slideshow

Slideshow: Why Small Businesses Should Use The Cloud

Cloud computing is using the Internet to deliver hardware and software services instead of keeping physical hardware and software at your office.  Many small businesses are migrating to the cloud and experiencing benefits that were never before possible, which is why today, 37 percent of U.S. small businesses have fully adapted to cloud computing, with experts predicting those numbers to double by 2020. The cloud is redefining the way small businesses do business.

To learn more about why your business should use the cloud, check out the below slideshow from Maryland Computer Service.

Top Application Security Threats And How To Counter Them

Application Security is the use of software, hardware, and procedural methods to protect applications from external threats. In the world of software design, security is becoming an increasingly important concern during development as applications are more accessible over different networks and as a result, are more vulnerable to a wide variety of threats. Many applications are fundamentally flawed, making it possible for hackers to steal data, hijack user inputs, or deny service entirely.

The following slideshow presented by Column Information Security presents an application checklist—a look at how your company can counter the impact of seven top application security threats.

 

PCI FAQS and Myths

PCI (short for Payment Card Industry) compliance is a list of practices that administer data security across credit/debit card payments. Businesses need to comply with the requirements outlined by the PCI Security Standards Council in order for their merchant account to stay in good standing. 

Every business that accepts credit/debit cards must obey with these Payment Card Industry standards, no matter what processing method they use. BluePay has compiled a slideshow answering some frequently asked questions as well as debunking a few myths regarding PCI compliance.

Taking a Clear View of Cloud Risks

Grazed from BaselineMag.  Author: Samuel Greengard.

Over the last few years, cloud computing has moved into the mainstream of the enterprise,  emerging as a valuable tool for managing IT systems, software and data. Yet, while the technology solves many security problems, it also introduces new challenges. A recently released "Cloud Security Spotlight Report" from Cloud Research Partners sheds light on emerging issues and how enterprise business and IT leaders are coping with them.

The survey of 1,000 cyber-security professionals identifies a number of key drivers and risk factors related to cloud adoption, including unauthorized access, hijacking of accounts and dealing with malicious insiders. Overall, nearly 90 percent of respondents expressed concern about security and data risk. "Cloud security is top of mind for cyber-security professionals," noted Holger Schulze, founder of the Information Security Community on LinkedIn, which partnered on the report...

10 Mistakes to Avoid Make When Migrating to the Cloud

Grazed from eWeek. Author: Chris Preimesberger.

In only a handful of years, cloud computing has transformed the way many enterprises do business. However, according to Verizon's 2014 Enterprise Cloud Report, about a third of all organizations still haven't made a move to using any cloud services. For the others who have invested in cloud computing, the journey was likely a bumpy ride—especially if the migration was their first.

Given that cloud isn't going away, developing a seamless migration path to the technology can help IT minimize mistakes and, more importantly, attain objectives. However, if enterprises think all their data management and IT issues will be resolved with a move to the cloud, they'd better think again. Cloud hype is as rich in misnomers and falsehoods as it is in promising value and efficiency...

Corporate America Agrees: Cloud Is Good For Business

Grazed from CRN. Author: Joseph Tsidulko.

Almost two-thirds of America's corporate leaders who participated in a recent study believe adoption of cloud computing is good for business. That's according to The Path to Value in the Cloud survey conducted by Oxford Economics, an international advisory firm, and released by telecom provider Windstream.

Oxford Economics queried 350 executives from across the United States. One-third of the respondents were CEOs, CTOs or COOs; the rest held other executive positions at their companies. The results shed light on how business leaders view the changing IT landscape and shift to virtual infrastructure -- insights that solution providers can leverage to sell products and services...

To view slideshow and read more from the source, visit http://www.crn.com/slide-shows/cloud/300073609/corporate-america-agrees-cloud-is-good-for-business.htm

2014 Partner Programs Guide: 5-Star Cloud Vendors (Part 2)

Grazed from CRN. Author: Rick Whiting.

The IT industry continues to evolve at a rapid pace: cloud computing, mobile computing, big data, the Internet of Things and software-defined, well, just about everything. The challenge for solution providers is identifying the opportunities and threats posed by the new computing technologies and, if possible, capitalize on them. And that can mean an increased need for technical, marketing, sales and financial assistance from the IT vendors solution providers partner with.

