Data Privacy

Cloud Encryption – Definition and Best Practices

Many companies have turned to the cloud to be more agile, more cost-effective and to take advantage of services that can be provisioned quickly. With all this, the inherent issue is the need to protect sensitive data from a variety of threats the internet contains. PM Kinetics offers cloud security solutions that can improve your

Cloud Adoption and Risk Mitigation

Many companies have turned to the cloud to and in the process potentially exposed their sensitive data from the variety of threats the internet contains. PM Kinetics offers cloud security solutions to improve the security and recovery of important information.  Understanding the growing use of cloud infrastructure and the associated shared responsibilities will keep companies

The Importance of Cloud Computing Solutions

February 21st, 2017

The “cloud” can be utilized in many different ways and most likely have different meanings to individuals depending on their industry and level of computer knowledge. The average person knows the cloud to be this virtual storage space that allows them to share their photos, videos, and mobile apps between various compatible devices. On a

The Phenomenon of BYOD

October 24th, 2012

Bring Your Own Device (BYOD) phenomenon started when smartphones and tablets with more convenient form factor became ubiquitous among consumers. These devices with their touch-screen interfaces and powerful processors allow employees who brought them to work to be more productive on the go.  Assuming of course they could somehow get connected to the in-house WiFi.

Is a Private Cloud Solution to PCI?

October 14th, 2010

Enterprises at the early stages of cloud adoption are deploying private clouds and internal cloudlets, which can be thought of as local access points and logical divisions of their own larger infrastructure.  Private clouds are characterized by scalability through virtualization but the actual physical infrastructure is kept local to the Enterprise.  This provides scalability and

Security Risks in the Cloud

September 30th, 2010

Security risks are concrete negative expressions businesses face when considering moving critical business systems to the cloud. Enterprises should make “demands” and ensure compliance of the cloud provider through the use of contracts or third party audits, but in reality the market will determine the amount of security provided to Enterprises by cloud service providers

SOA Rebranded as Cloud Computing Services

August 18th, 2010

Just have to love some marketing folks and analysts that jump to the latest buzz word and extol the differences, benefits, pitfalls, fear, uncertainty and doubt.   There have recently been some press releases concerning cloud computing concepts and technology that seems to have been lifted from previous Service Oriented Architecture (SOA) overviews from the same vendors. 

Subcontracting Issues within Cloud Computing Services

August 10th, 2010

Multi-cloud relationships and subcontractors can be an issue when using some cloud providers.  For example, a Customer might start out slow with Cloud Computing and enter into a SaaS service just to get a feel for how all of this works and to satisfy an immediate need that the internal IT department cannot quickly fulfill.

Due Diligence for Cloud Computing Service Arrangements

August 3rd, 2010

It does not matter how you start down the path towards cloud computing or outsourcing, but a written RFP that has been vetted by the stakeholders within the organization—IT, legal, compliance, information security, and all of the relevant business groups, is usually a helpful starting point.   Listed below is a starter set of questions that

Cloud computing key risks

July 30th, 2010

For every positive benefit there is almost always a negative to compensate for rapid adoption based on wild enthusiasm.  Cloud computing has a number of key risks.  1) data privacy and governing privacy laws  2)  multi-cloud relationships and subcontractors are also an issue when using a cloud provider 3)  multi-tenancy on the same virtual server