Cisco Blogs


Cisco Blog > Security

Data Security Through the Cloud [summary]

Is the combination of cloud computing and mobility a perfect storm of security threats?

Actually, yes. And you should prepare for them as if there is a storm coming.

As businesses become increasingly mobile, so does sensitive data. In fact, in a recent survey conducted by ESG,

31% of security professionals say that the biggest risk associated with cloud infrastructure services is, “privacy concerns associated with sensitive and/or regulated data stored and/or processed by a cloud infrastructure provider.”

Data Security Through the Cloud

 

With cloud-based services, it is key to have visibility into applications and provide consistent experience across devices accessing the web and cloud applications. More users are leaving the standard PC behind and engaging cloud applications through a mobile device, making application-layer security and user access security critical. Smartphones and tablets are able to connect to applications running anywhere, including public, private and hybrid cloud applications, opening your data to potential attacks. Security professionals need assurances that their cloud security provider will appropriately secure customer data while ensuring availability and uptime.

 

The conversation is no longer if you’ll be attacked, but when. And will you be prepared?

Read the full article: Data Security Through the Cloud

Tags: , , , , , , , , , , , ,

Data Security Through the Cloud

Is the combination of cloud computing and mobility a perfect storm of security threats?

Actually, yes. And you should prepare for them as if there is a storm coming. As businesses become increasingly mobile, so does sensitive data. In fact, in a recent survey conducted by ESG,

31% of security professionals say that the biggest risk associated with cloud infrastructure services is, “privacy concerns associated with sensitive and/or regulated data stored and/or processed by a cloud infrastructure provider.”

Data Security Through the CloudDid you know:

16 billion web requests are inspected every day through Cisco Cloud Web Security

93 billion emails are inspected every day by Cisco’s hosted email solution

 200,000 IP addresses are evaluated daily

400,000 malware samples are evaluated daily

33 million endpoint files are evaluated every day by FireAMP

28 million network connects are evaluated every day by FireAMP

Read More »

Tags: , , , , , , , , , , , ,

CIO or IT Services Broker?

In the heart of the overall shift from cloud computing as an isolated project to a central IT strategy, a particular tenet is reigning supreme: hybrid IT strategies. As cloud computing continues to evolve, new technologies are emerging to support the dynamic creation of cloud services. CIOs are increasingly feeling the need to deal with hybrid environments.  But how? Enter the rise of hybrid IT process models and the positioning of IT as a service broker.

Gartner recently identified hybrid cloud and IT as a Service broker (ITaaSB) in its Top 10 Strategic Technology Trends; they also highlighted how to move to an ITaaSB environment in their research titled: Top 10 Technology Trends, 2013: Cloud Computing and Hybrid IT Drive Future IT Models.

 
ITServiceBroker

But what exactly is an IT services broker? And how can we help make this shift?

Read More »

Tags: , , , ,

Swan & Dolphin Resort Showcases Connected Mobile Experiences at Cisco Live!

As part of Cisco Live! last week, Cisco hosted a Connected Mobile Experiences Dinner last night with senior executives of some of our customers and partners in  Shula’s Steak house at the Walt Disney Swan and Dolphin Resort in Orlando. One of the key points of the night was the presentation by Chet Patel, Director of IT at the Swan and Dolphin.

Chet discussed how Cisco’s Connected Mobile Experiences (CMX) solution has been deployed at the resort and the insights and benefits they are starting to derive already. The resorts executive business management are starting to get heavily engaged with the project and understanding the value that CMX can contribute.

cmx dinner Read More »

Tags: , , , , , , , , , , , , , , , , , , , ,

Cloud for Local Government Global Blog Series, A Better Economy in the Cloud

My colleague Norm Jacknis (former CIO of Westchester County, New York) passed along a list of CIO concerns for 2013 that was prepared by Alan Shark of Public Technology Institute, a nonprofit that provides technology guidance to local government. The list for cities and counties included:

1. Big Data (Smart City)

2. Consolidation

3. GIS as centerpiece for strategic decision making

4. Mobility and broadband deployment

5. Cyber and network security

6. Cloud-based solutions

7. Legacy/modernization, RFP

8. Unified citizen engagement (311, social media)

9. Consumerization of technology (BYOD)

10. Shared services (across all jurisdictions)

What would you add or subtract?

I’d want to expand on a few of these items to include another emerging issue for CIOs and other government leaders: getting cities to embrace cloud and networking tools – while moving their urban economies forward.

Well, there’s good news to report on that overarching concern. There are several opportunities to learn more about how cities can embrace technology for economic growth:

Read More »

Tags: , , , , , , , , , , , , , , , ,