There is an abundance of certifications in the IT industry covering application development, project management, security, and vendor tool specific. An interesting spin to all of this is a security framework tied specifically to cloud computing. The Cloud Security Alliance (CSA) published the second edition of its guidelines for secure cloud computing, delivering a document
An active discussion on cloud computing use cases brings a somewhat more practical approach to what this service might offer to a company and how it might evolve over time. Not everyone can use salesforce.com or Google mail services, which are the most frequently cited examples of cloud computing. The NIST definition describes five essential
Information security in data centers has historically relied on perimeter firewalls, pattern matching “after the fact” with intrusion detection, and at the server level by installing host-based intrusion detection, identity enforcement, antivirus, and other software agents. Internal LANs can be segmented and boundary controls implemented using the same firewall technology. Virtualization adds a layer of
Gartner says that just 16% of data center loads are virtualized, and in a recent InformationWeek Analytics survey found that 35% of respondents say they expect to virtualize less than 25% of their data centers by 2011. That finding reflects either a less optimistic or more realistic assessment than survey respondents exhibited last year, when
Just have to love some marketing folks and analysts that jump to the latest buzz word and extol the differences, benefits, pitfalls, fear, uncertainty and doubt. There have recently been some press releases concerning cloud computing concepts and technology that seems to have been lifted from previous Service Oriented Architecture (SOA) overviews from the same vendors.
Multi-cloud relationships and subcontractors can be an issue when using some cloud providers. For example, a Customer might start out slow with Cloud Computing and enter into a SaaS service just to get a feel for how all of this works and to satisfy an immediate need that the internal IT department cannot quickly fulfill.
It does not matter how you start down the path towards cloud computing or outsourcing, but a written RFP that has been vetted by the stakeholders within the organization—IT, legal, compliance, information security, and all of the relevant business groups, is usually a helpful starting point. Listed below is a starter set of questions that
For every positive benefit there is almost always a negative to compensate for rapid adoption based on wild enthusiasm. Cloud computing has a number of key risks. 1) data privacy and governing privacy laws 2) multi-cloud relationships and subcontractors are also an issue when using a cloud provider 3) multi-tenancy on the same virtual server
Like any good consultant or analyst, you can summarize the key benefits in three easy statements: 1) cost, 2) computing on-demand or scalability, and 3) access to expertise on virtualization and technology. The entire business model for cloud providers is to achieve economies of scale and provide processing power at a very low price. It