Patrick Wheeler in
Cloud, Cloud-based Security, Consumerization of IT, hybrid-cloud, Privacy, Compliance and Identity, private cloud, public cloud, SaaS, Securing the Cloud, Security, Threats, Virtualization
Jun 20th, 2011 |
For all its hype iCloud does not represent a fundamentally new problem. Employees are already bringing personal devices to work and wanting to use them in their jobs, and these unmanaged devices are mixing personal and corporate data on a system that is outside the control of the security and IT teams. There are already many apps and cloud-based services for sharing data between users and between devices (such as Dropbox), and these services are giving security pros fits. What is new is that iCloud will make these things happen automatically, and potentially without the intent or even awareness...
Rik Ferguson in
Cloud, Cloud-based Security, Cyber crime, Malware, Securing the Cloud, Security, Smart Protection Network, Threats, Threats from the Cloud
May 31st, 2011 |
With the launch announcements of various Google Chrome netbooks, the focus of the press and security companies alike is beginning to take a closer look at the security promises made and also at some of the more ’media friendly‘ statements such as, “…users don’t have to deal with viruses, malware and security updates”.
Let’s have a look at some of the security features of Chrome OS:
1 – Get out of my playpen. Each process runs in its own sandbox. Effectively this means that if an application is malicious or compromised, it is unable to interact with or otherwise affect...
Greg Boyle in
Cloud, Cloud-based Security, Cyber crime, Malware, public cloud, SaaS, Securing the Cloud, Security, Threats, Virtualization
May 23rd, 2011 |
I recently had an interesting chat with the operator of our snack vending machine while making a coffee in the kitchen. She was restocking our machine and had her iPad sitting on the table. In their 2 person company they now have 2 iPads and a PC. They do their inventory control and tracking while onsite at customer premises via the iPad. Then they sync it with their PC and, using an online storage solution they transfer it to the cloud; this then syncs with their online accounting package. Her reason was very, very simple: she wants to reduce the amount of time they spend on bookkeeping and back-office...
Justin Foster in
Secure Data Centers
Apr 9th, 2010 |
Recently I sat down with Steve Kwan, Trend Micro’s Senior Director of SaaS Operations, to discuss the challenges he faces as he moves Trend’s datacenter operations into the cloud. Steve has a great deal of experience with both traditional and virtualized datacenters. Most recently he helped guide product strategy for 3Leaf Systems, a developer of ASIC and software technologies for the dynamic datacenter, and prior to that he guided Citrix’s largest Web 2.0 customers as they established and expanded datacenters.
Below Steve discusses his top three challenges to cloud deployment and...
Privacy, Compliance and Identity, Secure Data Centers, Securing the Cloud
Apr 2nd, 2010 |
This interview is the second in my series of talking with our partners to discuss the challenges posed by physical, virtual and cloud environments. In early March Trend Micro entered into a partnership with Qualys to sell the QualysGuard IT Security and Compliance Suite along with Trend Micro Enterprise Security compliance offerings with the goal of providing a more comprehensive solution for customers worldwide. This partnership delivers on Trend’s vision of “security that fits” by addressing both security and compliance needs.
Recently I sat down with Philippe Courtot, Chairman and...
Justin Foster in
Secure Data Centers, Securing the Cloud
Oct 28th, 2009 |
Portability and interoperability in cloud computing may seem tangential to security, but avoiding vendor lock-in is about more than having access to competitive pricing or better service. When relying on a single provider there is inherent risk, especially in the availability of the service and data.
Throughout history the need for portability and interoperability has usually been dealt with through standardization. Standard railroad gauges enabled cross continental travel, just as TCP/IP unlocked worldwide communications. It’s not surprising then, that many people look at cloud computing...