Most enterprise cloud app usage falls under shadow IT, but could this be a positive for the CIO?

(c)iStock.com/MilosJokic

86% of cloud apps used by enterprises fall under the category of shadow IT, while nearly three quarters aren’t ‘Safe Harbour’ approved, according to an industry report from CipherCloud.

The research findings, coming amidst worries of more sophisticated mobile malware and vulnerabilities, suggest organisations need to do more to assess what’s going on in their internal IT. One major US enterprise polled estimated it had 10 to 15 file sharing applications in use; the real number was almost 70.

More than half (52%) of publishing apps were considered high risk, while 42% of social apps and 40% of career-based apps were also considered risky.

Enterprises in both North America and Europe are leveraging cloud applications extensively. An average global enterprises uses more than 1000 apps, and though North American businesses (1245) predictably use more than European firms (981), the gap is closing. Not surprisingly, social was the most popular class of cloud app, followed by collaboration, marketing, IT infrastructure and media.

Yet the majority of this usage is through unapproved applications.

One major US enterprise polled estimated it had 10 to 15 file sharing applications in use; the real number was almost 70.

“Our findings suggest that organisations vastly underestimate the level of shadow IT when it comes to cloud adoption”, the report notes. “As a result, hundreds of high-risk cloud applications are in common use across North American and European enterprises.”

The report adds: “To achieve governance, it is imperative that organisations build the necessary legal and technological infrastructure to address cloud risks.”

But is shadow IT such a bugbear? The vast majority of articles and thought pieces paints it as a complete no-no; however, recent opinion assesses it in the context of ‘if you can’t beat them, join them’. Rather than stamp out shadow IT completely – which is practically impossible as employees will find a way to get around the system – it should be taken as constructive criticism.

As EMM provider MobileIron writes on sister site Enterprise AppsTech: “CIOs should see shadow IT as an opportunity. It’s an opportunity in the sense that it highlights, often very clearly, where something isn’t working for people.

“Instead of trying to wage war against people who are trying to do their jobs as best they can – something that will appear as punitive and unjustified to those people – a more forward thinking and long term approach is to engage them, understand their needs, and work to resolve the issue in a way that works for them and for IT.”

Then again, this point of view might not be the easiest to run by the CIO if corporate data is leaked through an employee’s personal Dropbox account.

You can find the full CipherCloud report here (registration required).

AWS hits five year high in cloud infrastructure market share

(c)iStock.com/ewg3D

Amazon Web Services’ (AWS) market share in cloud infrastructure services has hit a five year high despite competition from Microsoft, according to latest figures from Synergy Research.

The research, which examines infrastructure as a service (IaaS), platform as a service (PaaS), private and hybrid cloud, sees AWS’ overall share at 28%, compared to Microsoft’s 10%, IBM at 7%, Google at 5%, Salesforce 4%, and Rackspace 3%. Year on year growth saw Microsoft (96%) and Google (88%) the biggest climbers, with Amazon (51%) and IBM (48%) holding steady.

Synergy estimates quarterly cloud infrastructure service revenues are now approaching the $5 billion (£3.32bn) mark. Total revenues for 2014 grew by almost half from the previous year.

“The momentum that has been built up at AWS and Microsoft is particularly impressive,” commented John Dinsdale, chief analyst at Synergy. “They have an ever-broadening portfolio of services and they are also benefitting from a slowdown in the super-aggressive price competition that was a feature of the first half of 2014.”

AWS and Microsoft’s uptime figures were recently put under scrutiny by CloudEndure. Microsoft Azure saw 28 full service interruptions in Q2 last year, compared to 16 in Q3 and none in Q4. The vast majority of the 259 service errors in the first quarter of 2014 were advisory. In comparison, AWS in 2014 saw 46 service errors in EC2, 24 in scalable DNS provider Route 53, and 20 in network monitoring service CloudWatch.

In December last year AWS dramatically cut its rates for several types of data transfers, as well as changing how it priced reserved EC2 instances.

Comparative figures from Synergy in previous quarters have shown Microsoft strive to claim second position in the cloud infrastructure market, with AWS way out in front. “Many actual or perceived barriers to cloud adoption have now been removed, and the worldwide market is on a strong growth trajectory,” Dinsdale added.

Mobile Device Security: A New Frontier for Hackers | @CloudExpo [#Cloud]

Recent security breaches have heightened our awareness of cybersecurity issues. The hack and other security breaches have resulted in unprecedented damages. However, the majority of mobile device users have yet to be sensitized to their personal and corporate security risks.
For example, a security study found that 69 percent of users store sensitive personal information on their mobile devices. Examples include banking information, confidential work-related items and provocative videos and photos. In addition, 51 percent of mobile device consumers share usernames and passwords with family, friends and colleagues. This in spite of the fact that 80 percent of such devices are unprotected by security software.
While mobile device security attacks are relatively small, they are the new frontier for hackers. Listed below are highlights from several mobile device surveys:

read more

Manage Your ‘Internet of Things’ Mesh By @SOASoftwareInc | @ThingsExpo [#IoT]

The Internet of Things is a misnomer. That implies that everything is on the Internet, and that simply should not be – especially for things that are blurring the line between medical devices that stimulate like a pacemaker and quantified self-sensors like a pedometer or pulse tracker. The mesh of things that we manage must be segmented into zones of trust for sensing data, transmitting data, receiving command and control administrative changes, and peer-to-peer mesh messaging.
In his session at @ThingsExpo, Ryan Bagnulo, Solution Architect / Software Engineer at SOA Software, focused on design patterns for segmentation, policy enforcement and administration.

read more

Process Metrics on the Windows Agent By @TrevParsons | @DevOpsSummit [#DevOps]

Log data provides the most granular view into what is happening across your systems, applications, and end users. Logs can show you where the issues are in real-time, and provide a historical trending view over time. Logs give you the whole picture.
As we continue to expand Logentries’ powerful search and metric capabilities, we are also looking for new ways to allow our Users to send us critical data. In the newest version of the Windows Agent users can now follow process metrics and send them to Logentries. This feature enables even more insight into your application by allowing you to monitor your processes resource allocation in Logentries. Additionally, with Logentries powerful real-time alerting capabilities you will be instantly alerted when your process stops logging.

read more

Deploy Production-Ready Clouds with @Appcore CEO | @CloudExpo [#Cloud]

«Appcore has been around since January 2008. We exclusively built clouds for service providers. We’ve been working with CloudStack since about that same time and our software sits on top of CloudStack,» stated Jeff Tegethoff, CEO of Appcore, in this SYS-CON.tv interview at 15th Cloud Expo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.

read more