cloud-security

5 data security techniques that help boost consumer confidence

These days, it seems like hardly any time passes between headlines about the most recent data breach. Consider the revelation in late September that a security intrusion exposed the accounts of more than 50 million Facebook users. For that matter, not much time goes by without a new survey or study that confirms the difficulty of […]

Continue reading

Clarifying cloud personalization: 4 common misconceptions

You wouldn’t purchase a car without some forethought, and you shouldn’t rush into any cloud environment without careful consideration. Your organization undoubtedly has widely varying IT needs, so relying on a one-size-fits-all cloud computing solution would be similar to driving off the lot with a sports car when you really need an SUV. Cloud personalization […]

Continue reading

7 considerations for choosing the right hybrid cloud provider

Hybrid cloud computing is an attractive option for businesses that want to combine the advantages of public and private clouds. An organization’s hybrid cloud provider will be an important partner as it integrates on-premises systems with cloud-based ones. Before awarding this important contract, there are seven important aspects to consider. 1. Get to know your workloads. Before […]

Continue reading

5 cloud predictions for 2019

2018 was a landmark year for cloud with a flurry of mergers and acquisitions, perhaps none more so than the IBM bid to acquire Red Hat, the Kubernetes supporter through Red Hat OpenShift and open source powerhouse behind Red Hat Enterprise Linux. This and other new alliances are certain to accelerate technological advances that set […]

Continue reading

Apps, messaging and APIs – the three pillars of integration

Cloud computing used to be the answer for complexity, but in a multi-cloud world, it now presents another set of questions. In the first post of this series, I talked about this very issue: tackling digital transformation in a multi-cloud world. Integration complexity isn’t an easy fix, but let’s talk about some of the biggest […]

Continue reading

What, exactly, is the cloud?

Just what is cloud computing, and why should anyone care? As PC Mag defines it, cloud computing is the access of online material from a proverbial “cloud” of information rather than data retrieval from hard drives or other physical memory, such as flash drives or discs. Nevertheless, the cloud is merely a concept. It’s important […]

Continue reading

IBM InterConnect Day 2: Succeeding in the new era of hybrid IT

The opening day of IBM InterConnect may have heralded the new era of hybrid IT, fueled by the Internet of Things, cloud, mobile, and big data.On day 2, InterConnect audiences learned how to thrive and tackle the business challenges of the digital transformation.

Continue reading

4 obstacles keeping traditional IT from moving to cloud

Are you a part of an enterprise company? If you are, you have probably already moved to cloud and are using it. Or perhaps you’re considering the move, but you need to overcome  obstacles preventing your cloud migration. If you are not thinking to move into cloud, you may be in deep trouble. If you have […]

Continue reading

Cloud security 101: Protecting your data

CEOs at large and small organizations around the world are discussing cloud computing. While there’s no doubt that the cloud can provide key benefits, many companies and individuals are still concerned about data security in light of recent reported breaches of privacy. So what should you be on the lookout for when entrusting a service […]

Continue reading

Deployment patterns for security services in a Software Defined Environment (SDE)

As the prominence of software defined environments grows in tandem with new vulnerabilities in the virtual environment and the new technologies to secure the virtual assets, picking up an adequate deploy pattern for your security services will become critical to increase your return on investment (ROI).

Continue reading

New technologies to protect the cloud

Virtualization not only brings new threats to your infrastructure but also brings new ways to protect it.

Continue reading

BYOD: The landscape and security risks a CIO should consider

Nowadays society can’t go more than five minutes without using their mobile devices to check email, Facebook, or their favorite application. As a result, increasing numbers of employees are bringing their own smartphones and tablets to work, and for internal IT, this provides many challenges.

Continue reading