Click here to close now.


Microservices Expo Authors: Jason Bloomberg, Victoria Livschitz, Lori MacVittie, Elizabeth White, Ian Goldsmith

Related Topics: @CloudExpo, Mobile IoT, Microservices Expo, Agile Computing, Apache, Cloud Security

@CloudExpo: Article

Seizing Control of Data Delivery

A tough economy has forced IT departments to do more with less – especially within small and medium-sized businesses (SMBs)

The "consumerization of IT" is a topic we've heard a lot about recently - especially when it comes to "Bring Your Own Device (BYOD)." One area that is less talked about, yet a growing trend under the "consumerization" umbrella, is the use of free, consumer-type file transfer services in the workplace.

A tough economy has forced IT departments to do more with less - especially within small and medium-sized businesses (SMBs). Working with limited resources and budget, SMB IT professionals are still expected to manage everything from network infrastructure to cloud services to security and compliance issues, all while keeping the business running smoothly. Sometimes this results in long "wait" times for employees.

Unfortunately, some employees get tired of waiting for IT to help them out and take matters into their own hands in order to get their jobs done. When it comes to sending large files that an email server can't handle, many employees are turning to consumer-type, cloud-based tools, such as YouSendIt, Dropbox and iCloud. To them, it's a way to send files in a matter of minutes without having to bother the IT department. But in reality, it's a recipe for disaster and a data security nightmare.

Employees aren't the only problem. A recent survey by DataMotion found that nearly 35% of IT and business managers admit that they've actually used or recommended that others use free consumer-type, file transfer services for work purposes.

This is a major problem that needs to be addressed. Free services disrupt any semblance of centralized IT control, as there is no way to track and manage files sent via these solutions. These tools often have weak or non-existent security controls, which introduce serious risks when transmitting sensitive information. This can lead to data leakage, compliance fines, legal liabilities and a tarnished reputation. Need proof of the security issues surrounding these services? Dropbox recently confirmed that usernames and passwords stolen from third party websites were used to access its customers' accounts.

What Can Be Done?
To avoid putting their infrastructure at risk, some companies are banning consumer-type, file-transfer services in the workplace altogether. In fact, nearly 42% of DataMotion's survey respondents stated that their company forbids the use of these services in the workplace, and nearly 30% said their company even goes so far as to block the sites' URLs.

But, IT must offer employees viable, easy-to-use alternatives or frustrated workers will continue to find workarounds. Luckily, there are data delivery solutions that help employees transmit information quickly and easily through secure channels, while still providing IT staff with visibility and control over this data.

Here is a brief, yet important, checklist of product features to consider when evaluating data delivery offerings for your organization. Make sure the solution:

  • —Offers Simplicity - If the product is not intuitive and easy-to-use for both senders and recipients, not only will the IT support burden increase, but, employees will find alternative, insecure ways to send their data. The best security does no good if it is not used.
  • —Provides Flexibility - Going back to BYOD, employees are sending just as many emails via their mobile devices as they are on their computers. Consider a data delivery solution that integrates with mobile devices, so security and compliance controls are enforced no matter how - or on what device - data is sent. Solutions that do so natively (without the need to launch an application) make it easy for the employee to follow policy.
  • Prioritizes Security - The ability to easily send sensitive information securely is vital. Make sure your data delivery solution encrypts data while it's in transit and at every "hop" where it's stored along the way. It's also important to ensure the solution's delivery methods adhere to your own internal - as well as industry - security and compliance regulations.
  • —Gives Control to the IT department - A solid solution will provide IT with centralized control, the ability to easily provision/de-provision users, and track and monitor all data transfers, including file names, sender and recipient IDs, timestamps, completion status notifications and other important metadata.
  • —Delivers ROI - Consider the difference between on-premise and cloud-based solutions. Cloud solutions often offer lower total cost of ownership (TCO) because of significant cost savings in hardware, OS licenses, staffing and disaster recovery. Additionally, because up-front costs are minimal and the solution can be up and running quickly, cloud solutions provide companies with a quick return on investment. Just remember to make sure your cloud provider upholds or exceeds the same security and compliance standards that you follow.

