How to balance cloud security with agility in the healthcare vertical

Back in July, a study released from the Ponemon Institute cited cloud-based storage and mobile applications as the typical sources for cloud security concerns within many healthcare organizations.  However, it was not understood if this worry was around just the concept of cloud computing and mobile computing, or if these organizations are dealing with true issues.  I suspect it was the former.

“The study, ‘The Risk of Regulated Data on Mobile Devices in the Cloud,’ which surveyed 781 IT and data security practitioners, found that 33 percent of respondents said that they need to access protected health information (PHI) to do their work and yet few understood how to keep data secure. For example, 15 percent of those surveyed knew about HIPAA’s security requirements, but 33 percent of respondents indicated that they work for a HIPAA covered entity.”   Figure 1 is a depiction of the outcome of this study …

Requirements for Next-Generation Privileged Identity Management

The importance of privileged identity management as a means of managing risk has long been understood. After all, it’s reported 43% of security breaches involve trusted insiders, according to research group Forrester. And the most recent Verizon Data Breach report revealed some 13% of breaches result from privilege misuse or abuse, and 76% involved weak or stolen credentials (of all types).
However, the widespread adoption of cloud computing has significantly increased the consequences of these risks. As was pointed out recently by Gartner Research Director Nick Nikols, “Administrators of private cloud and IaaS environments gain more concentrated power–and the risk that goes with it–than administrators for more traditional data center deployments.” The reason for this is the highly dynamic and scaleable nature of the cloud. Administrators can do much more, much faster than in traditional environments–and attacks scale up just as quickly.

read more

Cloud Expo: Strategic Transformation to Next-Generation Big Data Platform

In his session at the 13th International Cloud Expo®, Tony Shan will present a methodical approach to effectively transforming a complex heterogeneous IT environment to a Big Data-enabled technology ecosystem. First he introduce a pragmatic methodology that provides a step-by-step process to systematically develop and migrate existing applications and databases to a new paradigm: Discover, Evaluate, Analyze, and Recommend (DEAR). Then he drill down to individual components in this method, such as current state diagnosis, future state formulation, gap analysis, roadmap generation, and incremental implementation.
Afterwards, a real-world business scenario in an industry vertical will be presented, where he will apply this comprehensive method to execute a holistic transformation. We dive deep into the key barriers, limitations, and issues in specific use cases, which help derive the core technical requirements for the new platform in this case study. Multiple options in the technology components are short-listed and assessed via qualitative and quantitative evaluations. Prototypes are further developed to conduct trial runs on the final candidates with specific test cases and justification criteria. Best practices and lessons learned about Big Data, advanced analytics and public cloud services will also be discussed.

read more

Verizon Challenges Amazon with Verizon Cloud

Verizon is calling on the expertise of one of its recent acquisitions to offer a cloud computing service to its customers.
Verizon has announced details about a new cloud computing service for business, Verizon Cloud, an IaaS offering the company claims will offer better end-user control over performance than any other cloud solution.
Currently in limited beta, Verizon Cloud features an IaaS elastic computing system, Verizon Cloud Compute, and an object storage system, Verizon Cloud Storage. But where Verizon Cloud differs, according to Verizon, is that it delivers the performance you specify, not just the performance you end up with, according to an article on InfoWorld.com.

read more

Cloud Expo Silicon Valley: The Agnostic Cloud

In their session at the 13th International Cloud Expo®, Luke Malpass, Software Architect & Co-founder of Fasetto, and Coy Christmas, CTO & Co-Founder of Fasetto, will discuss their PDQ Offline application, which is an application that allows sharing of files, pictures, videos and any other information instantly between any device, without internet, Wi-Fi or cell data, at no cost. Next they will discuss a new concept – “Cloud Life” – and how they are going about it – bringing all aspects of your life together in a single, accessible-anywhere platform, where all your information on the cloud can access one another, opening up opportunities never thought of before.

read more

Moving Email to the Cloud Part 2

By Chris Chesley, Solutions Architect

My last blog post was part 1 of moving your Email to the Cloud with Office 365.  Here’s the next installment in the series in which I will be covering the 3 methods of authenticating your users for Office 365.  This is a very important consideration and will have a large impact on your end users and their day to day activities.

The first method of authenticating your users into Office 365 is to do so directly.  This has no ties to your Active Directory.  The benefits here are that your users get mail, messages and SharePoint access regardless of your site’s online status.  The downside is that your users may have a different password than they use to get into their desktop/laptops and this can get very messy if you have a large number of users.