The 2014 Partner Programs Guide offers the information solution providers need to evaluate IT vendors they work with or are considering working with. The guide is based on detailed applications vendors submitted outlining all aspects of their partner programs. As part of the Partner Program Guide, The Channel Company designates some programs as 5-Star Partner Programs. Here we present the second of two parts of the 5-Star designees in the cloud computing space...

To view slideshow and read more from the source, visit http://www.crn.com/slide-shows/cloud/300072027/2014-partner-programs-guide-5-star-cloud-vendors-part-2.htm

Subscribe to the CloudCow bi-monthly newsletter @ http://eepurl.com/smZeb

Top 5 Innovative Cloud Startups


<b>1. CipherCloud</b><br><br>San Jose, Calif.-based CipherCloud wants to help more enterprise companies say yes to the cloud by providing security solutions. The cloud native offers encryption and tokenization gateways that address concerns about data privacy, residency, security and compliance.<br><br>The CipherCloud Platform, which addresses public and private cloud applications, secures a range of cloud applications, including Salesforce.com, Force.com, Chatter, Gmail, Office 365 and Amazon Web Services.<br><br>Visit <a href=http://www.ciphercloud.com target=_blank>CipherCloud</a>        1. CipherCloud

San Jose, Calif.-based CipherCloud wants to help more enterprise companies say yes to the cloud by providing security solutions. The cloud native offers encryption and tokenization gateways that address concerns about data privacy, residency, security and compliance.

The CipherCloud Platform, which addresses public and private cloud applications, secures a range of cloud applications, including Salesforce.com, Force.com, Chatter, Gmail, Office 365 and Amazon Web Services.

Visit CipherCloud


<b>2. SnowShoe</b><br><br>Wisconsin may not be the first place that jumps into your mind when you think about technology startups, but Madison, Wis.-based SnowShoe has developed a small device used for authenticating cloud-based mobile transactions.<br><br>The company has opened its APIs to the developer community, which has already begun experimenting with the device to execute a variety of functions, using Java and PHP. One application, which was demonstrated at a conference in San Francisco earlier this year, involved use of the device to authenticate authorization to pass through electronically locked doors.<br><br>Visit <a href=http://beta.snowshoestamp.com target=_blank>SnowShoe</a>        2. SnowShoe

Wisconsin may not be the first place that jumps into your mind when you think about technology startups, but Madison, Wis.-based SnowShoe has developed a small device used for authenticating cloud-based mobile transactions.

The company has opened its APIs to the developer community, which has already begun experimenting with the device to execute a variety of functions, using Java and PHP. One application, which was demonstrated at a conference in San Francisco earlier this year, involved use of the device to authenticate authorization to pass through electronically locked doors.

Visit SnowShoe


<b>3. Nebula</b><br><br>Nebula has developed a new Open Stack hardware appliance for the deployment and management of private clouds, and to better accommodate the rigors of big data, web and mobile applications, using an open source architecture geared toward preventing vendor lock-in. The company places an emphasis on simplifying the management of infrastructure in order to enable more time to be invested in the development and optimization of applications. The system can be scaled to multirack deployments, if needed.<br><br>At this year's OpenStack Summit, Nebula unveiled a partnership with LSI, in which the two would accelerate the sharing and storage of data in OpenStack environments for big data, web and mobile applications.<br><br>Visit <a href=http://www.nebula.com target=_blank>Nebula</a>        3. Nebula

Nebula has developed a new Open Stack hardware appliance for the deployment and management of private clouds, and to better accommodate the rigors of big data, web and mobile applications, using an open source architecture geared toward preventing vendor lock-in. The company places an emphasis on simplifying the management of infrastructure in order to enable more time to be invested in the development and optimization of applications. The system can be scaled to multirack deployments, if needed.

At this year's OpenStack Summit, Nebula unveiled a partnership with LSI, in which the two would accelerate the sharing and storage of data in OpenStack environments for big data, web and mobile applications.

