Posts tagged ‘cloud security’

The State of the Cloud: Already Everywhere, and Lots of Room to Grow #CloudWF

Guest Blog with Equinix

Enterprise cloud usage is nearly universal, but there’s still significant room for cloud growth.

That sums up one of the key findings of RightScale’s 2015 “State of the Cloud Report.” The survey of 930 technical professionals indicates the enterprise has moved past its initial cloud skittishness and is getting quite comfortable investigating what the cloud can really do.

Capture

The survey showed 93% of respondents have adopted cloud, roughly the same as the prior year. Hybrid cloud is also the preferred strategy of 58% of respondents, compared to 30% who are public cloud-only and 5% who are private cloud-only.

One key difference from 2014 is that 38% of cloud users are now classified by RightScale as “cloud explorers,” compared to 25% just a year ago when “cloud beginners” was the biggest category. “Cloud explorers” already have multiple projects and applications in the cloud and are looking to expand and improve their cloud use.

The survey also found plenty of room for cloud expansion, with 68% of enterprise respondents reporting that less than a fifth of their applications are currently running in the cloud. Most respondents (55%) also report that another fifth of their applications are already built on cloud-friendly architectures.

Here’s more of what we found most interesting in the State of the Cloud report:

Going public, staying private

Public cloud is being used by 88% of organizations, while 63% are using private cloud. But private cloud is still carrying a heavier workload, with 13% of enterprises running more than 1,000 virtual machines (VMs) in the public cloud and 22% running more than 1,000 virtual machines in private cloud. The survey also indicated enterprises are expecting to grow public cloud workloads more quickly.

Central IT gets more cloud comfortable

The survey authors note that in 2014, business units envisioned a more limited role for central IT in cloud purchasing decisions, likely because they felt central IT was generally too cautious. But central IT’s view of the cloud may be evolving. The survey indicated central IT concerns about cloud security have dropped, with 41% now reporting it as a significant challenge, compared to 47% a year ago. In addition, 28% of central IT respondents report public cloud as the top priority in 2015, compared to 18% in 2014.

More of the same

Respondents cited the same cloud benefits and challenges in 2015, but in many cases mentioned them more frequently. For instance, “greater stability,” “faster access to infrastructure,” and “high availability” were again the top three benefits, but each was cited by a greater percentage of respondents:

Capture2

A similar pattern was seen when respondents were asked about cloud challenges. “Security,” “lack of resources/expertise” and “compliance” again appeared as major concerns, but were referred to by a greater percentage of respondents, compared to last year:

Capture3

Learn more about how Equinix can help your enterprise realize cloud benefits and meet cloud challenges.

…………………………………………………………………………………………………………………

Equinix will be at the Cloud World Forum on Stand D170, taking place on the 24th – 25th June 2015. Don’t miss their session on ‘An Expedition through the Cloud’ in the Employee Experience Theatre at 10.35am on Day 2.

REGISTER YOUR FREE EXHIBITION PASS HERE.

CWF static banner

Advertisements

Case Study examples of how present clients have been using nCrypted Cloud #CloudWF

Case Study examples of how present clients have been using nCrypted Cloudtumblr_inline_mo13ox62Ak1qz4rgp-300x225

Companies are struggling with how to maintain control over corporate data particularly on mobile devices when end users are using sync and share providers. So the big question is how can companies manage productivity, have the assurance of security whilst not disrupting employee workflow?

nCrypted cloud is an enterprise secure collaboration application that seamlessly integrates with cloud storage services to allow for secure BYOD, Cloud and mobility practices in the workplace. nCrypted Cloud enables mobile collaborating with file sharing security.

Here are some examples of how we are being used in different sectors of the market:

  • nCrypted Cloud recently helped Logical Outcomes to handle their sensitive data issues with a mobile workforce based in several countries. The company I am referring to are obsessed with security and they often work with personal and confidential data. So they designed a data security policy that ensured proper management of personal and confidential information at every stage, from data collection to analysis to archiving. It wasn’t easy but they had a legal and ethical responsibility to get it right. nCrypted Cloud enabled this company to encrypt private files and share encrypted data in Dropbox. They did this by stating that all projects were to be assigned one of three levels of information security – standard, enhanced and obsessive. At the minimum all projects would have standard level of security. If any personal information was added then this information would then have to be encrypted. Read more.
  • A fortune 100 company has been using nCrypted cloud within the healthcare industry for secure collaboration purposes. This large organisation wanted to be able to share sensitive data outside the organisation with a full audit trail. They also did not have a good way to share files with their external vendors. They were just about to purchase 5000 USB devices for the purposes of collecting medical information securely but replaced this with nCrypted Cloud Infinite Mail which is an extension plug in for Outlook. This reduced their postage costs as well.
  • In the insurance sector, a global insurance company wanted their brokers to transfer large data volumes to clients and also wanted to give employees the ability to send files and data securely especially to developing countries and to clients outside the corporation. One of their biggest problems for the European helpdesk was that their staff were using personal cloud services such as Dropbox to share corporate documents. The staff wanted to be able access files from any device and at any time however there was no audit trail as to where the companies information was. nCrypted Cloud gave them the ability to monitor and control data via corporate policies on access levels and also give the user ability to give the required permissions for whom will see the data, how long for and whether they have download capability or not as well as watermarking.
  • Lastly a university researcher from Browns University was conducting a sensitive piece of research in South Africa but the IT department within the University had strict rules and stated any information that was regulated, restricted, confidential or personally identifiable must be stored on a system owned and managed by the University. Added to this, a lot of the staff in South Africa were not computer literate and only had basic computer skills. The researcher is a Dropbox user and thought Dropbox is simple and easy to use and wouldn’t be too difficult to learn. Added to that, using Dropbox to store data on a device as well as in the cloud, which is important when collecting data in the field where Internet connectivity may be non-existent, and synchronized that data seamlessly with the cloud when an Internet connection was available. Dropbox’s simplicity contrasted with the solution offered by the university’s IT department. The researchers’ project had a number of folders and files which included large video, audio and word files, with their main concern for all involved was how to keep the data secure on the device in case they got stolen!  nCrypted Cloud was the solution because it encrypts data at rest and in transit, preserves the ease-of-use of DropBox and gives  project managers and network administrators, control over users and shared files. The data is also encrypted at the endpoints in a system, where an nCrypted Cloud client application resides. When a file needs to be used at an endpoint, the client decrypts the data for application use. So not only is the data encrypted but should a device be lost, access to data on that device can be removed. Read more.

