In a bid to make virtualisation and cloud computing more palatable to enterprises which have a high concentration of mobile users, or are implementing a Bring your Own Device (BYOD) strategy, VMware has launched a fistful of new products and a public beta of a system that offers what it describes as “Dropbox for the enterprise”. The products available today and later this year bring to life the product roadmap that VMware outlined at its […]
authentication
One of the main reasons for deploying desktop virtualization is the security advantages it can provide, such as keeping sensitive data off the endpoint, according to Citrix. And Citrix is practicing what it preaches at its Ft. Lauderdale, Fla., headquarters where employees, for example, use the Citrix virtualization product Citrix Receiver for smartphones and tablets. Citrix Receiver brings full-fledged desktop apps to smartphones and tablets “It’s required to access some systems such as SAP,” says […]
A survey recently carried out for IBM found that 77 per cent of respondents believe that?adopting?cloud computing makes protecting privacy more difficult, while 50 per cent are concerned about data breaches or loss. Indeed, when it comes to security the question now is often framed in terms of: where will my data be, who will be able to access it and how can I be assured of this and know what is really happening? When […]
Channelling voice calls over IP networks has brought many advantages to enterprise communications, but it also creates some security risks. Though Voice over Internet Protocol (VoIP) services are available for both consumer and business markets, it is from the latter that most enthusiasm for it has come; for this reason, it is also where most of VoIP’s security issues occur. While the commercial sector has, of course, invested heavily in protecting their data networks from […]
Meeting the requirements for cloud data security entails applying existing security techniques and following sound security practices. To be effective, cloud data security depends on more than simply applying appropriate countermeasures. Taken collectively, countermeasures must comprise a resilient mosaic that protects data at rest as well as data in motion. While the use of encryption is a key component for cloud security, even the most robust encryption is pointless if the keys are exposed or […]
For anyone who has an internet connection, paying attention to your network security should be one of the most important things you can do. With a well maintained and managed network, you won’t need to worry about viruses or compromising sensitive data and access. Here are some simple steps you can take to make sure that you are protected: 1. Install and use a credible Anti-spyware, Anti-virus software package Spyware can present a major problem, […]
Cloud computing is a boon, but its vectors need to be kept on a short leash, says Mushegh Hakhinian, security architect at IntraLinks. The pace of business today requires that critical information be accessible anywhere, anytime, often among both internal and external parties. Hosted services are an important tool to enable this, but while the tools facilitate communication, they bring additional risk and challenges to the firms that use them. Technology is rapidly evolving to […]
Cloud computing security is an incredibly broad (and deep) topic, so I can only scratch the surface in a short article. Even so, let’s try to get the basics under control. The first order of business is making sure we’re talking about the same thing. Some cloud vendors try to blur the lines between security, reliability, and disaster recovery/business continuity. While all these are important attributes, it just confuses the conversation. So let’s stick with […]