SunGard Availability Services released an article recently featuring Rahul Bakshi, vice president Product Management, Managed Services at SunGard AS. In the article, Rahul offers predictions on the future of the cloud, including the maturity and convergence of offerings.
Forrester’s James Staten recently wrote a very well written (and widely read) piece on Cloud Computing trends for 2011. While I agree with most of his bold points and predictions, one point gave me pause.
If your technology runs in a traditional data center and you move to a cloud where the same technology is used, security is quite similar. Essentially, you’ve been using virtual local area networks (VLANs) to separate your departments, and now your cloud provider use that same technology to separate your departments and to separate other tenants from you.
Is the cloud security risk overstated? If you work with a trusted partner and already have good security practices in place before you move to a cloud, I think the security risk in the cloud is slightly overstated. It is not cloud computing itself that is the risk.
… and water, and HVAC, and all related infrastructure components. Resilience is dependent on all these infrastructure components, along with network communications. This became obvious this weekend with two distinct events: – A friend shared a photo of a car that went through the side of a building while parking; in doing so, they broke […]
One of the most frequent questions I get when the topic of cloud computing comes up is around security. Justifiably, folks tend to have questions around security, privacy, and regulatory compliance in shared environments.
A shared environment (also called a multi-tenant environment) is much like an apartment building. You have multiple tenants (renters) sharing common infrastructure (the apartment [...]
Earlier this week, a colleague asked whether cybersecurity was really different from information security, and if so, how was it to be managed: within or separate from IT security? Cybersecurity has a focus on external electronic threats to your information or operation. No IT security program would be effective without considering such external threats, so […]
Rahul Bakshi talks about meeting customer needs and requirements with enterprise cloud services. Click here to view the video.