Despite the rising competition between telcos to offer cloud services, many telecom providers find themselves challenged to organically develop the expertise to manage complex enterprise class types of cloud deployments.
by: Nathan Bell, Director of Portfolio, Telstra Global 07-May-2013
With any evolving technology comes new threats to the security of an organization’s data, and specifically payment card data, which remains the most attractive target for criminals.
by: Jeremy King, European director, PCI Security Standards Council 22-Apr-2013
Most finance and insurance institutions will enter the cloud computing continuum by building private clouds and consuming external non-core services such as email, collaboration tools, and ERP/CRM.
by: Bruce Dahlgren, HP 22-Apr-2013
In the future, rather than over-provisioning the network, service providers will employ a software-defined network (SDN) that can be programmed to allocate bandwidth from a shared pool of resources where and when it is needed.
by: Karl Horne, Ciena Asia Pacific 22-Apr-2013
Authenticating users' identity before they are allowed to access the cloud is the most straightforward method to ensure better protection for data and applications. But even so, simple username-password authentication in this day and age will not be sufficient to keep intruders away.
by: Philippe Inserra, Asia Vice-President, Online Authentication, Security Business Unit, Gemalto 09-Apr-2013
Cloud computing, mobility and social media have been treated as separate silos serving different business needs. However, they are all interrelated and their true potential can be unlocked only when companies utilize them as a single entity.
by: Chip Salyards, BMC Software 02-Apr-2013
In the cloud computing industry, there is a select group of professionals who work behind the scenes. These unsung heroes are the cloud support services group.
by: Randy Hill, Brocade 26-Mar-2013
Outsourcing -- from traditional managed and hosted services to the cloud -- extends the complex relationships of privileged accounts, users, data, systems and services, which are so critical to assessing and reducing corporate risk, well beyond enterprise boundaries.
by: Dan Dinnar, Cyber-Ark Software 26-Feb-2013
The Chinese market is a land of opportunity for online retailers, but reaching those consumers also poses great challenge on the back-end of a website. For instance, latency alone can also pose a challenge for brands hosting their content in the cloud.
by: Mark Smith, Savvis 25-Feb-2013
Like any sophomore, we in cloud computing have begun to learn from our experience, and from our freshman missteps. And, like most sophomores, we are likely to make a few more mistakes throughout our journey.
by: George Watt, CA Technologies 18-Feb-2013