nCrypted Cloud has a patented key management system which is deployed to protect data encrypted by nCrypted Cloud. For example, keys for unlocking an organisations data aren’t stored on nCrypted Cloud’s servers where they could be obtained by a third-party. The corporate private keys remain with the organisation and only the organisation public keys remain with nCrypted Cloud. For more information click here.

nCrypted Cloud

nCrypted Cloud is exhibiting at the Cloud World Forum, taking place on the 24th – 25th June 2015 at Olympia Grand in London.

Don’t miss the chance to take advantage of all the knowledge and networking opportunities presented by EMEA’s only content-led Cloud exhibition.

REGISTER FOR YOUR FREE EXHIBITION PASS HERE!

CWF static banner

Pamoja disperses Cloud services through East Africa

Pamoja, the value-added services business entity and strategic arm leading SEACOM’s entry into content aggregation and Cloud computing services, will host its Cloud platform at Liquid Telecom’s East Africa Data Centre in Nairobi and use the facility to roll out Cloud services to the rapidly- expanding East Africa market.

According to a recent BizTech article, the company selected Nairobi, Kenya as its Cloud service delivery base because of its strategic location in relation to other countries in the East African market.

cloud-africa-680x87

Come and meet Pamoja at the upcoming Cloud World Forum Africa, taking place from 10-11 June at The Maslow, Johannesburg.

Liquid Telecom’s East Africa Data Centre is the largest and most sophisticated carrier-neutral data centre in East Africa and is the ideal facility in which Pamoja can host its Cloud platform. The Nairobi Cloud platform compliments Pamoja’s other Cloud platform that is located in South Africa.

Executive management at Pamoja says the data centre facilities meet the Company’s availability, security and connectivity needs. These are also base criteria for the ISO 27001 certification processs which Pamoja has embarked upon. The ISO 27001 standard is the specification for an Information Security Management System. The objective of the standard itself is to “provide requirements for establishing, implementing, maintaining and continuously improving an Information Security Management System (ISMS)”.

“By interconnecting the two Pamoja platforms through the SEACOM submarine cable infrastructure we are able to firstly provide Cloud services with a regional presence and secondly offer geographic redundancy to customers who demand this,” says Albie Bester, General Manager at Pamoja.

“With physical Cloud infrastructure in Africa Pamoja is able to address customer concerns about the location of their sensitive data and ensure improved service response times compare to Cloud services that are hosted in Europe or the US,” Bester adds.

The Kenyan and South African Cloud platforms are managed by the Pamoja Cloud Services team with support from SEACOM network operations.

“Our Cloud platform is based on the Microsoft Dynamic Datacentre blue print and through the use of advanced management and monitoring systems it is possible to ensure the highest level of availability with a relatively small team of experts.” Bester continues.

Pamoja is poised to help businesses across the continent take advantage of the shift towards Cloud, the impact of the internet and social networks on the corporate space and the relevance of Cloud computing to core operations across most businesses.

Forrester Research forecasts that the global market for Cloud computing will grow from $40,7 billion to more than $241 billion in 2020.

According to Bester Cloud adoption in Africa is in an exciting and budding phase and although issues like quality of connectivity and stable electricity sources still represent challenges, infrastructure is improving all the time. “Soon Africa will be ready to consume Cloud services at a large scale.”

White Paper: Oracle Communications Cloud Delivery Solution

Want to know more about Oracle’s Communications Cloud Delivery Solution? Here is an extract from their white paper:

Oracle Communications Cloud Delivery Solution is enabling today’s cloud service providers to offer virtual private cloud networks, virtual data centers, public cloud compute and platform services, unified communication and collaboration services, compute services, and platform services. There are four primary functional areas where Oracle products are making communications service providers (CSPs) and enterprise cloud providers successful in delivering cloud:

  1. Cloud Resources – data centers, virtual machines, operating systems, hardware, software, and storage components where Oracle provides best of breed technology
  2. Cloud Services –the three primary categories of cloud services being Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). Oracle provides core building blocks for cloud services via engineered systems, service delivery platforms that allow operators to expose their networks to third party developers as a PaaS, and provides software for messaging and collaboration to enable CSPs to develop a SaaS
  3.  Access and Security – composed of identity management, portals, self-service capabilities, database security and security aspects at all levels of cloud
  4.  Cloud Enablement – focused on cloud service creation, delivery, and monetization. This includes management of cloud assets at the resource management, services management, and business management layers. Often times this stack resides outside the cloud managing the cloud

Click here to read Oracle’s full white paper.

Tag Cloud

%d bloggers like this: