The first blog of this series discussing the role of data security in the cloud can be found here.
In 2014 and onward, security professionals can expect to see entire corporate perimeters extended to the cloud, making it essential to choose a service provider that can deliver the security that your business needs.
While organizations can let business needs trade down security we’ve begun to see how a recent slew of data breaches are encouraging greater vigilance around security concerns. For example, a recent CloudTweaks article highlights the need for organizations to be confident in their choice of cloud providers and their control over data. IT leaders have the power to control where sensitive information is stored. They also have the power to choose how, where and by whom information can be accessed.
An important driver in mitigating risk and increasing security is to ask the right questions.
Institute Control By Asking the Right Questions
However, adding to fears about ceding the control of data to the cloud is lack of transparency and accountability about how cloud hosting partner/ providers secure data and ensure a secure and compliant infrastructure. Cloud consuming organizations often don’t ask enough questions about what is contained in their service-level agreements, and about the process for updating security software and patching both network and API vulnerabilities.
Organizations need reassurance that a cloud provider has a robust set of policies, process and than is using automated as well as the latest technologies to detect, thwart and mitigate attacks, while in progress as well as be prepared to mitigate after an attack.
Read More »
Tags: 2014 annual security report, CIO, Cisco Security, Cisco Security Grand Challenge, CiscoCloud, CiscoSecurityGrandChallenge, cloud, cloud security, cloudtweaks, data security, Gartner, InternetofEverything, IoT, ITaaS, Network World, SecChallenge, security, Service Provider
Check out our new “on-demand” webinar: Big Data Essentials: Don’t Let Your Sandbox Turn to Quicksand
What you will learn:
- How to manage data as an asset and transform data into business value.
- Why Big Data projects fail and how to avoid common pitfalls.
- How to optimize a Big Data supply chain.
- What infrastructure is required to run and automate data workload processing.
Big Data has become the next big thing, not only for the promise of finding the “needle on the haystack” of untapped revenues, but also for the possibility of uncovering and delivering exciting new business models.
For IT, Big Data can be both exciting and daunting: By delivering analysis from huge amounts of data more quickly than with existing Business Intelligence (BI) tools, data center managers can deliver new services to the business end users; daunting because researching, selecting, buying, staffing and managing Big Data tools sets pretty much demand a separate data center.
We invited our partner Informatica to share its knowledge on managing complex data supply chains have produced this webinar with insight from leading analyst firm Gartner, that will help you align how you think about your data and the infrastructure that it runs on.
By incorporating these the Big Data essentials into your planning you can prevent your sandbox from turning into quicksand and avoiding project delays and cost overruns.
This webinar consists of three parts:
Doug Laney, Research VP at Gartner for business analytics, begins with a lesson in Infonomics – managing data as an asset, and the skills required for Big Data analytics.
John Haddad, Senior Director Big Data Product Marketing at Informatica, explains how to turn these data assets into actionable information generating business value and developing a Big Data supply chain.
Ronnie Ray, Director Product Management for Cisco Cloud and Systems Management, completes the discussion by describing a Big Data infrastructure and operations platform that will exceed your business service levels.
Many of our customers already agree: Cisco is delivering Big Data infrastructure and data workload processing management with the Cisco Common Platform Architecture (CPA). CPA is based on Cisco Unified Computing (UCS), Unified Fabric, and Unified Management. The Cisco Big Data solution delivers:
Integrated Server Management
Cisco UCS unifies computing, networking, management, virtualization, and storage access into a single integrated architecture. It’s an ideal platform for Big Data applications.
Integrated Network Management
The same Cisco network architecture can serve both traditional applications and databases and Big Data processing solutions.
Integrated Data Processing Management
Cisco provides workload automation that manages the flow of data between a wide variety of applications into and out of your Big Data processing environments.
Read More »
Tags: automation, Big Data, Gartner, informatica, Tidal Enterprise Scheduler, workload automation
Takeaway: The Cisco Enterprise Mobility group has stayed ahead of the competition by staying innovative and cutting edge while delivering quality, high performing products and solutions, while displaying thought leadership on major technological trends such as 802.11ac and location-based services. We use this mobility blog as a platform to deliver information straight to wireless fans and readers. Here are the top 10 most read posts in 2013.
10. Monetize Your WLAN Using Cisco Location Analytics
9. Cisco Hacks: Notes from the CMX Hackathon
8. Looking Past the Mobile Phone
7. 802.11ac: Is Your Network Ready for Next-Gen Wi-Fi Traffic?
6. Cisco’s New Wall AP Helps Hoteliers Deliver In-Room Wi-Fi Access
5. Client Adoption for 802.11ac Wireless Technology Read More »
Tags: analytics, Cisco, Connected, Enterprise, Gartner, hackathon, ios7, IT, location, location based services, mobile, mobility, New Year, technology, wi-fi, wifi, wireless
So, it turns out the most tweeted topic from my recent presentation at the Gartner Symposium/ITxpo was about how much of their lives Parisian motorists spend searching for parking (let’s just say it’s more than a year!).
As I told the audience in Orlando, that stress-ridden search is one of countless challenges we can tackle and improve by connecting people, processes, data, and things to the Internet of Everything (IoE). (For more on connected parking, see Wim Elfrink’s blog.)
Interest in the Internet of Everything was high at #GartnerSym. In my meetings with several analysts, CIOs and IT leaders, it was clear today’s CxOs get the amazing possibilities the Internet of Everything can offer. In fact, more and more real-world examples are coming to light of networked connections not only driving business innovation but also changing lives.
Read More »
Tags: Cisco, connected healthcare, connections, Gartner, innovation, Internet of Everything, internet of things, IoE, IoT, value at stake
Are your finances secure with your financial institution? Vystar Credit Union in Florida, USA speaks out on one of their recent efforts to ensure highly secure access at their institution. With the pressures of compliance and the need to protect their institution’s network and assets, Vystar deploys ISE and AnyConnect with great success. Most recently coming from Gartner IT conference in FLA I had a chance to speak with other organizations that expressed secure access concerns. Read More »
Tags: anyconnect, byod, Financial Services, Gartner, ISE, secure access, security