Skip to main content

Posts

Showing posts with the label IT security

Cloud Adoption Trend is Driven by Strategic Imperatives

As this year comes to a close, let's take one last look at the most pervasive cloud computing trends -- including increased usage across the different cloud service models, the key business drivers and the impact of agile innovation strategies. Cloud computing adoption has matured, with 69 percent of survey respondents stating that at least a portion of their computing infrastructure is in the cloud. However, 56 percent of companies are still identifying IT operations that could potentially move to the cloud , according to the latest market study by IDG Enterprise. Survey respondents believe that business technology is a game changer, and cloud solutions are providing advantages from increasing IT agility (63 percent), IT innovation (61 percent) and improving the ability to access critical business data and digital service applications (58 percent). Removing the Barriers to Cloud Adoption That said, IT leaders perspective on barriers to bringing these advantages to fruition...

Cloud and Mobile Security Management Gain Momentum

As more business applications move to the cloud, security seems to be top-of-mind for all concerned parties. Also, the Bring Your Own Device (BYOD) to work trend, along with more smartphones and tablets that require wireless connectivity in the workplace, has increased the level of concern for many IT managers and executives. Keeping business systems safe and protecting the data that they hold has never been more difficult to achieve, according to the latest market study by Ovum. The typical corporate ICT environment continues to be threatened by security attacks -- ranging from opportunistic hackers using pre-built tools through to targeted, well-resourced, state-sponsored cyber activity. Ovum believes that online attack volumes will continue to rise and no business should consider itself immune -- since any type of organization can be targeted by hackers. Even the best-protected government, military and business systems have already been breached, and in 2014 they will to be put...

How Smart Devices in the Workplace Fuel Productivity

We already know that savvy executives and managers everywhere are the early-adopters of a variety of mobile devices. They use these devices to connect to an online world of infinite possibilities. Behind every great device is a great network. The same essential network that's the platform for the emerging Internet of Everything ( IoE ). Exponential growth in the use of these smart devices has led to significant and increased demand for network bandwidth across 84 percent of organizations surveyed globally, according to the findings from a new market study commissioned by BT and Cisco. More than half (56 percent) of IT managers have also noticed a resulting performance decline in some applications, which impacts negatively the productivity gains promised by these smart devices. Almost half (46 percent) of workers with Wi-Fi access in their office have experienced delays logging on or accessing an application, while 39 percent have noticed they are running more slowly now than...

New Cyber Threats within The Internet of Everything

Cisco released findings from two global studies that provide a vivid picture of the rising security challenges that businesses, IT departments and individuals face -- particularly as employees become more mobile, blending work and personal lifestyles throughout their waking hours. Despite popular assumptions that security risks increase as a person's online activity becomes shadier, findings from the Cisco 2013 Annual Security Report (ASR) reveal that the highest concentration of online security threats tend to target legitimate destinations visited by mass audiences -- such as major search engines, retail sites and social media outlets. Cisco found that online shopping sites are 21 times as likely, and search engines are 27 times as likely, to deliver malicious content than a counterfeit software site. Security risks rise in businesses because many employees adopt "my way" work lifestyles in which their devices, work and online behavior mix with their personal liv...

How Healthcare IT will Migrate to Cloud Services

According to the findings from a global market study, the healthcare sector has a highly complex IT environment that's supporting a very diversified professional user population (i.e., clinicians) -- along with their patients in life-critical situations. The industry is currently facing growing economic and regulatory pressures that make its IT infrastructure primed for change. Therefore, all organizations will likely consider the potential benefits of migrating to cloud computing. Improvement in the quality of healthcare services is a key driver for managed cloud service adoption. Billions of dollars of federal incentives are provided for the delivery of quality healthcare services, and expanding the use of electronic health record (EHRs) systems -- as well as providing the basis for the exchange of information and data across and between the providers. These EHR systems are expected to be used extensively by 2014. Another significant opportunity is the consumer-oriented c...