With data breaches more prevalent than ever, industry regulations rapidly expanding, and Big Data becoming the norm, companies must re-evaluate their methods of data sharing. Choosing a solution that encompasses the features outlined in this checklist will put you well on your way to protecting sensitive information and staying ahead of the competition. And pairing this with employee education and awareness will help you gain control back from the "wild west" of rogue application use.

More Stories By Pete Cafarchio

Technology veteran Pete Cafarchio is vice president of DataMotion, innovators in cloud-based data delivery services. Millions of users worldwide rely on DataMotion to transparently improve business processes and reduce costs, while mitigating security and compliance risk. The company’s core DataMotion Platform solves business issues by providing a secure data delivery hub. Its easy-to-use solutions for secure email, file transfer, forms processing and customer contact leverage the DataMotion Platform for unified data delivery.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.

@MicroservicesExpo Stories
DevOps Summit at Cloud Expo 2014 Silicon Valley was a terrific event for us. The Qubell booth was crowded on all three days. We ran demos every 30 minutes with folks lining up to get a seat and usually standing around. It was great to meet and talk to over 500 people! My keynote was well received and so was Stan's joint presentation with RingCentral on Devops for BigData. I also participated in two Power Panels – ‘Women in Technology’ and ‘Why DevOps Is Even More Important than You Think,’ both ...
Somebody call the buzzword police: we have a serious case of microservices-washing in progress. The term “microservices-washing” is derived from “whitewashing,” meaning to hide some inconvenient truth with bluster and nonsense. We saw plenty of cloudwashing a few years ago, as vendors and enterprises alike pretended what they were doing was cloud, even though it wasn’t. Today, the hype around microservices has led to the same kind of obfuscation, as vendors and enterprise technologists alike ar...
Application availability is not just the measure of “being up”. Many apps can claim that status. Technically they are running and responding to requests, but at a rate which users would certainly interpret as being down. That’s because excessive load times can (and will be) interpreted as “not available.” That’s why it’s important to view ensuring application availability as requiring attention to all its composite parts: scalability, performance, and security.
I’ve been thinking a bit about microservices (μServices) recently. My immediate reaction is to think: “Isn’t this just yet another new term for the same stuff, Web Services->SOA->APIs->Microservices?” Followed shortly by the thought, “well yes it is, but there are some important differences/distinguishing factors.” Microservices is an evolutionary paradigm born out of the need for simplicity (i.e., get away from the ESB) and alignment with agile (think DevOps) and scalable (think Containerizati...
The cloud has reached mainstream IT. Those 18.7 million data centers out there (server closets to corporate data centers to colocation deployments) are moving to the cloud. In his session at 17th Cloud Expo, Achim Weiss, CEO & co-founder of ProfitBricks, will share how two companies – one in the U.S. and one in Germany – are achieving their goals with cloud infrastructure. More than a case study, he will share the details of how they prioritized their cloud computing infrastructure deployments ...
Clearly the way forward is to move to cloud be it bare metal, VMs or containers. One aspect of the current public clouds that is slowing this cloud migration is cloud lock-in. Every cloud vendor is trying to make it very difficult to move out once a customer has chosen their cloud. In his session at 17th Cloud Expo, Naveen Nimmu, CEO of Clouber, Inc., will advocate that making the inter-cloud migration as simple as changing airlines would help the entire industry to quickly adopt the cloud wit...
Apps and devices shouldn't stop working when there's limited or no network connectivity. Learn how to bring data stored in a cloud database to the edge of the network (and back again) whenever an Internet connection is available. In his session at 17th Cloud Expo, Bradley Holt, Developer Advocate at IBM Cloud Data Services, will demonstrate techniques for replicating cloud databases with devices in order to build offline-first mobile or Internet of Things (IoT) apps that can provide a better, ...
“All our customers are looking at the cloud ecosystem as an important part of their overall product strategy. Some see it evolve as a multi-cloud / hybrid cloud strategy, while others are embracing all forms of cloud offerings like PaaS, IaaS and SaaS in their solutions,” noted Suhas Joshi, Vice President – Technology, at Harbinger Group, in this exclusive Q&A with Cloud Expo Conference Chair Roger Strukhoff.
