Results tagged "compliance"
Total Search Results : 119
April 09, 2012 09:00 AMThe marketing is there, and has been for some time. Buzzwords have been coined and your interest is piqued. You sat back long enough to see if this was just vaporware or real, while gaseous. Cloud turns out to be more solid than its nomenclature. You’re ready, in fact you’re all in. Now the bad news: If you want to succeed in the cloud, the long-term relationship you've had with your apps must be broken up.
March 29, 2012 09:00 AMAs data continues to grow in terabytes in the enterprise, classifying it based on its sensitivity has never been more important. According to a just-released InformationWeek report, 10 Steps to Effective Data Classification, an organizational classification program defines policy requirements; specific classifications, generally as “secret,” “private,” “confidential” and “public,” and their associated data types; processes and procedures; accountability metrics; and repercussions from not following the rules, according to author Erik Bataller, a senior consultant with information security consultancy Neohapsis.
March 15, 2012 11:00 AMIT professionals at companies around the world are all in for cloud computing, but they still worry about the risks the technology may present to their organizations, according to a new survey. The study shows that top challenges to adoption of cloud computing include security, compliance issues, bandwidth capacity and a lack of interoperability with existing applications.
February 29, 2012 01:00 PMEMC's consulting arm is introducing five security and risk management advisory services. "When you look at the services and the way we set this up, it's very much a reflection of our need to provide our customers with end-to-end solutions... framed under the broader umbrella of GRC--governance, risk and compliance," says Mat Allen, senior director, security and risk management global practice, EMC Consulting. "GRC acts as the center point."
February 27, 2012 04:40 PMIf the phone isn't ringing, then your wireless users must not be feeling any pain, right? That can be a dangerous assumption in large, complicated wireless networks. Some issues may not be crystallized enough to raise your clients' ire, but the fact remains that performance is degraded. AirMagnet's latest Enterprise version wants to make hard-to-find problems more obvious even as the WLAN gets ever more complex.
February 14, 2012 01:00 PMIPv6 is coming, and we've reported in this series some of the issues network operators have to deal with in the near future. Two issues that require more than just checking boxes on a to-do list concern compliance and security. However, making sure the IPv6 network is as compliant and secure as the existing IPv4 network can be accomplished with the proper planning.
February 08, 2012 11:00 AMWhile the Internet Society (ISOC), a global Internet standards-setting group, has seen a pickup in adoption of IPv6 by some measures, conversion from the IPv4 standard is still relatively slow. The ISOC has scheduled another IPv6 Day for June 6, hoping to build on the momentum for adoption of the new Internet Protocol from IPv6 Day on June 8, 2011. In a three-part series, Network Computing will look at how companies can develop a road map for IPv6 conversion, the technical implications of running IPv6 on an existing IPv4 network, and what compliance and security issues have to be addressed in a transition.
February 06, 2012 01:00 PMVirtualization and cloud computing pretty much dominate the IT world, but security and compliance with IT standards are neither trivial concerns nor going away any time soon. But in some ways, security is easier to accomplish in virtual systems than in physical ones.
February 02, 2012 01:00 PMThe Topology and Orchestration Specification for Cloud Applications (TOSCA) Technical Committee recently formed by OASIS (Organization for the Advancement of Structured Information Standards), the not-for-profit open standards consortium, along with several IT vendors and consumer groups, will be good for facilitating cloud portability, industry observers say. The goal of TOSCA is to enable deploying cloud applications without vendor lock-in, while maintaining application requirements for security, governance and compliance.
December 22, 2011 09:59 AMLast week in a blog titled "BYOD--Bring Your Own Disaster," I urged caution and scope for BYOD projects. This week I'm playing devil's advocate with myself. A conversation with Greg Knieriemen got me thinking of the consequences of ignoring BYOD. Let's dive into the risk of burying your head in the sand and ignoring the BYOD push.
Best of the Web
VXLAN is an Experimental IETF draft of protocols to enable the creation of a large overlay, multi-tenant network.
: OpenFlow is poised to reach over-hyped status, yet there are practical, useful reasons for keeping an eye on Openflow. The biggest cloud players are involved and driving the feature creation.
Get a primer on the Openflow protocol and what it can do for networking.