Enterprises around the world are gaining control of previously unmonitored and unsupported cloud applications and mobile devices in their IT environments according to a new report.
The 2019 Trusted Access report from Duo Security looks at more than a million corporate applications and resources that Duo protects. Among the findings are that cloud and mobile use has resulted in 45 percent of requests to access protected apps now coming from outside business walls.
Smaller businesses have always found it hard to compete against their larger rivals, but that's starting to change as technology allows a leveling of the playing field.
So how can technology, and in particular the cloud, help to give smaller companies an edge? We spoke to John Buni, CEO and co-founder of the CleanCloud SaaS platform and founder of bespoke tailoring company Tailor Made London, to find out.
As businesses move more of their workloads to the cloud they depend on data and applications always being available and secure. But this can conflict with the need for regulatory compliance and effective backup regimes.
Quest Software is launching a new version of its QoreStor product that helps businesses to easily move, recover and store data from on premise and cloud locations.
The German state of Hesse has banned schools from using Microsoft Office 365 because it fears the software opens up student and teachers' private information to the risk of "potential access by US authorities".
The Hesse Commissioner for Data Protection and Freedom of Information (HBDI) believes that Office 365 is in contravention of GDPR legislation, and also expressed concerns about the collection of telemetry data by Windows 10.
Cloud infrastructure is the foundation of most enterprises and any crack can cause significant damage. A great example of this is the 2017 AWS S3 outage, which was caused by an unauthorized administrator typing an incorrect command when trying to fix a billing system slowdown. The fact that the admin had access to a larger subsystem is what led to the problem that ultimately cost customers an estimated $150 million.
Unfortunately, the probability of identities intentionally or accidentally misusing privileges -- and a corresponding impact on business -- is going to increase greatly for enterprises embracing cloud. In May 2019, for example, a faulty database script deployed by Salesforce inadvertently gave all users full access to sensitive company and customer data, forcing the company to shut down its Marketing Cloud services for 15+ hours.
The rise of cloud adoption has led many businesses to adopt an environment where computing requirements are decoupled from storage and scale independently. But this leads to problems with accessibility and data management.
A new platform launched today by Alluxio provides improved orchestration for data engineers managing and deploying analytical and AI workloads in the cloud, particularly for hybrid and multi-cloud environments.
Dropbox has revealed a new file sharing service that makes it possible to send files of up to 100GB.
The company says the service has been designed as a quick and easy alternative to configuring sharing and permissions, and it means that it is possible to share large files even with people who do not have Dropbox accounts.
Having cloud storage is a reality of living and working in an ever more connected world, where we expect to have access to our data anywhere with an internet connection at the drop of a hat. Cloud storage makes it easier for us to travel, to share and most importantly keep our data safe. However, not all cloud storage solutions are created equal. While many commercial services are more quick and convenient, they sacrifice security in order to be more accessible. If you deal with sensitive data such as financial documents for clients, are you using a cloud solution that’s secure enough?
When using cloud services for storing and sharing critical documents it’s important to know if you’re using a solution that employs the highest levels of protection. To know if a cloud solution is secure enough, you need to determine if it has any of the following features:
IBM has closed its acquisition of Red Hat following the statement of intent back in October. Following the $34 billion deal, Red Hat will operate as a distinct unit within IBM -- and will be reported as part of IBM's Cloud and Cognitive Software segment.
For IBM, the deal means fully embracing open source as it looks to accelerate its business model within the enterprise. For Red Hat, it means expanding its client base and working with a big player in the enterprise cloud business.
Microsoft releases public preview of Desktop Analytics to help with Windows 10 update readiness checks
Microsoft has released a public preview of cloud-connected service Desktop Analytics.
Designed to help system administrators to keep Windows 10 devices up to date, Desktop Analytics integrates with System Center Configuration Manager. It allows for the quick and easy creation of app inventories to make compatibility checks simpler.
Business intelligence and analytic projects have traditionally been based on the concept of the enterprise data warehouse, which saw compute and storage combined in a monolithic platform to achieve the performance required for high-performance analytics. More recently, the trend has been toward data lakes, but this was similarly based on the approach of putting all data in a single environment -- initially Hadoop -- for storage and analysis.
We spoke with Justin Borgman, CEO for Starburst Data, on why he believes the separation of storage and compute in the data processing and analytics sector is a trend that will continue to gain momentum.
When IT managers adopted the cloud they believed it would simplify operations, increase agility, reduce costs, and provide greater insight into their data. Yet 91 percent say it hasn't delivered all the expected benefits and 88 percent that it isn't meeting management expectations.
A new study of 900 senior decision makers, for data management company Cohesity carried out by Vanson Bourne, finds that of those who feel the promise of public cloud hasn't been realized, 91 percent believe it's because their data is fragmented in and across public clouds and could become nearly impossible to manage long term.
On average, businesses run 27 percent of their workloads and applications in public clouds and expect this figure to nearly double to 48 percent within the next one to two years, according to a new study.
The report from IT marketplace Spiceworks shows 69 percent of businesses believe the flexibility of cloud environments will allow them to more easily adopt emerging technologies such as edge computing, serverless computing, and container technologies.
As more and more apps and data move to the cloud, identifying and ranking threats becomes an increasingly difficult task.
Machine data analytics platform Sumo Logic is launching a new Global Intelligence Service for Amazon GuardDuty that delivers almost real-time actionable insights to allow customers to benchmark themselves against other adopters of Amazon Web Services cloud infrastructure, strengthen cloud security posture, improve threat detection, and enhance regulatory compliance.
Identity specialist Ping identity is announcing an update to its PingOne for Customers IDaaS solution that means developers can now deliver passwordless and advanced multi-factor authentication from custom mobile applications.
Enhancements include a mobile SDK that allows development teams to send push notifications to custom mobile applications for MFA, APIs for logins via social media accounts, and support for single sign-on via Security Assertion Markup Language (SAML).