Visit Nebula


<b>4. SaaSMarkets</b><br><br>This San Mateo, Calif.-based company develops app stores that open the Software-as-a-Service (SaaS) market to a much broader base of companies that would otherwise lack the skill sets to develop such platforms on their own.<br><br>The company's MarketMaker platform is designed to support any proprietary apps developed by the customer, as well as a list of more than 1,500 prequalified third-party applications. Deployment time is described as a "matter of weeks." The company is specifically targeting finance, technology and retail customers.<br><br>Visit <a href=http://www.saasmarkets.com target=_blank>SaaSMarkets</a>        4. SaaSMarkets

This San Mateo, Calif.-based company develops app stores that open the Software-as-a-Service (SaaS) market to a much broader base of companies that would otherwise lack the skill sets to develop such platforms on their own.

The company's MarketMaker platform is designed to support any proprietary apps developed by the customer, as well as a list of more than 1,500 prequalified third-party applications. Deployment time is described as a "matter of weeks." The company is specifically targeting finance, technology and retail customers.

Visit SaaSMarkets


<b>5. Cumulus Networks</b><br><br>Cumulus Networks has been shaking up networking with a Linux-based network operating system unveiled in June. The technology brings the flexibility and low-cost benefits of open source to data center networks that Cisco and other vendors have dominated.<br><br>The Sunnyvale, Calif.-based company wants to break their dominance and is testing Cumulux Linux for use in corporate data centers and by cloud service providers.<br><br>Visit <a href=http://www.cumulusnetworks.com target=_blank>Cumulus Networks</a>        5. Cumulus Networks

Cumulus Networks has been shaking up networking with a Linux-based network operating system unveiled in June. The technology brings the flexibility and low-cost benefits of open source to data center networks that Cisco and other vendors have dominated.

The Sunnyvale, Calif.-based company wants to break their dominance and is testing Cumulux Linux for use in corporate data centers and by cloud service providers.

Visit Cumulus Networks

Previous Slide 1/5 Next

Top 5 Emerging Cloud Technologies


<b>1. SaaS Device Management</b><br><br>The mobile device management market is predicted to come to an end, according to Gartner analyst John Girard. But, the MDM market is experiencing growth mainly from vendors that sell cloud-based MDM. It's more cost-effective, according to Gartner.<br><br>A few vendors that deserve a look, according to analysts at the show, are <a href=http://www.fiberlink.com target=_blank>Fiberlink</a>, <a href=http://www.airwatch.com target=_blank>AirWatch</a>, <a href=http://www.boxtone.com target=_blank>BoxTone</a> and <a href=http://www.citrix.com/products/xenmobile/overview.html target=_blank>Citrix XenMobile</a>. Gartner recommends that organizations evaluating MDM vendors look to whether they provide mobile application management capabilities or application containers.        1. SaaS Device Management

The mobile device management market is predicted to come to an end, according to Gartner analyst John Girard. But, the MDM market is experiencing growth mainly from vendors that sell cloud-based MDM. It's more cost-effective, according to Gartner.

A few vendors that deserve a look, according to analysts at the show, are Fiberlink, AirWatch, BoxTone and Citrix XenMobile. Gartner recommends that organizations evaluating MDM vendors look to whether they provide mobile application management capabilities or application containers.


<b>2. Multifactor Authentication</b><br><br>Account credentials have become more expensive on the black market than credit card numbers, according to security researchers. Employees use weak and duplicate passwords for online services and access to corporate systems. The scourge of password breaches has renewed interest in two-factor authentication.<br><br><a href=http://www.emc.com/domains/rsa/index.htm target=_blank>RSA</a>, the security division of EMC Corp., sells hardware tokens used by a range of organizations, from large defense contractors and government agencies to biotechnology firms and pharmaceutical manufacturers. Other popular vendors include Amsterdam-based <a href=http://www.gemalto.com target=_blank>Gemalto</a> and Belcamp, Md.-based <a href=http://www.safenet.com target=_blank>SafeNet</a>, according to Gartner.        2. Multifactor Authentication

Account credentials have become more expensive on the black market than credit card numbers, according to security researchers. Employees use weak and duplicate passwords for online services and access to corporate systems. The scourge of password breaches has renewed interest in two-factor authentication.

