Access "Lack of cloud computing definition adds confusion, risk"
This article is part of the June 2009 issue of Effective strategies for risk management and security information management systems
WRITING IN HIS blog recently, Misha Govshteyn, co-founder and CTO of log management software-as-a-service vendor, AlertLogic, notes that some vendors at the RSA Conference 2009 were using the term cloud computing rather loosely. Govshteyn points out that Netgear uses "cloud" to describe its line of unified threat management (UTM) appliances. Netgear says it has a "hybrid-in-the-cloud security architecture." Endpoint security vendor Prevx uses "cloud" to describe its endpoint agents using the "power of the cloud." "Those are some of the more absurd examples," Govshteyn says. "Cloud is really about moving complex computing workloads off premise and delivering them as a service. At the end of the day, cloud at its core is cost effective and simple." Even IBM is coining the term for what it isn't. Big Blue describes its new WebSphere SOA appliance as the WebSphere CloudBurst Appliance. It's deployed in-house, but that doesn't stop IBM from calling it an SOA appliance, which deploys and manages SOA in a private cloud. Like Govshteyn, other security experts and ... Access >>>
Premium Content for Free.
How to write a risk methodology that blends business, security needs
One security professional describes a homegrown risk methodology currently being used by a large university and a private corporation.
Lack of cloud computing definition adds confusion, risk
Vendors loosely using the term cloud computing are causing confusion for users in the market for buying and securing these services.
- How to write a risk methodology that blends business, security needs
Risk management must include physical-logical security convergence
If your organization is serious about managing risk and total asset protection, then physical-logical convergence is a necessary step.
Mature SIMs do more than log aggregation and correlation
They've come a long way from the early days of log aggregation and correlation; enterprises now glean value from SIMs for compliance, visualization, and even overall business intelligence.
- Risk management must include physical-logical security convergence
Three cloud computing risks to consider
Cloud computing carries risks that enterprises need to weigh before they forge ahead.
New partnerships, creative thinking help security bust recession
The economy is forcing organizations to be more resourceful and bury the hatchet. And that's a good thing.
- Three cloud computing risks to consider
More Premium Content Accessible For Free
FTP gets big files to colleagues and clients fast, but as the headlines remind us, the threat of electronic break-ins is real. This guide to secure ...
As tablets and smartphones become more integrated into business environments, CISOs are scrambling to put effective countermeasures in place. But too...
This Technical Guide examines the necessary elements of, and how to implement, a sound mobile device management strategy. Devices will be lost...