Cloud Computing and Device Security: The “Always Able” Era
Blog Published: 04/29/2011
By Mark Bregman, CTO of SymantecDevice Proliferation: Mobility and Security in the CloudChief Information Security Officers know instinctively that the world under their purview is undergoing a shift every bit as significant as the rise of the World Wide Web more than 15 years ago. The demand ...
Who Moved My Cloud
Blog Published: 05/04/2011
by Allen Allison, Chief Security Officer at NaviSite (www.navisite.com)Managed cloud services are quickly being adopted by large enterprises. Organizations are increasingly embracing cloud technologies for core services like financial systems, IT infrastructure, online merchant sites, and mess...
OAuth - authentication & authorization for mobile applications
Blog Published: 05/06/2011
By Paul MadsenFederation is a model of identity management that distributes the various individual components of an identity operation amongst different actors. The presumption being that the jobs can be distributed according to which actors are best suited or positioned to take them on. For i...
Security Standards – Why they are so Critical for the Cloud
Blog Published: 05/13/2011
By Matthew GardinerEveryone loves standards, right? When is the last time you heard a vendor proudly say that their product or service was closed and proprietary? However, it also seems that every time a new IT architecture sweeps through the market, this time one based on cloud models, the ...
How Public Cloud Providers Can Improve Their Trustworthiness
Blog Published: 06/16/2011
By Matthew GardinerWhen you meet someone you have never met for the first time, in a place you have never been to, do you trust him? Would you have him hold your wallet for you or would you share some sensitive personal information with him? Of course not. Obviously this person is not truste...
Watch Out for the Top 6 Cloud Gotchas!
Blog Published: 07/11/2011
By Margaret Dawson, VP of Product Management, HubspanI am a huge proponent of cloud-based solutions, but I also have a bailiwick for people who look to the cloud just for cloud’s sake, and do not take time to do the due diligence. While the cloud can bring strong technical, economic and busin...
Understanding Best-in-Class Cloud Security Measures and How to Evaluate Providers
Blog Published: 07/11/2011
By Fahim SiddiquiDespite a broader interest in cloud computing, many organizations have been reluctant to embrace the technology due to security concerns. While today’s businesses can benefit from cloud computing’s on-demand capacity and economies of scale, the model does require they relinqui...
PKI Still Matters, Especially in the Cloud
Blog Published: 07/15/2011
By: Merritt MaximDirector of IAM Product MarketingCA Technologies Inc.Infosec veterans probably remember (with a smirk) how Public Key Infrastructure (PKI) was heralded as the next “big thing” in information security at the dawn of the 21st century. While PKI failed to reach the broad adopti...
Pass the Buck: Who 's Responsible for Security in the Cloud?
Blog Published: 07/27/2011
Cloud computing changes the equation of responsibility and accountability for information security and poses some new challenges for enterprise IT. At Vormetric we are working with service providers and enterprises to help them secure and control sensitive data in the cloud with encryption, wh...
Cloud Signaling – The Data Center’s Best Defense
Blog Published: 07/27/2011
By Rakesh Shah, Director, Product Marketing & Strategy at Arbor NetworksRecent high-profile security incidents heightened awareness of how Distributed Denial of Service (DDoS) attacks can compromise the availability of critical Web sites, applications and services. Any downtime can result...
Cloud Hosting and Security Demystified
Blog Published: 08/16/2011
I am always amazed when I read the daily cloud blogs, articles and news headlines. Any given day will bring conflicting points of view by cloud industry experts and pundits on how secure clouds are, both private and public. There never seems to be a real consensus on how far security in the c...
Five Ways to Achieve Cloud Compliance
Blog Published: 08/26/2011
With the rapid adoption of cloud computing technologies, IT organizations have found a way to deliver applications and services more quickly and efficiently to their customers, incorporating the nearly ubiquitous utility-like platforms of managed cloud services companies. The use of these clo...
Seven Steps to Securing File Transfer’s Journey to the Cloud
Blog Published: 09/12/2011
By Oded Valin, Product Line Manager, Cyber-Ark Software“When it absolutely, positively has to be there overnight.” There’s a lot we can identify with when it comes to reciting FedEx’s famous slogan, especially as it relates to modern file transfer processes. When you think about sharing healt...
CSA Blog: The “Don’t Trust Model”
Blog Published: 09/14/2011
By Ed KingThe elephant in the room when it comes to barriers to the growth and adoption of Cloud computing by enterprises is the lack of trust held for Cloud service providers. Enterprise IT has legitimate concerns over the security, integrity, and reliability of Cloud based services. The r...
Securing Your File Transfer in the Cloud
Blog Published: 09/30/2011
By Stuart Lisk, Sr. Product Manager, Hubspan Inc. File transfer has been around since the beginning of time. Ok, well maybe that is an exaggeration, but the point is, file transfer was one of the earliest uses of “network” computing dating back to the early 1970’s when IBM introduced the flopp...
When It Comes To Cloud Security, Don’t Forget SSL
Blog Published: 09/30/2011
By Michael Lin, SymantecCloud computing appears here to stay, bringing with it new challenges and security risks on one hand, while on the other hand boasting efficiencies, cost savings and competitive advantage. With the new security risks of cloud and the mounting skill and cunning of today’...
Test Accounts: Another Compliance Risk
Blog Published: 10/07/2011
By: Merritt MaximiA major benefit associated with deploying identity management and/or identity governance into an organization is that these solutions provide the ability to detect and remove orphan accounts. Orphan accounts refer to active accounts belonging to a user who is no longer invol...
Cloud Security: Confident, Fearful, or Surprised
Blog Published: 11/04/2011
By Ken BieryThis two-part guest blog series explores the topic of cloud security. Part one of the series focuses on the questions enterprise IT decision makers should ask when considering moving business applications to a cloud-based computing environment.There is no shortage of information a...
Leveraging Managed Cloud Services to Meet Cloud Compliance Challenges
Blog Published: 11/04/2011
By Allen AllisonRegardless of your industry, customer base, or product, it is highly likely that you face regulatory compliance requirements. If you handle Protected Health Information (PHI), the Health Insurance Portability and Accountability Act (HIPAA) – along with the HITECH enhancements ...
Cloud Security Considerations
Blog Published: 11/14/2011
Can a cloud be as secure as a traditional network? In a word, yes! I agree that some may find this statement surprising. Depending on the network, that may be a low bar, but good security principles and approaches are just as applicable to cloud environments as they are to traditional netwo...