Jack Welch, the former CEO of GE once said - “If the rate of change on the outside is happening faster than the rate of change on the inside, the end is in sight.” This rings truer than ever – especially because business success is inextricably associated with those organizations who’ve got really good at delivering high-quality software innovations – innovations that disrupt existing markets and carve out new ones. Like the businesses they’ve helped digitally transform, DevOps teams and Conti...
This week, the team assembled in NYC for @Cloud Expo 2015 and @ThingsExpo 2015. For the past four years, this has been a must-attend event for MetraTech. We were happy to once again join industry visionaries, colleagues, customers and even competitors to share and explore the ways in which the Internet of Things (IoT) will impact our industry. Over the course of the show, we discussed the types of challenges we will collectively need to solve to capitalize on the opportunity IoT presents.
Docker is hot. However, as Docker container use spreads into more mature production pipelines, there can be issues about control of Docker images to ensure they are production-ready. Is a promotion-based model appropriate to control and track the flow of Docker images from development to production? In his session at DevOps Summit, Fred Simon, Co-founder and Chief Architect of JFrog, will demonstrate how to implement a promotion model for Docker images using a binary repository, and then show h...
All we need to do is have our teams self-organize, and behold! Emergent design and/or architecture springs up out of the nothingness! If only it were that easy, right? I follow in the footsteps of so many people who have long wondered at the meanings of such simple words, as though they were dogma from on high. Emerge? Self-organizing? Profound, to be sure. But what do we really make of this sentence?
SYS-CON Events announced today that HPM Networks will exhibit at the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. For 20 years, HPM Networks has been integrating technology solutions that solve complex business challenges. HPM Networks has designed solutions for both SMB and enterprise customers throughout the San Francisco Bay Area.
DevOps is speeding towards the IT world like a freight train and the hype around it is deafening. There is no reason to be afraid of this change as it is the natural reaction to the agile movement that revolutionized development just a few years ago. By definition, DevOps is the natural alignment of IT performance to business profitability. The relevance of this has yet to be quantified but it has been suggested that the route to the CEO’s chair will come from the IT leaders that successfully ma...
Mobile has become standard in the enterprise with smartphones and tablets common in the workplace. Anywhere, anytime access to company systems is expected and systems must work flawlessly on these devices! This demand is requiring that corporate IT departments figure out the best mobile strategy to follow. This eBook looks at how to kick start your mobile application strategy.
Even though you are running an agile development process, that doesn’t necessarily mean that your performance testing is being conducted in a truly agile way. Saving performance testing for a “final sprint” before release still treats it like a waterfall development step, with all the cost and risk that comes with that. In this post, we will show you how to make load testing happen early and often by putting SLAs on the agile task board.
Today, we are in the middle of a paradigm shift as we move from managing applications on VMs and containers to embracing everything that the cloud and XaaS (Everything as a Service) has to offer. In his session at 17th Cloud Expo, Kevin Hoffman, Advisory Solutions Architect at Pivotal Cloud Foundry, will provide an overview of 12-factor apps and migrating enterprise apps to the cloud. Kevin Hoffman is an Advisory Solutions Architect for Pivotal Cloud Foundry, and has spent the past 20 years b...
Go ahead. Name a cloud environment that doesn't include load balancing as the key enabler of elastic scalability. I've got coffee... so it's good, take your time... Exactly. Load balancing - whether implemented as traditional high availability pairs or clustering - provides the means by which applications (and infrastructure, in many cases) scale horizontally. It is load balancing that is at the heart of elastic scalability models, and that provides a means to ensure availability and even imp...
SYS-CON Events announced today that HPM Networks will exhibit at the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. For 20 years, HPM Networks has been integrating technology solutions that solve complex business challenges. HPM Networks has designed solutions for both SMB and enterprise customers throughout the San Francisco Bay Area.
SYS-CON Events announced today that has been named a "Bronze Sponsor" of SYS-CON's @DevOpsSummit Silicon Valley, which will take place November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. provides open-source software ELK turned into a log analytics platform that is simple, infinitely- scalable, highly available, and secure.