Hybrid cloud offers antidote to complexity

IT consumers are increasingly requesting hybrid cloud solutions, mainly because of the flexibility and scalability they offer. A hybrid approach allows the customer to use their existing traditional IT environment while taking advantage of the latest technologies available. Along with the many benefits that a hybrid cloud offers, bringing together disparate technologies can create some […]

Continue reading

Is cloud computing secure?

Cloud is everywhere, and it is penetrating our lives and the industry more and more, even if it is not physically visible to us. This fact may contribute to one of the major concerns about cloud: IT security and privacy. News about breaches into server systems, leaks in social media networks, industrial espionage in well-established […]

Continue reading

Is cloud computing secure?

Cloud is everywhere, and it is penetrating our lives and the industry more and more, even if it is not physically visible to us. This fact may contribute to one of the major concerns about cloud: IT security and privacy. News about breaches into server systems, leaks in social media networks, industrial espionage in well-established […]

Continue reading

Risks & Issues: Effective management for cloud commercial customers

This blog entry is about managing risks and issues when providing cloud services to commercial customers. Managing service provider internal risks when using cloud technology is out of scope of this blog entry. Also any risk evaluation whether or not to migrate information assets or applications to cloud solutions is not regarded here.

Continue reading

Does my cloud have the flu? IT security check-up in the cloud

Security health checking is an important IT security process. The question is how can the security requirements of customers be implemented effectively in the cloud environment? How can human interaction with the cloud avoided completely or to a large extend?

Continue reading

Cloud physical security considerations

Physical security is basic in many areas, and it’s no different in the IT security area. The physical locations where IBM cloud offerings reside must be compliant to IBM physical security policies. Cloud offerings distributed and mirrored over many physical sites can offer a higher degree of IT security to some of our commercial customers, for example in the banking and finance sector, without the need for huge financial investments.

Continue reading

Security patch management in the cloud

This blog entry takes a step-by-step walkthrough approach to analyze process requirements against the cloud implementation. Identified potential gaps and issues are to be addressed in policy updates and in an effective risk management.

Continue reading

IT security processes overview and cloud

IT security concerns are one major hindrance why IBM’s commercial customers hesitate to embrace emerging cloud technologies. A good method to address those concerns is to evaluate each IBM global IT security process one by one and to compare the process execution in the traditional IT environment with the same in the cloud environment: If the processes are executed in a similar fashion or as documented deviations with correct acceptances of the related risks, there is no objection from the IT security process perspective to use cloud solutions.

Continue reading