Public and Private Clouds for the Enterprise

Telecommunication service providers will likely consume their own cloud services. After all, every organization can gain something from the proven benefits of infrastructure and application out-tasking. However, their primary role will be to implement and deliver the services that their end-customers will seek from public, virtual private, and hybrid clouds. Service providers have the opportunity to extend their current offerings, which may already include hosting, communications, media, and software application services. Moreover, cloud offerings enable service providers to extend their reach beyond their traditional areas of operation. That said, service providers must be prepared to address customer concerns ranging from policy compliance, to end-to-end security, to quality of service management, and to technical customization. They must be able to deliver a flexible range of functionality , service levels, and payment models. Enterprise Cloud Use-Case Scenario Many enterpris...

Managed Security Services Gaining Adoption

Enterprise leaders say that it's becoming difficult to find the highly qualified IT and network security talent they need that's affordable, and so they look to service providers for a solution. According to the latest market study by Forrester Research , demand has been growing. That said, Forrester believes that using a managed security services provider (MSSP) is more than just a lower-cost alternative to doing the same work in-house. MSSPs are not just managing devices, they also provide insightful analysis that can help with business decisions. CIOs and other business technology leaders used to resist out-tasking their IT and network security requirements. The talent scarcity issue has helped to change that mindset. Now, one in four out-task their email filtering, and another 12 percent are very interested in doing so in the next 12 months. Another 13 percent already out-task their vulnerability management and an additional 19 percent say they are very interested in doing ...

In-the-Cloud Approach to Cyber Security

Security breaches or other unexpected interruptions can happen anytime to anyone -- whether you are a large enterprise or a small business. Fully maintaining communication network security is a demanding responsibility -- and typically not the best use of your limited IT resources, that would be better applied to delivering incremental new business technology benefits to your organization. Fortunately, there are alternatives to a do-it-yourself comprehensive security solution. Skilled managed service providers continue to enhance their network security offerings. AT&T announced the availability of Security Event and Threat Analysis and Security Device Management, two new managed security services available for businesses of all sizes. Customized to Your Unique Business Needs The services enable you to engage AT&T security professionals selectively and simply to provide customized security support. Services range from security event analysis and threat management analysis to ...

Next-Generation Managed Security Services

Reports of network attacks and stolen data are commonplace. Consumers routinely undergo the stress of fraudulent charges or compromised credit cards. Computer hacker terms like "botnet" are becoming a part of our everyday vocabulary. As a result, enterprise security and risk professionals find themselves on a never-ending quest to maintain the integrity of their communication networks, according to the latest study by Forrester Research. Fortunately, managed service providers offer solutions to help relieve the burden. In its latest initiative to help businesses protect their vital assets from cyber threats and other online attacks, Verizon Business is now offering its next-generation managed security services (MSS) platform, complete with new options. This enhanced platform is designed to safeguard corporate networks by proactively identifying vulnerabilities and prioritizing threats across the extended enterprise -- resulting in better visibility, enhanced security and re...

Eight Options for Managed Security Services

In the online network connected business environment, security is more critical -- and also more complex. Today, network security requires constant monitoring and management. All businesses now experience vulnerability on an infrastructure that often extends to many locations. Managed service providers can create a comprehensive security offering that enables you to maintain the level of protection and control you require. They can manage some or all of your network security functions -- giving you access to their dedicated manpower, 24-hour safeguarding, as well as routine maintenance and management of disaster recovery. Finding the right security solution for your organization begins with establishing your priorities and becoming informed about alternatives. The following describes typical managed security service offerings, and how you can apply them. Managed Firewall Firewalls protect internal and external networks by restricting the types of network protocols and traffic allowed ...

Four Must-Have Managed Services: In Any Economy

I spent Thursday afternoon moderating a Webcast about the managed services industry. The discussion drove home the fact that small businesses will continue to embrace certain managed services regardless of the economy around them. My guests included: Gary Pica, general manager of mindSHIFT Technologies , one of North America’s top managed service providers William MacLeod, CIO, Accu-Sort Systems , a mid-size business that focuses on automatic data capture solutions Jim Alves, executive VP, product marketing, Kaseya Full disclosure: Kaseya sponsored the event but the Webcast did not involve any product pitches. Rather, we were exploring how small and mid-size businesses will depend on managed service providers regardless of the economy. MacLeod conceded that his company is "rethinking everything" -- nearly all IT projects and expenses -- during the current economic turmoil. But here's the interesting part: MacLeod mentioned several managed services that his company will co...