Search This Blog

Thursday, November 15, 2012

Gartner: Cloud outages are bigger risk than breaches

  11 sorriest tech companies of 2012 | Nine security controls to look for in cloud contracts
 
  Network World Cloud Computing

Forward this to a Friend >>>


Gartner's state of cloud security: Outages are bigger risk than breaches
Security remains a chief inhibitor to enterprise adoption of cloud computing resources and one Gartner analyst says the biggest concern should not be that data could be compromised in the cloud, but rather that there may be a cloud outage that could lead to data loss. Read More


WHITE PAPER: Symantec

Enabling Productivity without Sacrificing Protection
It's not a question of whether you want your employees conducting business through mobile devices, but whether you want visibility and control over mobile activity they are already engaged in activity that can have significant consequences for your business. Read Now!

RESOURCE COMPLIMENTS OF: Ipswitch

Wired & Wireless Networks? WhatsUp Gold can help!
As an IT manager, you're busy taking care of the availability, performance & security of your company's IT infrastructure. But things like BYOD, rogue devices, AP over-subscription & bandwidth policy abuse can make that complex. WhatsUp Gold provides ONE dashboard to visualize, isolate & resolve wireless problems before they impact your organization. Stop being the last to know about your wireless issues- Try WhatsUp Gold free for 30 days!

11 sorriest tech companies of 2012
Vendors apologize in 2012 for everything from Apple Maps to Cisco Connect Cloud to outage after outage and breach after breach. Read More

Nine security controls to look for in cloud contracts
To help ease the concerns of cloud security, which Gartner says is still a chief inhibitor to enterprise public cloud adoption, buyers are looking to contracts and service-level agreements to mitigate their risks. Read More

Phishing attack targets CloudFlare customers
Customers of the popular CloudFlare website acceleration and security service were targeted in an email attack that directed them to a fake version of the website. Read More


WHITE PAPER: Airwatch

Enabling Bring Your Own Device (BYOD) in the Enterprise
While AirWatch strives to provide some level of direction for customers in terms of initially implementing a BYOD program, it is up to each organization's legal, human resources, and management teams to create a device management program that is right for your organization. Read Now!

Gartner's IaaS Magic Quadrant: a who's who of cloud market
The cloud market can be a big, daunting place. Seemingly every tech vendor has a cloud strategy, with new products and services dubbed "cloud" coming out every week. But who are the real market leaders? Research firm Gartner's answer lies in its Magic Quadrant report for the infrastructure as a service (IaaS) market. Read More

Five Dropbox-savvy apps for iOS
By all accounts, Dropbox rocks. It ranks up there with sliced bread and chocolate fountains, offering simple cloud storage that syncs across your various devices. Read More

3 tips for making highly available systems in Amazon's cloud
Amazon Web Services makes a big deal out of its availability zones, recommending that customers use multiple AZs to build clouds that are tolerant of failures like the one the company recently experienced. Read More


WHITE PAPER: RIM

The CIO's Guide to Building an MDM Strategy
The incredible success of mobile communications is plain to see. Anywhere you go people are on mobile devices. This trend has helped drive the evolution of the enterprise computing platform from fixed PCs to mobile devices. Read Now!

AT&T offers Microsoft Office 365
AT&T has announced the availability of Microsoft Office 365 from AT&T, offering a cloud-based solution designed for small business owners. According to the 2012 AT&T Small Business Tech Poll, "half of small businesses expect to have all their employees using wireless technology to work remotely by the end of this year," so this offer is meant to support the SMB that recognizes the value of cloud-based applications inclusive of remote access via smartphones and tablets. Read More

Startup debuts with cloud-based open-source identity and access management software
Startup ForgeRock makes its official debut today with cloud-based open-source identity and access management (IAM) software called Open Identity Stack intended to be used by enterprises and service providers to enable centralized provisioning and access management to enterprise, mobile and software-as-a-service applications. Read More

Report: Cloud botnets, search poisoning and mobile attacks among 2013's biggest security issues
Researchers from the Georgia Tech Information Security Center today released their official 2013 cyberthreats forecast, detailing what they say will be the most serious computer security issues in the coming year. Read More

 
 
 

SLIDESHOWS

How to set up secure Wi-Fi for BYOD
QuickConnect and XpressConnect offer cloud-based methods to automate BYOD client configuration and connection.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. App abuses Twitter IDs to produce bogus piracy 'confessions'
  2. Review: 6 slick open source routers
  3. Why is Steven Sinofsky really leaving Microsoft?
  4. NSA: Looking for a few good cybersecurity professionals
  5. OpenFlow startup takes aim at Cisco, VMware
  6. VMware, the bell tolls for thee, and Microsoft is ringing it
  7. iPhone to Android: How to make the switch
  8. 2013 IT salaries: 15 titles getting the biggest pay raises
  9. Mobile apps for me, me, me
  10. Extreme joins Cisco, Brocade, Huawei at 100G
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_cloud_computing_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: