HPE has identified the five key capabilities necessary for securing a hybrid cloud environment: Data-centric security: Protecting data is the core of security and compliance controls. Data needs to be secured at rest, in motion and while in use. It should maintain an index with a searchable data format after it is protected and the encryption should be multi-layered. Dynamic infrastructure hardening: Just like on-premises machines, the cloud infrastructure needs to be updated and hardened […]
security vulnerabilities
2 posts
Dimension Data, released the results of a Network Barometer study for this year, which evaluates the readiness of enterprise networks to support ongoing business operations. The report found that technology trends such as bring-your-own-device (BYOD), video and virtualization are rapidly consuming network capacity and capabilities, and that 45 per cent of the enterprise networks assessed during 2011 will be obsolete within five years. This represents a 38 per cent increase over the 2010 data, indicating […]