Skip to main content

Posts

Showing posts with the label security

2014 Business Technology Security Threat Assessment

If you thought that cyber security threats were troubling in 2013, then you should brace yourself for the onslaught that's very likely in 2014. A new generation of security threats stemming from progressive business technology trends -- such as BYOD, mobility and cloud services adoption -- will expose organizations to a multitude of new risks. According to the findings of a global security survey sponsored by Dell, the majority of IT leaders around the world say they don’t view these threats as top security concerns and they're not prioritizing how to find and address them across the many points of origin. Apparently, what you don't know can be very harmful. When respondents were asked to look at long term priorities, only 37 percent ranked "unknown threats" as a top security concern in the next five years. Epidemic threats come from all perimeters, and are often hidden in poorly configured IT account settings or permissions, and ineffective data governance...

Insight from 2013 Cisco Global IT Impact Survey Results

As businesses increase the number of new application rollouts and create new connected user experiences to better serve their customers, IT organizations face the challenge of expanding network services and aligning their network strategies to meet the requirements of the business. A global study announced today by Cisco revealed that while the majority (63 percent) of IT professionals are confident in their ability to respond to the needs of the business, almost a third (27 percent) still equated the visibility of their IT department into their company's business initiatives to "a foggy day in London." The 2013 Cisco Global IT Impact Survey provides insight into IT's role as a business enabler, assesses the extent by which network investments are keeping pace with the demands of the business, and looks into IT's likelihood to adopt new technologies that can increase IT business impact. The top research findings reveal: Applications and user expectations ...

Big Data: Visualizing the Strategic Business Imperative

The term Big Data is going to become a key part of the forward-looking business technology debate among informed, proactive and ICT savvy executives. But what's really driving the growing demand for meaningful solutions? While most companies are collecting, storing and analyzing data, they continue to struggle with both the business and IT challenges of Big Data -- more data is not necessarily better. Enormous amounts of data are being generated daily by smartphones, sensors, video cameras, smart meters, and other connected devices, adding to the huge store of information from traditional sources. This "data avalanche" represents a potential gold mine of insights, but a new study commissioned by Cisco reveals that IT professionals and businesses are challenged to extract strategic value from their data. The Cisco Connected World Technology Report ( CCWTR ) surveyed IT professionals across 18 countries to examine the IT readiness, challenges, technology gaps, ...

Managed Cloud Service Provider Deployment Plans

 As more multinational business executives and IT managers consider embracing managed cloud service offerings, many are wondering how the service provider landscape is evolving -- and where providers plan to differentiate their capabilities. Much of the initial market insight focused on the key emerging trends, but now we're starting to see more detailed analysis. A new market study by Infonetics Research details operator plans for managed cloud services -- including their strategies and approaches to offering services, how services will be delivered now and in the future, and top applications of each type of cloud service including: Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS). Their latest worldwide study resulted in the report entitled "Cloud Service Strategies: Global Service Provider Survey," where Infonetics analysts interviewed 20 incumbent telco, competitive, data center operators, and cable operators t...

Cloud Services Embraced by More Progressive Leaders

Once again, we return to the topic of managed cloud services lessons-learned, and the associated best practices that have been gleaned by the early-adopters. The need for agile organizations and adaptive business processes continues to fuel demand for alternatives to the legacy IT status-quo. According to the latest market assessment by IDC , cloud computing is being adopted more widely for a larger portfolio of business applications, as IT and business leaders discover what works well -- and what doesn't work so well. The active ingredients for cloud enablement are: just-in-time software stacks that are ready to provision, on-demand deployments, a self-service catalog of cloud services, the scalability to meet growing demand for computing resource and the flexibility to scale down resources -- when they're no longer needed by the user. Cloud computing uses still focus primarily on public cloud services, with the early adopters leveraging cloud computing for application ...

Business Online Collaboration Dichotomy

The goal of creating a collaborative enterprise might seem like an essential requirement that all forward-looking business leaders would actively support. However, fear of the unknown sometimes makes intelligent people react in ways that, in hindsight, appear totally illogical. A case in point, Cisco announced results of a global study that found that while 77 percent of IT decision makers surveyed plan to increase spending on internal collaboration tools, company employees believe that their ability to collaborate is constrained by their own employer policies. That said, more than a quarter of those who work at organizations that prohibit the use of social media applications admitted to changing the settings on their corporate devices to gain online access -- claiming they "need the tools to get the job done." This new insight was attained by investigating practices at medium to large enterprises -- those with more than 250 employees. The study, conducted by InsightExpress,...

Infrastructure as a Service, in Action

A West Chester, PA-based company was searching for IT help, to more effectively and securely distribute confidential and proprietary content to its customers. Enter Verizon Business, with its managed cloud service offering. Modevity, LLC will use Verizon Computing as a Service (CaaS), an on-demand, flexible solution that allows businesses to harness cloud computing to better manage IT resources and deliver performance and security that supports their growth. Better Alignment of Financial and Human Capital In addition to these benefits, Modevity expects to see a significant positive impact on the company's bottom line as a result of embracing this managed cloud service offering. "We are focused on continuing to grow Modevity in a smart way by making key resource decisions in terms of capital and staffing expenditures," said Tom J. Canova, co-founder and chief marketing officer for Modevity. "Moving to a virtual environment with Verizon Business allows us to consoli...

Verizon Cloud-Based Computing as a Service

Verizon Business introduced an on-demand, cloud-based Computing as a Service (CaaS) solution -- designed to meet the stringent security and performance requirements of their enterprise customers. This new offering helps businesses take advantage of cloud (IP-based) computing to more efficiently and securely manage IT computing resources -- server, network and storage -- to meet day-to-day business demands. This CaaS solution, which leverages Verizon's global IP infrastructure and data centers, enables companies to use a Web-based portal to employ computing resources in the quantities and duration dictated by their own business needs. As a result, businesses pay for the resources used and avoid having to build out for peak capacity requirements by buying new equipment and adding IT or networking staff. Designed for mid-to-large-sized businesses, CaaS is ideal for new development projects, major events and migrations so that organization can easily and quickly shift IT resources as ...

Managed Security with a Strategic Twist

Managed services provider Verizon Business has added an interesting twist to its security toolbox. Traditionally, managed security services are tactical: they monitor a network for potential attacks, using virus signatures and other definitions. Earlier this month, Verizon upgraded its customers' security capabilities with what it calls its " Risk-Correlation Service ," designed to add strategic insight to security. The RCS works with vulnerability scans -- either those it does for customers or those from vendors such as McAfee, Qualys, and others -- to determine where potential vulnerabilities exist. The service also documents your system to create a map of devices and the business processes that run on them. "It marries threat information with vulnerability information," says Jonathan Nguyen-Duy, Director of Product Management for Verizon. Calculating Risks The result is a Web-based scorecard that shows Verizon customers not only where potential problems exist...

Online Security in a Global Networked Economy

Because of the expanding growth and complexity of communication networking, and the risks presented by a new breed of skillful hackers, serious security threats are an unfortunate certainty within the highly interconnected office environment of today. These threats are very real and the results are costly to those businesses that have been affected. Apparently, the victims aren't entirely at random, which is often assumed to be the case. According to the 2007 CSI Computer Crime and Security Survey , almost one-fifth (18 percent) of those respondents who suffered one or more kinds of security incident further said they had suffered a "targeted attack" -- defined as a malware attack aimed exclusively at their organization or at organizations within a small subset of the general population. Beyond the Virus Threat Moreover, financial fraud overtook virus attacks as the source of the greatest financial losses. Virus losses, which had been the leading cause of loss for seven s...