CloudCow facebook CloudCow twitter Syndicate content Subscribe to Cloud Computing Technology Headlines using RSS

Cloud Computing Technology News and Headlines

Join the HERD!   
CloudCow Mailing List 

The Advantages Of Modern Technology

Today, technology is an important part of day to day life because it is utilized at large scale by people of all ages. There are a lot of technologies that people utilize on a daily basis. Some of these include mobile phones, televisions and other kinds of gadgets. Yet, there are a lot more technologies that people use in order to simplify their lives. A few centuries ago people did not have access to a refrigerator or a small, compact or even cordless hoover. All of these modern technologies have revolutionized the way people take care of daily tasks. Besides that, technologies are also used in the medical field, the business field and so on so forth. In other words, it is easy to say that technology is vital to people's lives.

Devices of all kinds with various functions have slowly taken a big part in people's daily life, and that comes with a lot of advantages. Some of them are obvious, while others are definitely taken for granted. Below there are some important advantages that technology provides to people.

New Global Standards for Cloud Security

Article Written by Avery Phillips

As of May, the requirements of cloud security will be getting an overhaul. The General Data Protection Regulation (GDPR) will introduce tighter security protocols for many businesses not just in the EU, but around the world. You are mistaken if you think that the GDPR is only going to affect European companies and organizations. 

Appnovation, a global IT company, understands the GDPR's reach when they state "Put simply, this is something which will [affect] every organization that processes EU citizens' data, whether processed within or outside Europe." This bombshell that's about to drop on the digital security and data world is going to change the cloud and hold companies accountable for how they process sensitive data on it.  

Failure to adhere to these policy changes will result in hefty fines to your business. So, if you hold extensive data on the cloud, you'll want to know how it's going to change in accommodation for the GDPR. Read below to understand how and why it will change cloud security.

SolarWinds Study Finds Cloud Computing is Top Transformative Technology and Main Cause of Mounting Performance Challenges

Grazed from SolarWinds

SolarWinds, a leading provider of powerful and affordable IT management software, today released the findings of its annual state-of-the-industry study. The new study reveals the state of today's IT landscape: IT professionals are continuing to prioritize investments in cloud computing as they grapple with how to leverage the benefits of emerging technologies, such as artificial intelligence (AI) and machine learning. A juxtaposition of the findings with other independent research also suggests a misalignment between the IT investment priorities of the practitioners surveyed and their leaders.

The IT Trends Report 2018: The Intersection of Hype and Performance, the company's annual report on IT trends, explores the spectrum of today's existing and emerging technologies, and the extent to which they are disrupting IT and optimizing the performance of environments as organizations progress in their digital transformation journeys.

Overall, North American IT professionals are prioritizing investments in cloud computing and hybrid IT more than any other technology; 94 percent of respondents indicate that cloud/hybrid IT are one of the top five most important technologies to their organization's IT strategy today. By contrast, just two years ago, over one-third of IT professionals indicated, as part of the SolarWinds IT Trends Report 2016: The Hybrid IT Evolution, that cloud computing was somewhat important or not important at all. While AI and machine learning (ML) are not currently the highest priorities for IT professionals, optimizing cloud/hybrid IT environments creates a critical pathway to eventually deploy and capture the compelling benefits of these emerging technologies.

FileCloud Adds GDPR Support for its EFSS Platform on Amazon AWS, Microsoft Azure

Grazed from FileCloud

FileCloud, a cloud-agnostic Enterprise File Sharing and Sync platform, today announced GDPR compliance support across Amazon AWS and Microsoft Azure. With GDPR regulations set to be imposed on May 25, FileCloud empowers large organizations with an international presence to choose where to host their data.

By enabling organizations to seamlessly integrate leading cloud offerings such as Amazon AWS and Microsoft Azure into FileCloud, and adding a secure, collaborative layer, FileCloud solves the compliance piece of the puzzle that has eluded standardized SaaS solutions.

"No other enterprise file sharing platform on Amazon AWS or Microsoft Azure offers similar breadth of features to support GDPR," said Madhan Kanagavel, CEO and co-founder, FileCloud. "FileCloud offers incomparable levels of flexibility and compliance so organizations can choose their vendors and methods of infrastructure support for their unique data."

Portnox Brings Increased Network Visibility and Enforcement with TrapX Integration

Grazed from Portnox

Portnox, a market leader for network visibility, access control and device risk management solutions, and TrapX Security, the global leader in deception-based advanced cyber-security defense, announced today the integration of Portnox's cloud-based and on-premise network access control (NAC) solutions, Portnox CLEAR and Portnox CORE, with TrapX's DeceptionGrid product. The joint solution will give customers the ability to detect unauthorized activity on the network, as well as enforce security policies in real time.

The integration of Portnox's solutions with DeceptionGrid provides CISOs, CSOs, IT teams and network administrators with a complete view of the network, as well as increased visibility into devices - including BYOD, Internet of Things (IoT), mobile and managed devices, anywhere in the world. As DeceptionGrid identifies threats, it shares that information with Portnox to either allow or restrict device access. Portnox generates unique risk scores for each device based on whether a device is on or off premise, over wired, VPN or wireless networks and creates accurate risk profiles and authenticates devices according to score.