The second way of authenticating your users is full Active Directory integration.  I will refer to this as the “Single Sign On” method.  In this method, your Active Directory is the authoritative source of authentication for your users.  Users log into their desktop/laptop and can access all of the Office 365 applications without typing their password again, which is convenient. You DO need a few servers running locally to make this happen.  You need an Active Directory Federation Server (ADFS) and an Azure Active Directory Sync Sever. Both of these services are needed to sync your AD and user information to Office 365. The con of this method is that you need a redundant AD setup because if it’s down your users are not going to be able to access mail or anything else in the cloud.  You can do this by hosting a Domain Controller, and the other 2 systems I mentioned, in a cloud or at one of your other locations, if you have one.

The third option is what I will refer to as “Single Password.”  In this setup, you install an Azure Active Directory Sync server in your environment but do not need an ADFS server.  The Sync tool will hash your user’s passwords and send them to Office 365.  When a user tries to access any of the Office 365 services, they are asked to type in their password.  The password is then hashed and compared to the stored hash and they are let in if they match.  This does require the users to type their password again, but it allows them to use their existing Active Directory password and anytime this password changes, it is synced to the cloud.

The choice of which method you use has a big impact on your users as well as how you manage them.  Knowing these choices and choosing one that meets your business goals will set you on the path of successfully moving your services to the cloud.

 

Download this free ebook on the evolution of the corporate IT department

 

Why Salesforce is winning the cloud platform war

The future of any enterprise software vendor is being decided today in their developer community.

Alex William’s insightful thoughts on Salesforce Is A Platform Company. Period. underscores how rapidly Salesforce is maturing as a cloud platform.  And the best measure of that progress can be seen in their developer community.

(To be clear, Salesforce and the other companies mentioned in this post are not clients and never have been.  I track this area out of personal interest.)

The last four years I’ve made a point at every Salesforce Dreamforce event to spend the majority of my time in the developer area.  Watching mini hacks going on in the DevZone, mini workshops, the Salesforce Platform and Developer keynotes over the last few years has been a great learning experience.  An added plus: developers are often skeptical and want to see new enhancements help streamline their code, extend its functionality …

Mobility and Real-Time Capability Projection

This weekend I was clever. That is newsworthy because it doesn’t happen very often. Our son is stationed at a military base that did not receive TV coverage of the Boise State football game on Saturday night. It must have been the government shut-down. I can’t think of any other reason they wouldn’t have shown it. The solution was a three hour Google+ Hangout whereby mom and dad got to talk to our officer son while the laptop camera «inadvertently» captured and streamed the Broncos game showing on our big screen TV. It was a nice Hangout – they won! We tried Skype first, but the picture was blurry. Google+ Hangout, however, was picture perfect.
Our son is stationed a great distance away, however, using real-time communication and video we can communicate and share what is going on in our lives. This same kind of technology can be used in the context of «capability projection» for companies. Here is my definition of capability projection, «The ability of a business to apply all or some of its capabilities such as marketing, sales, distribution, etc., over great distances to respond to and take advantage of new market opportunities.»

read more

The Exponential Cloud Growth Visualization

Cloud management vendors recognize the need for transparency and are taking the necessary steps to enhance their solutions to better support active visibility. The natural evolution of a typical management system begins with gathering data and presenting it in report tables. While traditional IT tools have had a similar evolution, the infinite cloud resources and dynamic manner of the environment take the lack of controllability issue to the extreme. This, makes visualization more crucial than in a traditional, finite data center. This week, I met my good old `cloud friends` from Dome9 that released their new cloud security visualization solution, Cloud Clarity.

read more

Cloud Expo Silicon Valley: Platform as a Service & the Software Revolution

The software industry is in the midst of a revolution, driven by incredible advances in Big Data, analytics, mobile devices, developer tools, and infrastructure. Platform as a Service is at the center of this revolution, providing a comprehensive foundation that spans all clouds, private, hybrid or public, and gives developers a unified perspective that is consistent whether deploying apps to a laptop or across data centers.
In his session at the 13th International Cloud Expo®, John Wetherill, Developer Evangelist at ActiveState, will dive into PaaS, showing how it enables rapid delivery of modern enterprise applications, with emphasis on how it simplifies Big Data access, instant elastic scaling, service provisioning, log aggregation, and remote monitoring, while dramatically increasing productivity and decreasing time-to-market. Platform as a Service is expected to be as influential on the software industry as Linux was two decades ago. After attending this session you’ll know why.

read more