Cloud Security

What better place to learn about social access and security than Las Vegas? Throngs of people sit down at a gaming table and never think twice about the layers of security in the building. That’s because the security is transparent – casinos are experts at applying security based on user behavior rather than building walls…

+ read more

Travis Greene
Dec 19, 2014
8:49 am
Reads:
825
Score:
5

Cloud computing means different things to different people but almost everyone agrees that a hybrid cloud environment is the most likely outcome for most enterprises. So what are the key challenges for securing the hybrid enterprise? Any attempt to define security in a cloud environment will fail unless it defines the meaning of cloud in…

+ read more

David Shephard
Jan 14, 2014
10:06 am
Reads:
1,457
Score:
Unrated

Microsoft Office 365 Enterprise’s mobile and collaboration capabilities may excite your C-suite executives, but how are you planning to make access as easy as your internal applications? If you don’t get it right you’ll impact your user’s single sign-on (SSO) experience, causing frustration and helpdesk calls. You can use DirSync to handle user replication, if…

+ read more

Kent Purdy
Nov 15, 2013
8:44 am
Reads:
1,475
Score:
Unrated

This is the last in a series of 5 blogs that address the results of a cloud security survey conducted on NetIQ’s behalf earlier this year. The purpose of the survey was to understand the perceptions of cloud security within enterprises worldwide. In this last installment, I take a look at how well IT managers…

+ read more

Renee Bradshaw
Sep 5, 2013
10:54 am
Reads:
1,291
Score:
Unrated

This is part 4 of a 5-part blog series discussing the results of a recent industry survey we conducted to understand the perceptions of cloud security within enterprises worldwide. Today, I’ll take a look at how confident IT managers are in their ability to demonstrate regulatory compliance of sensitive data in the cloud. Globally, most…

+ read more

Renee Bradshaw
Sep 4, 2013
9:12 am
Reads:
1,230
Score:
Unrated

Passwords are the bane of any security administrator’s life. While the theoretical ideal would be to permit access to systems using two-factor authentication, real-world implementation is rarely simple and often expensive. What’s more, without the right incentives and consumer buy-in, end users may find the additional procedures complex and inconvenient. So why do we care…

+ read more

David Shephard
Jul 22, 2013
9:01 am
Reads:
1,299
Score:
Unrated

Lets get straight in: 1. Secure, automated user provisioning In any organisation, new employees come and go, and they change jobs, locations and roles. Each time this happens it creates a new task for a member of IT, who then has to check that any old privileges are revoked, and obtain approval for privileges that…

+ read more

David Shephard
Jun 17, 2013
8:06 am
Reads:
12,700
Score:
Unrated

When cloud computing first emerged, fears started to grow among IT staff that it would affect their jobs as a result of the business outsourcing functions that currently lay within their remit. That worry undoubtedly still exists but the picture isn’t as simple as ‘cloud computing equals job losses’. Organisations are not going to throw…

+ read more

David Shephard
May 16, 2013
11:22 am
Reads:
26,338
Score:
Unrated

Whether it’s lifestyle or investing, taking the balanced approach often provides the best results. The same can said for cloud security. Cloud is popular because it offers flexibility of resources (including people), allows new ways to conduct business (especially collaboration) and a way to sidestep capital costs when it gets in the way of innovation….

+ read more

Kent Purdy
May 15, 2013
10:34 am
Reads:
8,018
Score:
Unrated