Securing mixed cloud environments
- 12 June, 2012 13:37
Securing cloud computing environments is challenging enough, but is made all the more complicated when a mix of cloud options are employed, an approach that will become increasingly common.
What constitutes an effective security strategy when a company builds a private cloud to augment existing compute resources, embraces public shared cloud services for other needs, and signs up for software as a service (SaaS) and still other cloud offerings? Oh, and now fold in the idea that virtual machines, with all their attendant security, network and storage settings, might be migrating among some of these environments.
The complexities are significant, affecting everything from performance to compliance and even job roles. Chances are security in this mixed environment will look little or nothing like it did in more traditional IT environments.
Download this new digital Network World special report, "Securing the mixed cloud environment," prepared by Network World editors, which examines the issues, trends and strategies for coping with this complex challenge.
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Why change management doesn’t work
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
Leading Through Connections – Insights from the Global Chief Executive Officer Study
IBM’s 2012 Global CEO study follows face-to-face discussions with more than 1,700 CEOs and senior public sector leaders from around the globe. The findings examine how CEOs are responding to the complexity of increasingly interconnected organisations, markets, societies and governments. For example, almost one-quarter of CEOs say their organisations operate below par in terms of driving value from data. CEOs have expressed frustration about their inability to capitalise on available information. This is because: “The time available to capture, interpret and act on information is getting shorter and shorter.” CEO, Chemicals and Petroleum, United States Given the need for deeper business insight, the best performing organisations are more adept at converting complex data into insights, and insights into action. Download Entire Report Now.
Detecting APT Activity with Network Traffic Analysis
Today’s successful targeted attacks use a combination of social engineering, malware, and backdoor activities. This research paper will discuss how advanced detection techniques can be used to identify malware command-and control (C&C) communications related to these attacks, illustrating how even the most high-profile and successful attacks of the past few years could have been discovered.
The Foundation for Cloud Management
For businesses looking to provide real-time business solutions to employees and customers alike, you need to have a comprehensive network management strategy. The network is the foundation of all successful cloud services; it must be robust to meet traffic, efficiency, and performance demands. Download today the four steps to get your network operations cloud-ready.