enterprisesecuritymag

private cloud

CIOs Shouldn't See OpenStack and Public Clouds as an Either/Or Proposition
Enterprisesecuritymag >> cioviewpoint

Shelton Shugar, CIO, Barclaycard [NYSE:BCS-D]

With over 20+ million lines of codes and over 30,000 people in the community, OpenStack has easily gained adoption across a variety of industries and proved its viability and reliability for production environments. It has become the fastest...

Lenovo Announces Cloudistics Partnership, Launches ThinkAgile CP Series
Enterprisesecuritymag >> cioviewpoint

Lenovo in collaboration with Cloudistics is growing its ThinkAgile portfolio with the CP series. Billed as a composable cloud platform or a 'cloud-in-a-box'; the CP series expects to offer clients who are looking for the agility of a...

How Information and Communication Technology is Enhancing Businesses?
Enterprisesecuritymag >> cioviewpoint

Marcelo De Santis, Group Chief Information Officer, Pirelli

• Why is ICT Important for Pirelli? First, it’s important to understand our business strategy. Pirelli came back to the stock market in October 2017 as a pure consumer, high-value tire company specializing in the production of high...

Edge Computing: Does it support customer intimacy and the race to digitization
Enterprisesecuritymag >> cxoinsights

Mark Thiele, CIO & CSO, Apcera and President & Founder, Data Center Pulse

Does Edge Computing Matter to Enterprise IT? Edge computing, like IoT, AI/ML, drones, Augmented Reality (AR), etc. is all the rage these days. What does edge computing matter to my enterprise though? We have public cloud, colocation, private...

Reading the Cloud Tealeaves in 2018
Enterprisesecuritymag >> cxoinsights

Sean Hackett, Research Director Cloud and SaaS, IDC

The key to successfully reading the cloud tealeaves in 2018 will center on one’s ability to more deeply understand the “why” of adoption and the “how” of implementation. There is no question that Cloud adoption for...

The Secure Cloud for Insurance Carriers
Enterprisesecuritymag >> cxoinsights

Michael Stoeckert, CTO, ProAssurance

Public clouds are the most recognized form of cloud in many industries, but private and hybrid clouds dominate regulated industries. In a private cloud, all resources in the operating environment are dedicated to a single client. This ensures the...

Seven security priorities for 2017
Enterprisesecuritymag >> cxoinsights

Jeff Harris, VP of security solutions, Ixia

The enterprise IT security landscape changed dramatically during 2016. Expansion into more clouds, the addition of industrial IoT, and marked increases in virtual deployments resulted in more devices, more locations, and more environments for...

Securing the Internet of Things: Best Practices for the Enterprise
Enterprisesecuritymag >> cxoinsights

Phil Skipper, Head of Business Development, Vodafone Internet of Things

Businesses across every industry– from healthcare, to manufacturing, to automotive, to retail – are adopting powerful Internet of Things (IoT) technologies to gain better data insights from physical devices and make realtime...

Impact of Software Defined Transformation in the Enterprise
Enterprisesecuritymag >> cxoinsights

Vesko Pehlivanov, VP, Cybersecurity, Group CTO, Credit Suisse

Software Defined Networking is dead, long live Software Defined Networking. Software Defined Networking (SDN) never had a clear role in the traditional enterprise. It came in the guise of Open Flow as a solution looking for a problem. And the...

Delivery and Adoption of Cloud Computing
Enterprisesecuritymag >> cioviewpoint

Michael Stoeckert, CTO, ProAssurance

What is “Cloud” ? Cloud computing delivery models provide users with on-demand access to a flexible, wide-ranging pool of technology assets composed of services, applications, servers, networks, and storage facilities. Due to the...

Implementing Checkpoint for Productivity
Enterprisesecuritymag >> cxoinsights

Bill Kohler, CIO, Americas International SOS

The Next Generation Threat Prevention Space: Today’s malicious code is very sophisticated, often using evasion techniques and other obfuscation methods to avoid detection by traditional signature-based anti-malware solutions. While...

3 IT Security Questions You Should be Asking, but Aren't
Enterprisesecuritymag >> cxoinsights

Christopher Clapp, CEO, Bluelock

The pace of IT security innovation is driven not by your business’s agenda. Rather, IT security innovation is driven at the pace of the latest hacks, attacks and impending threats. That always-changing, fast pace is near impossible for...

The Dawn of Hybrid Web Application Firewall-Why it will define security for the foreseeable future
Enterprisesecuritymag >> cioviewpoint

Carl Herberger, VP-Security Solutions, Radware

As the threat landscape transforms as quickly as advances in network protection, a sea of change is occurring in how organizations secure their networks. Dramatically different visions of how to effectively protect a network presents a...

Cloud Security Grows Up
Enterprisesecuritymag >> cxoinsights

Kevin Winter, VP & CIO and Brian Javonillo, Senior Associate, Booz Allen Hamilton

Many companies today have established minimum levels of security requirements for their IT environments. CIOs are realizing, though, that those security models don’t translate when IT capabilities move to the Cloud. "Compliance...

Key Elements of Effective Security Planning
Enterprisesecuritymag >> cxoinsights

Rickie K Helmer, CEO and ISO/IEC 27001 ISMS expert, NetQuest

Most of us are aware of the fact that security threats of all kinds challenge us once we venture onto the internet, whether we are using it privately or through our daily work. When journeying into new ventures of investment in new technology,...

Security of Cloud Computing
Enterprisesecuritymag >> cxoinsights

Anthony Scarola, CISSP, Director of Technical Information Security, TowneBank

Ugh, “cloud”. The term and how it has been applied to hosted computing services is disappointing. Hosting providers have repurposed the cloud placeholder— typically used by network engineers to depict complex, yet understood...

3 IT Security Questions You Should be Asking, but Aren't
Enterprisesecuritymag >> cioviewpoint

Christopher Clapp, CEO, Bluelock

The pace of IT security innovation is driven not by your business’s agenda. Rather, IT security innovation is driven at the pace of the latest hacks, attacks and impending threats. That always-changing, fast pace is near impossible for...

Is There Auditible Security in the Cloud?
Enterprisesecuritymag >> cxoinsights

Preston Williams III, Senior Partner and CIO, GBC Global Services

I recently watched the CSPAN coverage of cloud computing in political campaigns held at the Graduate School of Political Management at George Washington University. Participants shared their views about cloud computing in campaigns, but the issue...

The Dawn of Hybrid Web Application Firewall-Why it will define security for the foreseeable future
Enterprisesecuritymag >> cxoinsights

Carl Herberger, VP-Security Solutions, Radware

As the threat landscape transforms as quickly as advances in network protection, a sea of change is occurring in how organizations secure their networks. Dramatically different visions of how to effectively protect a network presents a...

Cloud Adoption Rate Hike Spurs Demand for Security Professionals
Enterprisesecuritymag >>

Julie Peeler, Foundation Director, (ISC)²

For many organizations, cloud adoption is no longer a question of if, but how much. Several factors are contributing to rapid growth and change in the cloud computing market. The cloud provides multiple business and consumer benefits, many of...