Security and Control in the Cloud

Cloud computing is so alluring. The public cloud economizes infrastructure resources and creates a scalable, on-demand source for compute capacity. Additionally, the cloud can be a strategic asset for enterprises that know how to migrate, integrate and govern deployments securely.
Apple co-founder, Steve Wozniak recently said, “A lot of people feel ‘Oh, everything is really on my computer,’ but I say the more we transfer everything onto the web, onto the cloud, the less we’re going to have control over it.”
In fact, over 70% of IT professionals worry about security according to an IDG Enterprise Cloud Computing Study.
Boiled down, security, access and connectivity are really issues of control.
As any prudent cloud user, the application has its own unique security features, such as disk encryption and port filtering. But do these layers of security features overlap or conflict? What happens to ownership after migration? Do solutions really have to be architected before and after deployment?

read more

AWS Trusted Advisor Automates Security, Fault Tolerance, Cost Optimization Advice

Amazon’s Trusted Adviser tool, part of their paid premium support offerings, takes an automated look at a customer’s AWS environment with 10 checks covering security, fault tolerance, and cost optimization. Green, yellow, and red indicators help focus in on areas of concern (yellow) or of a critical nature (red).

This screencast tutorial gives a quick walkthrough and puts it in the context of related premium support features, like support staff interaction.


Cloud Expo Silicon Valley: Building an Open Hybrid Cloud with Red Hat

Cloud computing is one of the most strategic initiatives that enterprises will adopt over the next several years. Only an open hybrid cloud can help you unlock the full benefits of cloud economics and gain agility across your entire infrastructure – physical, virtual and public cloud resources included.
In his session at the 11th International Cloud Expo, David Kang, Cloud Practice Manager, Global Strategy and Solutions, at Red Hat, will explain how open standards, open APIs and open source software are changing the structure of an enterprise cloud.

read more

Cloud’s Inevitability Looms As Cloud Expo Nears

I apparently like hitting myself on the head with a hammer, as I’m once again reviewing estimates of global cloud-computing spending and growth.

It’s difficult enough to get insightful estimates of IT spending in general – the most valid number seems to be about $3.6 trillion (coming from IDC), but which includes telco. Where do we draw the line with telco today, with smartphones and tablets and literally zettabytes of information flying around each year?

Anyway, rather than parrot or compare cloud estimates, which are all out there in a tube somewhere on the Internet, I’ll focus on the key aspect of cloud: it’s growing faster than IT overall.

This may seem to an insight from The Book of Duh, but it relates to cloud’s inevitability. Sooner or later, cloud computing will mean the same thing as computing. It may take 50 years or it may take 100. It won’t take 5 or 10. But it is inevitable because the promise of cloud computing is an evergreen: efficiency and elasticity.

The numbers I’ve seen show cloud rising as percentage of overall IT from 2% today to 11% by 2020, to 6% today growing to 22% by 2020. Again, given the mixing of computers and telco into many IT estimates, I don’t see how we can measure this accurately.

But we can simply accept that it’s growing, and it will have specific benefits for everyone.

Counter-arguments are being made today that cloud is not actually less expensive on a cashflow basis, even if it shifts expenses from investment to operations. Counter-counter-arguments are being made that nobody has promised cloud would always be cheaper.

But there is some place in every large organization for cloud, and my own direct experience has been that cloud is the go-to idea for smaller companies that are trying something new. One project I’m on doesn’t have budget for big iron or even much little iron. It does have budget for whatever cloud instances we’ll need for the next year.

So I’ve found the pain stops when I put the hammer back in the toolbox. I’ll be at Cloud Expo West in Santa Clara in a few weeks to see what’s going on, to ignore any information about growth, focus on any information about usability, and enjoy the inevitability of what’s going on.

read more

Security Automation Connects Silos

A wealth of security information exists in our networks from a variety of sources – policy servers, firewalls, switches, networking infrastructure, defensive components, and more. Unfortunately, most of that information is locked away in separate silos due to differences in products and technologies, as well as by companies’ organizational boundaries. Further complicating the issue, information is stored in different formats and communicated over different protocols.
An open standard from the Trusted Computing Group (TCG) offers the capability to centralize communication and coordination of information to enable security automation. The Interface for Metadata Access Points – IF-MAP for short – is like Facebook for network and security technology, allowing real-time sharing of information across a heterogeneous environment.

