This article discusses some of the main defensive security solutions used
today and explains the reasons why employing a Log Management and
Intelligence solution is critical to complement these protection methods.
Let's first look at the most common defensive security solutions that have
been popular these past few years. This is not an exhaustive list of all
existing technologies, but rather a high-level view of some of the prevalent
These correspond to an approach called "Defense in Depth" that aims to put
successive rings of protection between the bad guys and the information to
protect, making successful attacks harder and harder.
There are other types of security solutions, such as proactive security
(Vulnerability Management and... (more)
Public and hybrid Clouds are upon us.
They offer a unique value proposition and solve some big issues in the
Industry, streamlining IT infrastructures, enabling enterprise business
processes and operational models, offering industrialization of Best
Practices, and shaving investment costs. Their window of opportunity is wide
open and they could enjoy great success...provided that they solve some
fundamental issues around transparency and trust.
Understandably so, clients will be reluctant to use "black holes" Clouds
where they have no visibility into how their data is handled, wh... (more)
ISACA, the Information Systems Audit and Control Association just surveyed
1 529 of its members across 50 countries in EMEA.
It turns out that UK businesses are leading Europe on Cloud Adoption 40% to
33%. But a whopping 35% of respondents do not plan to use Cloud for any IT
services (actually 35.6% in Europe and 31.8% in the UK). This is a huge
impediment to the growth of ItaaS – IT as a Service, such as SaaS, IaaS and
PaaS respectively Software as a Service, Infrastructure as a Service and
Platform as a Service.
Let’s spin this another way: 60% of respondents are not using Clou... (more)
Last time, we saw that the biggest impediments to Cloud Provider's adoption
are Trust and Visibility.
Today, we'll look at the difficulty of predictive rightsizing, and how
elasticity is one of the biggest value proposition of Cloud Providers.
One advantage of Cloud Computing is elasticity with self-provisioning, which
provides a level of flexibility that didn't exist with traditional Managed
Service Providers, and which also allows the selection of a level of service
and performance that is close to what is needed.
With "traditional" MSPs (Managed Service Providers) and outsource... (more)
Trust is the fundamental business enabler.
It is absolutely necessary for clients to trust their Cloud Providers.
Without trust, business relationships cannot exist. Without
trust, existing relationships cannot blossom.
Trust becomes an issue as soon as there are potential conflicts of
As a client, do you think it's unfair that your Cloud Provider is also the
entity generating reports on actual usage for Pay-per-Use billing
calculations? Do you think it represents a conflict of interest?
How about when your Cloud provider also generates reports on his level of