reality. Yet, any one factor would have an IT organization pondering its infrastructure strategy. How should your organization enhance its IT framework to enable an Internet of Things implementation? In his session at @ThingsExpo, James Kirkland, Red Hat's Chief Arch...
Malicious agents are moving faster than the speed of business. Even more worrisome, most companies are relying on legacy approaches to security that are no longer capable of meeting current threats. In the modern cloud, threat diversity is rapidly expanding, necessitating more sophisticated security protocols than those used in the past or in desktop environments. Yet companies are falling for cloud security myths that were truths at one time but have evolved out of existence.