Six Characteristics of Best-in-Class Object Storage

The adoption of cloud storage technology for a broad range of consumer and business applications is transforming the storage landscape by transitioning away from traditional disk arrays to object-based storage systems that have the scalability, availability, resiliency and accessibility to enable cloud-scale storage and instant access.
A recent IDC report predicts that the market for File- and Object-Based Storage (FOBS) will experience an annual growth rate of 24.5% through 2017, reaching $38 billion. “Increased versatility will result in more diverse use cases for FOBS,” said IDC.

read more

Solving BYOD Challenges with Windows Server 2012 R2

These days, users are growing more and more accustomed to expecting that they can accomplish productive work from anywhere, at any time, and on any device. As a result, IT professionals are increasingly faced with the challenge of balancing convenience with security, in an effort to provide users with the necessary remote access to corporate applications and data being demanded. In the «old days», organizations could easily restrict access to internal business data to only corporate-managed Active Directory Domain-Joined PCs, but this is fast becoming an outdated mode of operation.

read more

The End of Private Cloud – Five Stages of Loss and Grief

It’s not today, or tomorrow, but sometime in the not too distant future the bulk of the on-premise private cloud market is going to shrivel into a little raisin and die. A very small number of very large companies will operate private clouds that will be, by an large, poor substitutes for the services available in public clouds. However, they will be good enough for these companies for some percentage of their workloads.
I have seen dozens of private cloud efforts by many large customers. Most are pretty weak shells of a cloud, not coming close to the economics or capabilities of even 2nd or 3rd tier public clouds. Comparing them to AWS, Azure or Google is like comparing my art work to a Picasso or Rembrandt. The only similarity is that I can still call mine art even if it’s atrocious. I can still call your cloud a cloud too – even if it’s expensive, inelastic, and lacking anything but the most basic of features. Some will be reasonable, but in the long run it’s a game you cannot win.

read more

The End of Private Cloud – Five Stages of Loss and Grief

It’s not today, or tomorrow, but sometime in the not too distant future the bulk of the on-premise private cloud market is going to shrivel into a little raisin and die. A very small number of very large companies will operate private clouds that will be, by an large, poor substitutes for the services available in public clouds. However, they will be good enough for these companies for some percentage of their workloads.
I have seen dozens of private cloud efforts by many large customers. Most are pretty weak shells of a cloud, not coming close to the economics or capabilities of even 2nd or 3rd tier public clouds. Comparing them to AWS, Azure or Google is like comparing my art work to a Picasso or Rembrandt. The only similarity is that I can still call mine art even if it’s atrocious. I can still call your cloud a cloud too – even if it’s expensive, inelastic, and lacking anything but the most basic of features. Some will be reasonable, but in the long run it’s a game you cannot win.

read more

«Continuous» Does Not Equal Real Time

Security-as-a-service provides the necessary ingredient to transform continuous monitoring from compliance mandate to best practice: real time monitoring.
Every 4,000 miles or so I bring my car into have the oil changed, the brakes checked and tires rotated. Why? Because I know if I leave it to chance, at some point down the road something much more devastating will affect the car. Many of us follow this simple preventive best practice.
Then why is it major corporations and modest enterprises alike wait until their security is breached to address growing concerns of data theft, private information leakage or worse? Many of these companies spend hundreds of thousands of dollars in various security initiatives (especially those bound by a regulatory compliance agency), but still succumb to breaches that cost on average 3.8 million dollars (Ponemon Institute figure) per occurrence to address.

read more

«Continuous» Does Not Equal Real Time

Security-as-a-service provides the necessary ingredient to transform continuous monitoring from compliance mandate to best practice: real time monitoring.
Every 4,000 miles or so I bring my car into have the oil changed, the brakes checked and tires rotated. Why? Because I know if I leave it to chance, at some point down the road something much more devastating will affect the car. Many of us follow this simple preventive best practice.
Then why is it major corporations and modest enterprises alike wait until their security is breached to address growing concerns of data theft, private information leakage or worse? Many of these companies spend hundreds of thousands of dollars in various security initiatives (especially those bound by a regulatory compliance agency), but still succumb to breaches that cost on average 3.8 million dollars (Ponemon Institute figure) per occurrence to address.

read more

Safeguard Your Organization with Cisco Email Security Solutions Webinar

Please join us at one of our upcoming Email Security Webinars. Email Security is offered on Tuesday and Thursday. Please click on a title below to register.
What You Will Learn in this Webinar
Ensure world class protection: Block malware, blended threats and 99.999% of all SPAM entering your organization.
Automatically encrypt sensitive outbound emails: Auto-encrypt sensitive or confidential communications leaving your organization.
Improve compliance: Improve outbound email compliance and reporting with SOX, GLBA, HIPAA and State compliance policies.
Simplify email security administration: Eliminate false positive SPAM alerts from your day to day activities.

read more

Safeguard Your Organization with Cisco Email Security Solutions Webinar

Please join us at one of our upcoming Email Security Webinars. Email Security is offered on Tuesday and Thursday. Please click on a title below to register.
What You Will Learn in this Webinar
Ensure world class protection: Block malware, blended threats and 99.999% of all SPAM entering your organization.
Automatically encrypt sensitive outbound emails: Auto-encrypt sensitive or confidential communications leaving your organization.
Improve compliance: Improve outbound email compliance and reporting with SOX, GLBA, HIPAA and State compliance policies.
Simplify email security administration: Eliminate false positive SPAM alerts from your day to day activities.

read more

Integration and Interoperability

The silos within IT are breaking down, at least in terms of awareness of each other and the need to coordinate provisioning and orchestration of compute, network and application services. No longer is it acceptable to simply provide a solution; that solution must integrate, collaborate and interoperate with a plethora of existing and emerging data center technologies such as SDN, cloud management platforms, and virtualization frameworks.
After all, part of the raison d’être for SDN is the need to enable the network with the agility and flexibility of its counterparts- devops and application development – necessary to improve service velocity. That goal cannot be realized by enabling just the underlay networks addressed by SDN architectures. The application service layers (4-7) must also support the programmability, dynamism, and flexibility promised by SDN guiding architectural principles.

read more

Integration and Interoperability

The silos within IT are breaking down, at least in terms of awareness of each other and the need to coordinate provisioning and orchestration of compute, network and application services. No longer is it acceptable to simply provide a solution; that solution must integrate, collaborate and interoperate with a plethora of existing and emerging data center technologies such as SDN, cloud management platforms, and virtualization frameworks.
After all, part of the raison d’être for SDN is the need to enable the network with the agility and flexibility of its counterparts- devops and application development – necessary to improve service velocity. That goal cannot be realized by enabling just the underlay networks addressed by SDN architectures. The application service layers (4-7) must also support the programmability, dynamism, and flexibility promised by SDN guiding architectural principles.

read more