RSA, the security division of EMC Corp., sells hardware tokens used by a range of organizations, from large defense contractors and government agencies to biotechnology firms and pharmaceutical manufacturers. Other popular vendors include Amsterdam-based Gemalto and Belcamp, Md.-based SafeNet, according to Gartner.


<b>3. Virtual Desktop Containers</b><br><br>Browser components are getting their own sandbox, so why shouldn't browsers or commonly used applications? Fairfax, Va.-based <a href=http://www.invincea.com>Invincea</a> uses virtualization and a lightweight Windows app to move Web browsers, PDF readers, Office suite and executable files into a secure virtual container. Attacks are contained and uploaded to either an on-premise appliance or Invincea's cloud-based service.<br><br>Cupertino, Calif.-based <a href=http://www.bromium.com>Bromium</a> is also gaining interest with its hardware isolation, providing a microvisor that isolates system processes. Although it currently only supports systems running the Intel i3, i5, i7 processor, analysts at the summit were praising the product.        3. Virtual Desktop Containers

Browser components are getting their own sandbox, so why shouldn't browsers or commonly used applications? Fairfax, Va.-based Invincea uses virtualization and a lightweight Windows app to move Web browsers, PDF readers, Office suite and executable files into a secure virtual container. Attacks are contained and uploaded to either an on-premise appliance or Invincea's cloud-based service.

Cupertino, Calif.-based Bromium is also gaining interest with its hardware isolation, providing a microvisor that isolates system processes. Although it currently only supports systems running the Intel i3, i5, i7 processor, analysts at the summit were praising the product.


<b>4. SaaS Software Testing</b><br><br>The Verizon Data Breach Investigations Report points out that vulnerability management and configuration weaknesses are common targets of attackers. Security software vendors are now offering cloud-based software security scanning services in hopes the message will sink in among small and midsize businesses.<br><br>To meet those needs, Santa Clara, Calif.-based <a href=https://www.whitehatsec.com target=_blank>WhiteHat</a> offers Sentinel for SaaS-based Web application scanning. Meanwhile, Burlington, Mass.-based <a href=http://www.veracode.com target=_blank>Veracode</a> sells a SaaS-based application code analysis service and is seeking channel partners. Industry analysts say the cloud-based services are increasingly used by businesses that don't have the deep pockets to invest heavily in a software security program.        4. SaaS Software Testing

The Verizon Data Breach Investigations Report points out that vulnerability management and configuration weaknesses are common targets of attackers. Security software vendors are now offering cloud-based software security scanning services in hopes the message will sink in among small and midsize businesses.

To meet those needs, Santa Clara, Calif.-based WhiteHat offers Sentinel for SaaS-based Web application scanning. Meanwhile, Burlington, Mass.-based Veracode sells a SaaS-based application code analysis service and is seeking channel partners. Industry analysts say the cloud-based services are increasingly used by businesses that don't have the deep pockets to invest heavily in a software security program.


<b>5. Crowdsourcing Threat Protection</b><br><br>Crowdsourcing has proven successful for organizations or individuals seeking assistance on a project from a larger group of people. Some technology vendors are applying it to security. Santa Clara, Calif.-based <a href=https://test-www.paloaltonetworks.com target=_blank>Palo Alto Networks</a> has been gaining attention with the crowdsourcing capabilities associated with its network security appliances.<br><br>The company's Wildfire platform uses a cloud-based malware analysis environment that shares threat information with all subscribers to the service. Columbia, Md.-based <a href=http://www.sourcefire.com target=_blank>Sourcefire</a> sells its FireAmp appliance line with crowdsourcing antimalware capabilities.        5. Crowdsourcing Threat Protection

Crowdsourcing has proven successful for organizations or individuals seeking assistance on a project from a larger group of people. Some technology vendors are applying it to security. Santa Clara, Calif.-based Palo Alto Networks has been gaining attention with the crowdsourcing capabilities associated with its network security appliances.

The company's Wildfire platform uses a cloud-based malware analysis environment that shares threat information with all subscribers to the service. Columbia, Md.-based Sourcefire sells its FireAmp appliance line with crowdsourcing antimalware capabilities.

Previous Slide 1/5 Next