Dubai Airports, the World’s Largest Airport, Leverages Box for Cloud Content Management

Grazed from Box, Inc.

Box Inc., a leader in cloud content management, today announced that Dubai Airports has moved its workforce to Box. Dubai Airports operates Dubai's two airports, including Dubai International, the largest airport in the world for international passenger traffic. In 2016, the company chose Box to manage its content in the cloud, and it has now deployed Box to nearly 2,000 employees.

"Nearly 88.2 million passengers traveled through Dubai Airports in 2017, and we are continually looking to implement new technology to create a smoother experience for those customers," said Abdulrahman Al Hosani, Dubai Airport's Vice President - BT Infrastructure and Operations. "With Box, we spend less time servicing file servers and support desk tickets, and can focus on what we specialize in: providing premiere passenger experience, baggage processing, and airfield management."

Ovum Places Ericom Shield "On the Radar" for Secure Browsing

Grazed from Ericom Software

Ericom Software announced today that leading global analyst firm Ovum has chosen to cover Ericom Shield in its "On the Radar" series. Ericom Shield leverages strong remote browser isolation technology to protect organizations against known and unknown web-borne threats including ransomware, drive-by downloads, zero-day attacks, and crypto-jacking.  

According to Ovum, every "organization with an online presence is susceptible to attack and their systems can be put at risk to browser-borne malware." In the "On the Radar: Ericom Shield provides secure browsing facilities" report, Ovum recommends Ericom Shield as an additional layer of protection against malware that "penetrates and attaches itself to business systems via inadequately protected browsers", in conjunction with firewalls, URL filtering and other traditional protection tools.

Ovum singles out Ericom Shield's centrally managed design, which requires "no on-browser or on-device software" as a key advantage of the solution. The report also highlights the pre-integrated content disarm and reconstruction (CDR) tools that are included in Ericom Shield, which sanitize files of potential malware before they are downloaded from the internet to endpoints.

YI Technology Announces Microsoft Azure Integration Plans

Grazed from YI Technology

YI Technology (YI), a leading provider of advanced, intelligent imaging technologies, today announced its plans to integrate with Microsoft Azure to provide millions of YI customers with secure cloud storage, next generation AI and computer vision features. The integration with Azure underscores YI's commitment to protecting customer data and delivering innovative cloud services for consumers and enterprises.

YI Technology believes that the very best imaging and sensing technology should be easy and accessible to everyone. From world-class innovation to numerous best-selling products, YI knows that great hardware is only possible when paired with great software and infrastructure. Integration with Azure provides data residency within our customers' geographical-regions and enterprise-grade cloud service for YI's rich product portfolio, including Kami, YI's upcoming initiative for the smart home.

Zerto Expands Executive Leadership Team with Appointment of Chief Revenue Officer

A new position to build on the company's high-growth partner and customer strategy 

Zerto, an industry leader for IT resilience, today announced the appointment of Ed Carter as chief revenue officer. The role will focus on leading Zerto's global sales team and building on this year's record-breaking growth.   

Zerto's total cloud and enterprise sales in Q1 2018 have far surpassed total cloud and enterprise sales in Q1 2017. Carter joins Zerto to build on this momentum. He and the sales team will focus on acquiring new customers, growing enterprise and existing accounts and building Zerto's partner GTM strategy to increase strategic partner revenue and deepen relationships across the company's partner ecosystem. Carter will also be instrumental in an aggressive growth strategy as Zerto continues to build itself into a world-class company. 

Protecting Your Organization's Cloud

As organizations move to the cloud, the next evolution of Network Access Control takes shape to meet business demands.
 

What are the chances that your organization has moved some of its data, systems, programs and applications to the cloud? Quite high. According to a Synergy Research survey of IT professionals, spending on private cloud and cloud-enabled solutions grew by 16% between the second quarters of 2015 to 2017. During that same period, traditional, non-cloud data center hardware and software dropped 18%. It is easy to understand why these days, cyber security threats are coming in through many new channels and vulnerabilities that are not part of the traditional IT infrastructure such as, mobile devices and cloud-based applications. The following prevalent trends in the enterprise highlight why it is essential to monitor your network with a Cloud Network Access Control (Cloud-Based NAC). 

Company Networks Go Global

Organizations are becoming perimeter-less. Traditional IT perimeters have been torn down by the adoption of BYOD, IoT devices, telecommuting and cloud computing. Therefore, one can no longer look at the network as a defined infrastructure within a physical firewall. The network is essentially global without boundaries. According to a Gallop News Service poll from 2015, 37% of U.S. workers had telecommuted for work, and this was up by 30% from the last decade but four times greater than the 9% found in 1995. Perimeter-less companies require continuous risk-monitoring and risk-assessment that can match the ever increasing mobile and cloud-based reality and this can be performed best via the cloud.