The first blog of this series discussing the role of data security in the cloud can be found here.
In 2014 and onward, security professionals can expect to see entire corporate perimeters extended to the cloud, making it essential to choose a service provider that can deliver the security that your business needs.
While organizations can let business needs trade down security we’ve begun to see how a recent slew of data breaches are encouraging greater vigilance around security concerns. For example, a recent CloudTweaks article highlights the need for organizations to be confident in their choice of cloud providers and their control over data. IT leaders have the power to control where sensitive information is stored. They also have the power to choose how, where and by whom information can be accessed.
An important driver in mitigating risk and increasing security is to ask the right questions.
Institute Control By Asking the Right Questions
However, adding to fears about ceding the control of data to the cloud is lack of transparency and accountability about how cloud hosting partner/ providers secure data and ensure a secure and compliant infrastructure. Cloud consuming organizations often don’t ask enough questions about what is contained in their service-level agreements, and about the process for updating security software and patching both network and API vulnerabilities.
Organizations need reassurance that a cloud provider has a robust set of policies, process and than is using automated as well as the latest technologies to detect, thwart and mitigate attacks, while in progress as well as be prepared to mitigate after an attack.
Change is good. After a successful run of four years in Boston, Red Hat Summit moves to San Francisco this year from April 14-17. Red Hat Summit has become one of the premier open source events for the enterprise IT industry with tracks for both developers and business executives.
Cisco is again a Platinum Sponsor and our presence at the event continues to grow. We have a keynote, six breakout speaking sessions and five demos. We’ll have product and solution experts available to share our latest developments with Cisco UCS, OpenStack, virtual networking, and Big Data. Read More »
If you recall from my earlier posts here and here, RISE is the new protocol in the Nexus 7000 and 7000 Series switch that allows integration of a remote service appliance like NAM or an application delivery controller with the same functional capability as if it was attached to the switch backplane like an embedded services blade. Devices can actually be connected over any layer 2 network, and not necessarily directly connected to the Nexus switch ports, although that is the usual configuration. RISE-enabled ports are configured on the Nexus 7000 and up to 4 dedicated ports per appliance can be configured for maximum throughput to connected devices.
It’s a great benefit for appliance vendors to not have to develop specific network-embedded modules of their products to install inside the chassis, as well as saving valuable slots while providing the same degree of traffic visibility and optimization for the appliance. In this video, I had a chance to sit down with Praveen Chandra, Director of NAM Engineering at Cisco, to talk about the first Cisco service appliance to support RISE and what it means for Prime NAM customers:
One of the great challenges of SDN – that many in my view underplay – is the change in paradigm from having a vendor deliver your network (hardware + software), to having (potentially) an ecosystem deliver your network – and this ecosystem may require you to develop software to perform network tasks or to integrate various SDN components together. This was recognized quite astutely by consultant Jim Metzler, which I discussed in one of my earlier blogs. “Applications can dynamically request services from the network” is what the SDN evangelists will tell you. Jim astutely asked “How exactly do they do that?”. Well ….. the true answer is that either (i) you need to buy [new] apps that do this off the shelf, as it were, or [more likely today] (ii) you need to modify your apps or develop new apps to do this.
Coding -- the New Networking?
So are you ready for procuring apps and/or developing software in your network design team now? Don’t worry if you say “no”. Let me first tell you a few customer reactions to this topic, and then let me update you on Cisco Services can help you develop new SDN apps that solve your specific network challenges.
Everybody has been talking about big data over the past years . Your data continues to grow, both in mass and importance. And you know that your company is in need of better analytics to use the influx of data as a point of improvement for business. As the Internet expands and connects all things previously unconnected (a concept referred to as the Internet of Everything, or IoE), consumers have access to more personalized information that keeps them engaged and delivers efficient services. This means data is pouring in from—well, everywhere. To sort and utilize it for better user experiences, it’s first necessary to ensure your data center is capable of gathering and housing all this data. And that starts at the foundation.
Our distinguished engineer and Chief Architect of Big Data Solutions at Cisco, Raghunath Nambiar, talks about “A Unified Platform for Big Data” in our last edition of Unleashing IT . Recently elected by the Transaction Processing Performance Council (TPC) to lead the development of the industry’s first big data benchmark standard, Nambiar states “To get the most out of big data, companies need an infrastructure that is tuned for big data workloads, with better performance and scalability than traditional environments.” Read more here .
In fact, the Intel® Xeon® processor-based Cisco® Unified Computing System™ (Cisco UCS®) Common Platform Architecture (CPA) for Big Data is a robust platform built on a unified fabric, and based on Cisco Nexus® switches for exceptional availability and scalability. Built specifically with Big Data in mind, this certified and validated architecture has been utilized by businesses in a variety of industries.