Skip to main content

Posts

Showing posts from March, 2014

Open Hybrid Cloud: Private vs Public Debate is Resolved

As an informed senior executive, you already know that it's no longer a question of whether cloud service adoption is the right forward-thinking business technology strategy, but rather how you will leverage the abundance of new resources to outpace your competition. More companies will be working within very heterogeneous cloud service environments, thereby putting more pressure on IT organizations that must deal with these additional complexities, according to a recent market study by Cloud Connect and the Everest Group . Their latest market study reveals the increasing influence of cloud services on IT budgets, staff skills and business strategy. Moreover, the findings within the "2014 Enterprise Cloud Adoption Survey" report debunks hyped-up perceptions with key facts. "The new reality our research points to is that the modern enterprise will not be defined by public, private or hybrid but rather all of the above," said Steve Wylie, cloud connect gener...

2014 Business Technology Security Threat Assessment

If you thought that cyber security threats were troubling in 2013, then you should brace yourself for the onslaught that's very likely in 2014. A new generation of security threats stemming from progressive business technology trends -- such as BYOD, mobility and cloud services adoption -- will expose organizations to a multitude of new risks. According to the findings of a global security survey sponsored by Dell, the majority of IT leaders around the world say they don’t view these threats as top security concerns and they're not prioritizing how to find and address them across the many points of origin. Apparently, what you don't know can be very harmful. When respondents were asked to look at long term priorities, only 37 percent ranked "unknown threats" as a top security concern in the next five years. Epidemic threats come from all perimeters, and are often hidden in poorly configured IT account settings or permissions, and ineffective data governance...