read more

Cbeyond Offers Businesses More Secure, Customized Access to the Cloud

Cbeyond Inc. on Monday announced the launch of its new TotalCloud(TM) Data Center managed service. With TotalCloud Data Center, small and medium-sized businesses can now access secure, enterprise-class, customizable cloud services without having to purchase, configure, install and manage servers.
Cbeyond’s TotalCloud Data Center service is built on Microsoft Corp.’s Windows Server 2012 Hyper-V platform. It combines enterprise-class networking, storage and security to handle demanding, real-time business application workloads. Available in both public and private formats based on security needs, the service includes managed and monitored security features, backup services and round-the-clock infrastructure monitoring and support.

read more

Day 3 Keynote at Cloud Expo Silicon Valley | Cloud Apps: Assembly Required

Today we present ten imperatives for constructing next generation applications that we have defined based on research findings from a community of 1,500 application building companies. Emerging applications will not just be cloud-enabled, but also mobile, connected to social media networks and able to consume and respond in real-time to patterns in Big Data. Most important, application building must become more productive with a reduced time-to-market. To meet these demands, there is an imperative to move from a model of “build everything” to a model of “application assembly” from available customizable parts.
In his Day 3 Keynote at the 11th International Cloud Expo, Dr. John Bates, Executive Vice President and Chief Technology Officer at Progress Software, will illustrate what has to go into a platform and model to deliver the 10 imperatives of next-generation applications. As part of this, he will present how existing applications and services can be wrapped and exposed as cloud APIs. These APIs can be assembled like Lego blocks to rapidly create new mobile, social and big data aware cloud applications. Examples of cloud APIs that he will discuss include: smart data connectors that integrate with and analyze the data of existing cloud applications such as Salesforce.com, Workday, NetSuite, etc.; services that track social media sentiment on Twitter, Facebook etc.; back-end services for mobile applications; services that analyze massive clusters of Hadoop nodes; and services that track and respond to mobile user locations to enable location-aware applications.

read more

McAfee Launches New Data Center Security Suites

Image representing McAfee as depicted in Crunc...

McAfee today announced four new Data Center Security Suites to help secure servers and databases in the data center. The suites offer a unique combination of whitelisting, blacklisting and virtualization technologies for protecting servers and virtual desktops. These solutions provide optimal security for servers and databases in physical, virtualized and cloud-based data centers, with minimal impact on server resources which is a key demand for data centers.

“Performance and security are key concerns for servers in the physical, virtualized or cloud-based data centers,” said Jon Oltsik, Senior Principal Analyst, Information Security and Networking at Enterprise Security Group. “The new server security suites from McAfee, based on its application whitelisting, virtualization and blacklisting and AV technologies, provide an enhanced security posture while maintaining the high server performance needs of the data center.”

The suites offer customers the ability to protect their physical and virtual servers and virtual desktops with a unique combination of technologies in a single solution.

  • McAfee Data Center Security Suite for Server provides a
    complete set of blacklisting, whitelisting, and optimized
    virtualization support capabilities for basic security on servers of
    all types
  • McAfee Data Center Security Suite for Server–Hypervisor Edition
    provides a complete set of blacklisting, whitelisting, and optimized
    virtualization support capabilities for basic security on servers of
    all types and is licensed per Hypervisor
  • McAfee Data Center Security Suite for Virtual Desktop
    Infrastructure
    provides comprehensive security for virtual desktop
    deployments without compromising performance or the user experience
  • McAfee Database Server Protection provides data base activity
    monitoring and vulnerability assessment in a single suite, for all
    major database servers in the data center

“McAfee is leading the industry with these new solutions for protecting servers in the data center,” said Candace Worley, senior vice president and general manager of endpoint security at McAfee. “The combination of whitelisting, blacklisting and virtualization in a single solution, offers an optimal security posture for protecting servers in the data centers. These solutions address the need in the industry to offer solutions that provide the highest level of protection with minimal impact on the resources they are deployed on and in a wide range of customized licensing options.”

 


Cloud Computing: Amazon Reportedly Interested in TI’s ARM Unit

Amazon is negotiating to acquire Texas Instruments’ abandoned ARM business, according to Calcalist, the Israeli business daily written in Hebrew. It says the companies are in advanced talks.
According to the story Amazon wants to be a merchant chip house competing with Qualcomm, Samsung, and Apple, not just for its cheap sold-at-cost Kindle tablets, which will be facing competition soon from Apple’s fabled iPad mini.
Amazon is also understood to be working on its own smartphone.
Calcalist figures it for a multibillion-dollar deal.
Amazon sourced its ARM OMAP chips from TI, which is giving up its tablet and smartphone chip line in a bow to superior competitive forces. It means to focus on industrial and automotive chips instead.
Barnes & Noble also uses TI processors in its Nook e-readers.

read more

The cloud news categorized.